Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
etwSnBeIC2.exe

Overview

General Information

Sample name:etwSnBeIC2.exe
renamed because original name is a hash value
Original sample name:179d076b3fa5c27a6ab53e7113363290.exe
Analysis ID:1528260
MD5:179d076b3fa5c27a6ab53e7113363290
SHA1:e22eccd0873023e35f6f03082614a3249de8f9f3
SHA256:d754713c54d38eb1f1f19b07c62b0029f3fd9c1a29eb6f8c4c3034e19200c286
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
PE file has a writeable .text section
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • etwSnBeIC2.exe (PID: 6604 cmdline: "C:\Users\user\Desktop\etwSnBeIC2.exe" MD5: 179D076B3FA5C27A6AB53E7113363290)
    • etwSnBeIC2.tmp (PID: 6688 cmdline: "C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp" /SL5="$2042C,4242250,54272,C:\Users\user\Desktop\etwSnBeIC2.exe" MD5: 5F843818412603E159B8CFB0B6A0BC74)
      • jennyvideoconverter32.exe (PID: 5472 cmdline: "C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i MD5: FBEE756977ABC585C336AD6E5BFB1E9F)
  • cleanup
{"C2 list": ["aqplodo.ru"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000002.00000002.2939637806.0000000002C83000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: jennyvideoconverter32.exe PID: 5472JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-07T17:57:54.168288+020020494671A Network Trojan was detected192.168.2.449736185.208.158.24880TCP
        2024-10-07T17:57:57.059701+020020494671A Network Trojan was detected192.168.2.449736185.208.158.24880TCP
        2024-10-07T17:57:57.866643+020020494671A Network Trojan was detected192.168.2.449745185.208.158.24880TCP
        2024-10-07T17:57:58.676031+020020494671A Network Trojan was detected192.168.2.449755185.208.158.24880TCP
        2024-10-07T17:57:59.511220+020020494671A Network Trojan was detected192.168.2.449763185.208.158.24880TCP
        2024-10-07T17:58:00.350791+020020494671A Network Trojan was detected192.168.2.449769185.208.158.24880TCP
        2024-10-07T17:58:01.211455+020020494671A Network Trojan was detected192.168.2.449775185.208.158.24880TCP
        2024-10-07T17:58:02.015244+020020494671A Network Trojan was detected192.168.2.449781185.208.158.24880TCP
        2024-10-07T17:58:02.810524+020020494671A Network Trojan was detected192.168.2.449787185.208.158.24880TCP
        2024-10-07T17:58:03.777824+020020494671A Network Trojan was detected192.168.2.449793185.208.158.24880TCP
        2024-10-07T17:58:04.127670+020020494671A Network Trojan was detected192.168.2.449793185.208.158.24880TCP
        2024-10-07T17:58:04.926313+020020494671A Network Trojan was detected192.168.2.449804185.208.158.24880TCP
        2024-10-07T17:58:05.738499+020020494671A Network Trojan was detected192.168.2.449805185.208.158.24880TCP
        2024-10-07T17:58:06.684546+020020494671A Network Trojan was detected192.168.2.449811185.208.158.24880TCP
        2024-10-07T17:58:07.528429+020020494671A Network Trojan was detected192.168.2.449817185.208.158.24880TCP
        2024-10-07T17:58:07.871872+020020494671A Network Trojan was detected192.168.2.449817185.208.158.24880TCP
        2024-10-07T17:58:08.221127+020020494671A Network Trojan was detected192.168.2.449817185.208.158.24880TCP
        2024-10-07T17:58:09.004532+020020494671A Network Trojan was detected192.168.2.449830185.208.158.24880TCP
        2024-10-07T17:58:09.814801+020020494671A Network Trojan was detected192.168.2.449836185.208.158.24880TCP
        2024-10-07T17:58:10.689558+020020494671A Network Trojan was detected192.168.2.449843185.208.158.24880TCP
        2024-10-07T17:58:11.622460+020020494671A Network Trojan was detected192.168.2.449850185.208.158.24880TCP
        2024-10-07T17:58:12.509052+020020494671A Network Trojan was detected192.168.2.449857185.208.158.24880TCP
        2024-10-07T17:58:12.854443+020020494671A Network Trojan was detected192.168.2.449857185.208.158.24880TCP
        2024-10-07T17:58:13.218819+020020494671A Network Trojan was detected192.168.2.449857185.208.158.24880TCP
        2024-10-07T17:58:14.007996+020020494671A Network Trojan was detected192.168.2.449868185.208.158.24880TCP
        2024-10-07T17:58:14.793048+020020494671A Network Trojan was detected192.168.2.449874185.208.158.24880TCP
        2024-10-07T17:58:15.144716+020020494671A Network Trojan was detected192.168.2.449874185.208.158.24880TCP
        2024-10-07T17:58:15.948392+020020494671A Network Trojan was detected192.168.2.449882185.208.158.24880TCP
        2024-10-07T17:58:16.952949+020020494671A Network Trojan was detected192.168.2.449888185.208.158.24880TCP
        2024-10-07T17:58:17.767364+020020494671A Network Trojan was detected192.168.2.449895185.208.158.24880TCP
        2024-10-07T17:58:18.559131+020020494671A Network Trojan was detected192.168.2.449903185.208.158.24880TCP
        2024-10-07T17:58:19.467071+020020494671A Network Trojan was detected192.168.2.449909185.208.158.24880TCP
        2024-10-07T17:58:20.384383+020020494671A Network Trojan was detected192.168.2.449915185.208.158.24880TCP
        2024-10-07T17:58:20.728693+020020494671A Network Trojan was detected192.168.2.449915185.208.158.24880TCP
        2024-10-07T17:58:21.102429+020020494671A Network Trojan was detected192.168.2.449915185.208.158.24880TCP
        2024-10-07T17:58:22.161542+020020494671A Network Trojan was detected192.168.2.449923185.208.158.24880TCP
        2024-10-07T17:58:22.944523+020020494671A Network Trojan was detected192.168.2.449932185.208.158.24880TCP
        2024-10-07T17:58:23.803296+020020494671A Network Trojan was detected192.168.2.449937185.208.158.24880TCP
        2024-10-07T17:58:24.628138+020020494671A Network Trojan was detected192.168.2.449940185.208.158.24880TCP
        2024-10-07T17:58:25.446978+020020494671A Network Trojan was detected192.168.2.449946185.208.158.24880TCP
        2024-10-07T17:58:25.800856+020020494671A Network Trojan was detected192.168.2.449946185.208.158.24880TCP
        2024-10-07T17:58:26.967788+020020494671A Network Trojan was detected192.168.2.449955185.208.158.24880TCP
        2024-10-07T17:58:27.846476+020020494671A Network Trojan was detected192.168.2.449961185.208.158.24880TCP
        2024-10-07T17:58:28.657625+020020494671A Network Trojan was detected192.168.2.449967185.208.158.24880TCP
        2024-10-07T17:58:29.467755+020020494671A Network Trojan was detected192.168.2.449973185.208.158.24880TCP
        2024-10-07T17:58:30.293649+020020494671A Network Trojan was detected192.168.2.449979185.208.158.24880TCP
        2024-10-07T17:58:31.111451+020020494671A Network Trojan was detected192.168.2.449985185.208.158.24880TCP
        2024-10-07T17:58:31.894760+020020494671A Network Trojan was detected192.168.2.449991185.208.158.24880TCP
        2024-10-07T17:58:32.721947+020020494671A Network Trojan was detected192.168.2.449997185.208.158.24880TCP
        2024-10-07T17:58:33.607220+020020494671A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-07T17:58:33.950950+020020494671A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-07T17:58:34.299686+020020494671A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-07T17:58:35.574466+020020494671A Network Trojan was detected192.168.2.450012185.208.158.24880TCP
        2024-10-07T17:58:35.915205+020020494671A Network Trojan was detected192.168.2.450012185.208.158.24880TCP
        2024-10-07T17:58:36.265269+020020494671A Network Trojan was detected192.168.2.450012185.208.158.24880TCP
        2024-10-07T17:58:38.011847+020020494671A Network Trojan was detected192.168.2.450023185.208.158.24880TCP
        2024-10-07T17:58:38.452996+020020494671A Network Trojan was detected192.168.2.450023185.208.158.24880TCP
        2024-10-07T17:58:39.286239+020020494671A Network Trojan was detected192.168.2.450034185.208.158.24880TCP
        2024-10-07T17:58:40.260850+020020494671A Network Trojan was detected192.168.2.450040185.208.158.24880TCP
        2024-10-07T17:58:40.606161+020020494671A Network Trojan was detected192.168.2.450040185.208.158.24880TCP
        2024-10-07T17:58:40.962671+020020494671A Network Trojan was detected192.168.2.450040185.208.158.24880TCP
        2024-10-07T17:58:41.350317+020020494671A Network Trojan was detected192.168.2.450040185.208.158.24880TCP
        2024-10-07T17:58:42.155266+020020494671A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-07T17:58:42.494685+020020494671A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-07T17:58:42.836885+020020494671A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-07T17:58:43.189267+020020494671A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-07T17:58:43.976287+020020494671A Network Trojan was detected192.168.2.450049185.208.158.24880TCP
        2024-10-07T17:58:44.770835+020020494671A Network Trojan was detected192.168.2.450050185.208.158.24880TCP
        2024-10-07T17:58:45.621808+020020494671A Network Trojan was detected192.168.2.450051185.208.158.24880TCP
        2024-10-07T17:58:46.420108+020020494671A Network Trojan was detected192.168.2.450052185.208.158.24880TCP
        2024-10-07T17:58:47.339259+020020494671A Network Trojan was detected192.168.2.450053185.208.158.24880TCP
        2024-10-07T17:58:48.123195+020020494671A Network Trojan was detected192.168.2.450054185.208.158.24880TCP
        2024-10-07T17:58:48.463338+020020494671A Network Trojan was detected192.168.2.450054185.208.158.24880TCP
        2024-10-07T17:58:48.805829+020020494671A Network Trojan was detected192.168.2.450054185.208.158.24880TCP
        2024-10-07T17:58:49.683309+020020494671A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-07T17:58:50.025649+020020494671A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-07T17:58:50.375192+020020494671A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-07T17:58:51.200205+020020494671A Network Trojan was detected192.168.2.450056185.208.158.24880TCP
        2024-10-07T17:58:51.978153+020020494671A Network Trojan was detected192.168.2.450057185.208.158.24880TCP
        2024-10-07T17:58:52.810123+020020494671A Network Trojan was detected192.168.2.450058185.208.158.24880TCP
        2024-10-07T17:58:53.600730+020020494671A Network Trojan was detected192.168.2.450059185.208.158.24880TCP
        2024-10-07T17:58:54.407555+020020494671A Network Trojan was detected192.168.2.450060185.208.158.24880TCP
        2024-10-07T17:58:55.269630+020020494671A Network Trojan was detected192.168.2.450061185.208.158.24880TCP
        2024-10-07T17:58:56.070447+020020494671A Network Trojan was detected192.168.2.450062185.208.158.24880TCP
        2024-10-07T17:58:56.860282+020020494671A Network Trojan was detected192.168.2.450063185.208.158.24880TCP
        2024-10-07T17:58:57.677999+020020494671A Network Trojan was detected192.168.2.450064185.208.158.24880TCP
        2024-10-07T17:58:58.467221+020020494671A Network Trojan was detected192.168.2.450065185.208.158.24880TCP
        2024-10-07T17:58:59.281668+020020494671A Network Trojan was detected192.168.2.450066185.208.158.24880TCP
        2024-10-07T17:59:00.099937+020020494671A Network Trojan was detected192.168.2.450067185.208.158.24880TCP
        2024-10-07T17:59:00.951029+020020494671A Network Trojan was detected192.168.2.450068185.208.158.24880TCP
        2024-10-07T17:59:02.016629+020020494671A Network Trojan was detected192.168.2.450069185.208.158.24880TCP
        2024-10-07T17:59:02.819134+020020494671A Network Trojan was detected192.168.2.450070185.208.158.24880TCP
        2024-10-07T17:59:03.644311+020020494671A Network Trojan was detected192.168.2.450071185.208.158.24880TCP
        2024-10-07T17:59:04.607149+020020494671A Network Trojan was detected192.168.2.450072185.208.158.24880TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-07T17:57:54.168288+020020501121A Network Trojan was detected192.168.2.449736185.208.158.24880TCP
        2024-10-07T17:57:57.059701+020020501121A Network Trojan was detected192.168.2.449736185.208.158.24880TCP
        2024-10-07T17:57:57.866643+020020501121A Network Trojan was detected192.168.2.449745185.208.158.24880TCP
        2024-10-07T17:57:58.676031+020020501121A Network Trojan was detected192.168.2.449755185.208.158.24880TCP
        2024-10-07T17:57:59.511220+020020501121A Network Trojan was detected192.168.2.449763185.208.158.24880TCP
        2024-10-07T17:58:00.350791+020020501121A Network Trojan was detected192.168.2.449769185.208.158.24880TCP
        2024-10-07T17:58:01.211455+020020501121A Network Trojan was detected192.168.2.449775185.208.158.24880TCP
        2024-10-07T17:58:02.015244+020020501121A Network Trojan was detected192.168.2.449781185.208.158.24880TCP
        2024-10-07T17:58:02.810524+020020501121A Network Trojan was detected192.168.2.449787185.208.158.24880TCP
        2024-10-07T17:58:03.777824+020020501121A Network Trojan was detected192.168.2.449793185.208.158.24880TCP
        2024-10-07T17:58:04.127670+020020501121A Network Trojan was detected192.168.2.449793185.208.158.24880TCP
        2024-10-07T17:58:04.926313+020020501121A Network Trojan was detected192.168.2.449804185.208.158.24880TCP
        2024-10-07T17:58:05.738499+020020501121A Network Trojan was detected192.168.2.449805185.208.158.24880TCP
        2024-10-07T17:58:06.684546+020020501121A Network Trojan was detected192.168.2.449811185.208.158.24880TCP
        2024-10-07T17:58:07.528429+020020501121A Network Trojan was detected192.168.2.449817185.208.158.24880TCP
        2024-10-07T17:58:07.871872+020020501121A Network Trojan was detected192.168.2.449817185.208.158.24880TCP
        2024-10-07T17:58:08.221127+020020501121A Network Trojan was detected192.168.2.449817185.208.158.24880TCP
        2024-10-07T17:58:09.004532+020020501121A Network Trojan was detected192.168.2.449830185.208.158.24880TCP
        2024-10-07T17:58:09.814801+020020501121A Network Trojan was detected192.168.2.449836185.208.158.24880TCP
        2024-10-07T17:58:10.689558+020020501121A Network Trojan was detected192.168.2.449843185.208.158.24880TCP
        2024-10-07T17:58:11.622460+020020501121A Network Trojan was detected192.168.2.449850185.208.158.24880TCP
        2024-10-07T17:58:12.509052+020020501121A Network Trojan was detected192.168.2.449857185.208.158.24880TCP
        2024-10-07T17:58:12.854443+020020501121A Network Trojan was detected192.168.2.449857185.208.158.24880TCP
        2024-10-07T17:58:13.218819+020020501121A Network Trojan was detected192.168.2.449857185.208.158.24880TCP
        2024-10-07T17:58:14.007996+020020501121A Network Trojan was detected192.168.2.449868185.208.158.24880TCP
        2024-10-07T17:58:14.793048+020020501121A Network Trojan was detected192.168.2.449874185.208.158.24880TCP
        2024-10-07T17:58:15.144716+020020501121A Network Trojan was detected192.168.2.449874185.208.158.24880TCP
        2024-10-07T17:58:15.948392+020020501121A Network Trojan was detected192.168.2.449882185.208.158.24880TCP
        2024-10-07T17:58:16.952949+020020501121A Network Trojan was detected192.168.2.449888185.208.158.24880TCP
        2024-10-07T17:58:17.767364+020020501121A Network Trojan was detected192.168.2.449895185.208.158.24880TCP
        2024-10-07T17:58:18.559131+020020501121A Network Trojan was detected192.168.2.449903185.208.158.24880TCP
        2024-10-07T17:58:19.467071+020020501121A Network Trojan was detected192.168.2.449909185.208.158.24880TCP
        2024-10-07T17:58:20.384383+020020501121A Network Trojan was detected192.168.2.449915185.208.158.24880TCP
        2024-10-07T17:58:20.728693+020020501121A Network Trojan was detected192.168.2.449915185.208.158.24880TCP
        2024-10-07T17:58:21.102429+020020501121A Network Trojan was detected192.168.2.449915185.208.158.24880TCP
        2024-10-07T17:58:22.161542+020020501121A Network Trojan was detected192.168.2.449923185.208.158.24880TCP
        2024-10-07T17:58:22.944523+020020501121A Network Trojan was detected192.168.2.449932185.208.158.24880TCP
        2024-10-07T17:58:23.803296+020020501121A Network Trojan was detected192.168.2.449937185.208.158.24880TCP
        2024-10-07T17:58:24.628138+020020501121A Network Trojan was detected192.168.2.449940185.208.158.24880TCP
        2024-10-07T17:58:25.446978+020020501121A Network Trojan was detected192.168.2.449946185.208.158.24880TCP
        2024-10-07T17:58:25.800856+020020501121A Network Trojan was detected192.168.2.449946185.208.158.24880TCP
        2024-10-07T17:58:26.967788+020020501121A Network Trojan was detected192.168.2.449955185.208.158.24880TCP
        2024-10-07T17:58:27.846476+020020501121A Network Trojan was detected192.168.2.449961185.208.158.24880TCP
        2024-10-07T17:58:28.657625+020020501121A Network Trojan was detected192.168.2.449967185.208.158.24880TCP
        2024-10-07T17:58:29.467755+020020501121A Network Trojan was detected192.168.2.449973185.208.158.24880TCP
        2024-10-07T17:58:30.293649+020020501121A Network Trojan was detected192.168.2.449979185.208.158.24880TCP
        2024-10-07T17:58:31.111451+020020501121A Network Trojan was detected192.168.2.449985185.208.158.24880TCP
        2024-10-07T17:58:31.894760+020020501121A Network Trojan was detected192.168.2.449991185.208.158.24880TCP
        2024-10-07T17:58:32.721947+020020501121A Network Trojan was detected192.168.2.449997185.208.158.24880TCP
        2024-10-07T17:58:33.607220+020020501121A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-07T17:58:33.950950+020020501121A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-07T17:58:34.299686+020020501121A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-07T17:58:35.574466+020020501121A Network Trojan was detected192.168.2.450012185.208.158.24880TCP
        2024-10-07T17:58:35.915205+020020501121A Network Trojan was detected192.168.2.450012185.208.158.24880TCP
        2024-10-07T17:58:36.265269+020020501121A Network Trojan was detected192.168.2.450012185.208.158.24880TCP
        2024-10-07T17:58:38.011847+020020501121A Network Trojan was detected192.168.2.450023185.208.158.24880TCP
        2024-10-07T17:58:38.452996+020020501121A Network Trojan was detected192.168.2.450023185.208.158.24880TCP
        2024-10-07T17:58:39.286239+020020501121A Network Trojan was detected192.168.2.450034185.208.158.24880TCP
        2024-10-07T17:58:40.260850+020020501121A Network Trojan was detected192.168.2.450040185.208.158.24880TCP
        2024-10-07T17:58:40.606161+020020501121A Network Trojan was detected192.168.2.450040185.208.158.24880TCP
        2024-10-07T17:58:40.962671+020020501121A Network Trojan was detected192.168.2.450040185.208.158.24880TCP
        2024-10-07T17:58:41.350317+020020501121A Network Trojan was detected192.168.2.450040185.208.158.24880TCP
        2024-10-07T17:58:42.155266+020020501121A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-07T17:58:42.494685+020020501121A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-07T17:58:42.836885+020020501121A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-07T17:58:43.189267+020020501121A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-07T17:58:43.976287+020020501121A Network Trojan was detected192.168.2.450049185.208.158.24880TCP
        2024-10-07T17:58:44.770835+020020501121A Network Trojan was detected192.168.2.450050185.208.158.24880TCP
        2024-10-07T17:58:45.621808+020020501121A Network Trojan was detected192.168.2.450051185.208.158.24880TCP
        2024-10-07T17:58:46.420108+020020501121A Network Trojan was detected192.168.2.450052185.208.158.24880TCP
        2024-10-07T17:58:47.339259+020020501121A Network Trojan was detected192.168.2.450053185.208.158.24880TCP
        2024-10-07T17:58:48.123195+020020501121A Network Trojan was detected192.168.2.450054185.208.158.24880TCP
        2024-10-07T17:58:48.463338+020020501121A Network Trojan was detected192.168.2.450054185.208.158.24880TCP
        2024-10-07T17:58:48.805829+020020501121A Network Trojan was detected192.168.2.450054185.208.158.24880TCP
        2024-10-07T17:58:49.683309+020020501121A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-07T17:58:50.025649+020020501121A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-07T17:58:50.375192+020020501121A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-07T17:58:51.200205+020020501121A Network Trojan was detected192.168.2.450056185.208.158.24880TCP
        2024-10-07T17:58:51.978153+020020501121A Network Trojan was detected192.168.2.450057185.208.158.24880TCP
        2024-10-07T17:58:52.810123+020020501121A Network Trojan was detected192.168.2.450058185.208.158.24880TCP
        2024-10-07T17:58:53.600730+020020501121A Network Trojan was detected192.168.2.450059185.208.158.24880TCP
        2024-10-07T17:58:54.407555+020020501121A Network Trojan was detected192.168.2.450060185.208.158.24880TCP
        2024-10-07T17:58:55.269630+020020501121A Network Trojan was detected192.168.2.450061185.208.158.24880TCP
        2024-10-07T17:58:56.070447+020020501121A Network Trojan was detected192.168.2.450062185.208.158.24880TCP
        2024-10-07T17:58:56.860282+020020501121A Network Trojan was detected192.168.2.450063185.208.158.24880TCP
        2024-10-07T17:58:57.677999+020020501121A Network Trojan was detected192.168.2.450064185.208.158.24880TCP
        2024-10-07T17:58:58.467221+020020501121A Network Trojan was detected192.168.2.450065185.208.158.24880TCP
        2024-10-07T17:58:59.281668+020020501121A Network Trojan was detected192.168.2.450066185.208.158.24880TCP
        2024-10-07T17:59:00.099937+020020501121A Network Trojan was detected192.168.2.450067185.208.158.24880TCP
        2024-10-07T17:59:00.951029+020020501121A Network Trojan was detected192.168.2.450068185.208.158.24880TCP
        2024-10-07T17:59:02.016629+020020501121A Network Trojan was detected192.168.2.450069185.208.158.24880TCP
        2024-10-07T17:59:02.819134+020020501121A Network Trojan was detected192.168.2.450070185.208.158.24880TCP
        2024-10-07T17:59:03.644311+020020501121A Network Trojan was detected192.168.2.450071185.208.158.24880TCP
        2024-10-07T17:59:04.607149+020020501121A Network Trojan was detected192.168.2.450072185.208.158.24880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeAvira: detection malicious, Label: HEUR/AGEN.1329998
        Source: C:\ProgramData\ET Ammeter Side 10.7.45\ET Ammeter Side 10.7.45.exeAvira: detection malicious, Label: HEUR/AGEN.1329998
        Source: jennyvideoconverter32.exe.5472.2.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["aqplodo.ru"]}
        Source: etwSnBeIC2.exeReversingLabs: Detection: 21%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeJoe Sandbox ML: detected
        Source: C:\ProgramData\ET Ammeter Side 10.7.45\ET Ammeter Side 10.7.45.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0045D4EC GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D4EC
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0045D5A0 ArcFourCrypt,1_2_0045D5A0
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0045D5B8 ArcFourCrypt,1_2_0045D5B8
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeUnpacked PE file: 2.2.jennyvideoconverter32.exe.400000.0.unpack
        Source: etwSnBeIC2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00452A4C FindFirstFileA,GetLastError,1_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,1_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00497A74

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49736 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49736 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49745 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49763 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49745 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49763 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49769 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49769 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49775 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49775 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49781 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49781 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49755 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49755 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49787 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49787 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49805 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49805 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49793 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49793 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49804 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49804 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49811 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49811 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49817 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49817 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49830 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49830 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49836 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49836 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49843 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49843 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49850 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49850 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49857 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49857 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49868 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49868 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49882 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49882 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49874 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49874 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49888 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49888 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49895 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49895 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49903 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49903 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49909 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49909 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49915 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49915 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49923 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49923 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49932 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49932 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49940 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49940 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49937 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49937 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49946 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49946 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49955 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49955 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49961 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49961 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49973 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49973 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49967 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49967 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49979 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49979 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49985 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49985 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50002 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50002 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49991 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50012 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50012 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49991 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49997 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49997 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50023 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50023 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50034 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50034 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50048 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50048 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50040 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50040 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50052 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50051 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50053 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50051 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50053 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50052 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50057 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50061 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50061 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50057 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50063 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50062 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50062 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50068 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50068 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50056 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50056 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50054 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50054 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50066 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50050 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50066 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50055 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50055 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50064 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50065 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50050 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50065 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50064 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50071 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50071 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50059 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50059 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50060 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50063 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50060 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50072 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50072 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50067 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50069 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50049 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50069 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50049 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50067 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50058 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50058 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50070 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50070 -> 185.208.158.248:80
        Source: Malware configuration extractorURLs: aqplodo.ru
        Source: global trafficTCP traffic: 192.168.2.4:49738 -> 89.105.201.183:2023
        Source: Joe Sandbox ViewIP Address: 185.208.158.248 185.208.158.248
        Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c1e9939d32 HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownUDP traffic detected without corresponding DNS query: 141.98.234.31
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D372AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_free,2_2_02D372AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c1e9939d32 HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1Host: aqplodo.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: aqplodo.ru
        Source: jennyvideoconverter32.exe, 00000002.00000002.2939962100.0000000003634000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000002.00000002.2939103811.0000000000B56000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000002.00000002.2940019556.00000000036C0000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000002.00000002.2940122726.00000000037C7000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000002.00000002.2939103811.0000000000B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee948
        Source: jennyvideoconverter32.exe, 00000002.00000002.2939103811.0000000000B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: jennyvideoconverter32.exe, 00000002.00000002.2939103811.0000000000B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.1c8
        Source: etwSnBeIC2.exe, 00000000.00000003.1674445346.0000000002320000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.exe, 00000000.00000002.2938929789.0000000002088000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1679799123.0000000000680000.00000004.00000020.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1676732032.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000002.2939308102.0000000002258000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000002.2939046246.0000000000680000.00000004.00000020.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1676844695.0000000002260000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://fsf.org/
        Source: is-R08OU.tmp.1.drString found in binary or memory: http://mingw-w64.sourceforge.net/X
        Source: is-8RAC0.tmp.1.drString found in binary or memory: http://tukaani.org/
        Source: is-8RAC0.tmp.1.drString found in binary or memory: http://tukaani.org/xz/
        Source: etwSnBeIC2.exe, 00000000.00000003.1674445346.0000000002320000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.exe, 00000000.00000002.2938929789.0000000002088000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1679799123.0000000000680000.00000004.00000020.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1676732032.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000002.2939308102.0000000002258000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000002.2939046246.0000000000680000.00000004.00000020.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1676844695.0000000002260000.00000004.00001000.00020000.00000000.sdmp, is-JJ6AT.tmp.1.drString found in binary or memory: http://www.gnu.org/licenses/
        Source: etwSnBeIC2.tmp, etwSnBeIC2.tmp, 00000001.00000000.1676013101.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-CMV2A.tmp.1.dr, etwSnBeIC2.tmp.0.drString found in binary or memory: http://www.innosetup.com/
        Source: etwSnBeIC2.exe, 00000000.00000003.1675402617.0000000002320000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.exe, 00000000.00000003.1675588675.0000000002094000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, etwSnBeIC2.tmp, 00000001.00000000.1676013101.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-CMV2A.tmp.1.dr, etwSnBeIC2.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
        Source: etwSnBeIC2.exe, 00000000.00000003.1675402617.0000000002320000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.exe, 00000000.00000003.1675588675.0000000002094000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000000.1676013101.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-CMV2A.tmp.1.dr, etwSnBeIC2.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU

        System Summary

        barindex
        Source: jennyvideoconverter32.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: ET Ammeter Side 10.7.45.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0042F530 NtdllDefWindowProc_A,1_2_0042F530
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004789DC NtdllDefWindowProc_A,1_2_004789DC
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004573CC PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_004573CC
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E944
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555D0
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004804C61_2_004804C6
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004709501_2_00470950
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004352D81_2_004352D8
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004677101_2_00467710
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0043036C1_2_0043036C
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004444D81_2_004444D8
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004345D41_2_004345D4
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004866041_2_00486604
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00444A801_2_00444A80
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00430EF81_2_00430EF8
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004451781_2_00445178
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0045F4301_2_0045F430
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0045B4D81_2_0045B4D8
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004875641_2_00487564
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004455841_2_00445584
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004697701_2_00469770
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0048D8C41_2_0048D8C4
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004519A81_2_004519A8
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0043DD601_2_0043DD60
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_004010512_2_00401051
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_00401C262_2_00401C26
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D4E18D2_2_02D4E18D
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D49E842_2_02D49E84
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D54E292_2_02D54E29
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D3EFAD2_2_02D3EFAD
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D4DC992_2_02D4DC99
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D484422_2_02D48442
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D4AC3A2_2_02D4AC3A
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D52DB42_2_02D52DB4
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D4E5A52_2_02D4E5A5
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D6E0022_2_02D6E002
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D6B4E52_2_02D6B4E5
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D6BCEB2_2_02D6BCEB
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D6BD582_2_02D6BD58
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Jenny Video Converter\is-17BMK.tmp A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 00405964 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 00408C14 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 00406ACC appears 41 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 00403400 appears 61 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 00445DE4 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 004078FC appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 004344EC appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 00403494 appears 82 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 00457D58 appears 73 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 00453330 appears 93 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 00457B4C appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 00403684 appears 221 times
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: String function: 004460B4 appears 59 times
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: String function: 02D48AE0 appears 37 times
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: String function: 02D55330 appears 139 times
        Source: etwSnBeIC2.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: etwSnBeIC2.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: etwSnBeIC2.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: etwSnBeIC2.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: etwSnBeIC2.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-CMV2A.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-CMV2A.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: is-CMV2A.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-CMV2A.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-NESP7.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-8RAC0.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-QAKC5.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-8F8OG.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-3MH90.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-M5TJM.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-R08OU.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-4IH98.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-2DHLG.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-6ES77.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-JJ6AT.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: etwSnBeIC2.exe, 00000000.00000003.1675402617.0000000002320000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs etwSnBeIC2.exe
        Source: etwSnBeIC2.exe, 00000000.00000003.1675588675.0000000002094000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs etwSnBeIC2.exe
        Source: etwSnBeIC2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/69@1/2
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D408B8 FormatMessageA,GetLastError,2_2_02D408B8
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555D0
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00455DF8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455DF8
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: CreateServiceA,2_2_004027A0
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0046E38C GetVersion,CoCreateInstance,1_2_0046E38C
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_00409BEC FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409BEC
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_004027BE StartServiceCtrlDispatcherA,2_2_004027BE
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_004027BE StartServiceCtrlDispatcherA,2_2_004027BE
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video ConverterJump to behavior
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeFile created: C:\Users\user\AppData\Local\Temp\is-MF78U.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: etwSnBeIC2.exeReversingLabs: Detection: 21%
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeFile read: C:\Users\user\Desktop\etwSnBeIC2.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\etwSnBeIC2.exe "C:\Users\user\Desktop\etwSnBeIC2.exe"
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeProcess created: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp "C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp" /SL5="$2042C,4242250,54272,C:\Users\user\Desktop\etwSnBeIC2.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess created: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe "C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeProcess created: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp "C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp" /SL5="$2042C,4242250,54272,C:\Users\user\Desktop\etwSnBeIC2.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess created: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe "C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: dsound.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1Jump to behavior
        Source: etwSnBeIC2.exeStatic file information: File size 4523554 > 1048576

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeUnpacked PE file: 2.2.jennyvideoconverter32.exe.400000.0.unpack .text:EW;.rdata:R;_cde_3:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeUnpacked PE file: 2.2.jennyvideoconverter32.exe.400000.0.unpack
        Source: is-FLG21.tmp.1.drStatic PE information: 0x8C00008C [Mon Jun 6 07:19:40 2044 UTC]
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502AC
        Source: jennyvideoconverter32.exe.1.drStatic PE information: section name: _cde_3
        Source: is-9O8U2.tmp.1.drStatic PE information: section name: /4
        Source: is-4IH98.tmp.1.drStatic PE information: section name: /4
        Source: is-2DHLG.tmp.1.drStatic PE information: section name: /4
        Source: is-T7CO0.tmp.1.drStatic PE information: section name: /4
        Source: is-HJPUM.tmp.1.drStatic PE information: section name: /4
        Source: is-3C13B.tmp.1.drStatic PE information: section name: /4
        Source: is-JJ6AT.tmp.1.drStatic PE information: section name: /4
        Source: is-FLG21.tmp.1.drStatic PE information: section name: /4
        Source: is-7IMBQ.tmp.1.drStatic PE information: section name: /4
        Source: is-8RAC0.tmp.1.drStatic PE information: section name: /4
        Source: is-8IPC7.tmp.1.drStatic PE information: section name: /4
        Source: is-3MH90.tmp.1.drStatic PE information: section name: /4
        Source: is-DNMH8.tmp.1.drStatic PE information: section name: /4
        Source: is-M5TJM.tmp.1.drStatic PE information: section name: /4
        Source: is-NESP7.tmp.1.drStatic PE information: section name: /4
        Source: is-8F8OG.tmp.1.drStatic PE information: section name: /4
        Source: is-6ES77.tmp.1.drStatic PE information: section name: /4
        Source: is-MRRC0.tmp.1.drStatic PE information: section name: /4
        Source: is-QAKC5.tmp.1.drStatic PE information: section name: /4
        Source: is-CABM6.tmp.1.drStatic PE information: section name: /4
        Source: is-17BMK.tmp.1.drStatic PE information: section name: /4
        Source: is-E6D02.tmp.1.drStatic PE information: section name: /4
        Source: is-1N1JF.tmp.1.drStatic PE information: section name: /4
        Source: is-N1N9Q.tmp.1.drStatic PE information: section name: /4
        Source: is-S9L3Q.tmp.1.drStatic PE information: section name: /4
        Source: is-R08OU.tmp.1.drStatic PE information: section name: /4
        Source: is-GNC2U.tmp.1.drStatic PE information: section name: /4
        Source: ET Ammeter Side 10.7.45.exe.2.drStatic PE information: section name: _cde_3
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_004065B8 push 004065F5h; ret 0_2_004065ED
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00409954 push 00409991h; ret 1_2_00409989
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0040A04F push ds; ret 1_2_0040A050
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0040A023 push ds; ret 1_2_0040A04D
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00460088 push ecx; mov dword ptr [esp], ecx1_2_0046008C
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004062CC push ecx; mov dword ptr [esp], eax1_2_004062CD
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0049467C push ecx; mov dword ptr [esp], ecx1_2_00494681
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004106E0 push ecx; mov dword ptr [esp], edx1_2_004106E5
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0040D038 push ecx; mov dword ptr [esp], edx1_2_0040D03A
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004850AC push ecx; mov dword ptr [esp], ecx1_2_004850B1
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00443450 push ecx; mov dword ptr [esp], ecx1_2_00443454
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0040F598 push ecx; mov dword ptr [esp], edx1_2_0040F59A
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00459634 push 00459678h; ret 1_2_00459670
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004517E4 push 00451817h; ret 1_2_0045180F
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004519A8 push ecx; mov dword ptr [esp], eax1_2_004519AD
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00483A08 push 00483AF7h; ret 1_2_00483AEF
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00477A24 push ecx; mov dword ptr [esp], edx1_2_00477A25

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02D3F7D6
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-DNMH8.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-JJ6AT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-QAKC5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-8F8OG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-NESP7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-17BMK.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-M5TJM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-E6D02.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-N1N9Q.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-FLG21.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeFile created: C:\ProgramData\ET Ammeter Side 10.7.45\ET Ammeter Side 10.7.45.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-9O8U2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-3MH90.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-3C13B.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-R08OU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-2DHLG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-HJPUM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-1N1JF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-8IPC7.tmpJump to dropped file
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeFile created: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-T7CO0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-4IH98.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-7IMBQ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-MRRC0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-CMV2A.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-S9L3Q.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-6ES77.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-CABM6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-8RAC0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpFile created: C:\Users\user\AppData\Local\Jenny Video Converter\is-GNC2U.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeFile created: C:\ProgramData\ET Ammeter Side 10.7.45\ET Ammeter Side 10.7.45.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02D3F7D6
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_004027BE StartServiceCtrlDispatcherA,2_2_004027BE
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004833BC IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_004833BC
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F128
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_00401B4B
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_02D3F8DA
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeWindow / User API: threadDelayed 9717Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-DNMH8.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-JJ6AT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-QAKC5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-8F8OG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-NESP7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-17BMK.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-M5TJM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-E6D02.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-N1N9Q.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-FLG21.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-9O8U2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-3MH90.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-3C13B.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-R08OU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-2DHLG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-HJPUM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-1N1JF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-8IPC7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-T7CO0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-7IMBQ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-4IH98.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-MRRC0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-CMV2A.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-S9L3Q.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-6ES77.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-CABM6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-8RAC0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-GNC2U.tmpJump to dropped file
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5698
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-18001
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 5012Thread sleep count: 131 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 5012Thread sleep time: -262000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 5796Thread sleep count: 71 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 5796Thread sleep time: -4260000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 5012Thread sleep count: 9717 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 5012Thread sleep time: -19434000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00452A4C FindFirstFileA,GetLastError,1_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,1_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00497A74
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_00409B30 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B30
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeThread delayed: delay time: 60000Jump to behavior
        Source: jennyvideoconverter32.exe, 00000002.00000002.2939103811.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
        Source: jennyvideoconverter32.exe, 00000002.00000002.2939103811.0000000000B92000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeAPI call chain: ExitProcess graph end nodegraph_0-6738
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeAPI call chain: ExitProcess graph end nodegraph_2-18003
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeAPI call chain: ExitProcess graph end nodegraph_2-18565
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D500FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02D500FE
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D500FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02D500FE
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502AC
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D3648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_02D3648B
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D49468 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02D49468
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00478420 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478420
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E0AC
        Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exeCode function: 2_2_02D3F78E cpuid 2_2_02D3F78E
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: GetLocaleInfoA,0_2_004051FC
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: GetLocaleInfoA,0_2_00405248
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: GetLocaleInfoA,1_2_00408570
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: GetLocaleInfoA,1_2_004085BC
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_0045892C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_0045892C
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmpCode function: 1_2_00455588 GetUserNameA,1_2_00455588
        Source: C:\Users\user\Desktop\etwSnBeIC2.exeCode function: 0_2_00405CE4 GetVersionExA,0_2_00405CE4

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2939637806.0000000002C83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: jennyvideoconverter32.exe PID: 5472, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2939637806.0000000002C83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: jennyvideoconverter32.exe PID: 5472, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Service Execution
        5
        Windows Service
        1
        DLL Side-Loading
        2
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt1
        Bootkit
        1
        Access Token Manipulation
        21
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook5
        Windows Service
        1
        Timestomp
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        DLL Side-Loading
        LSA Secrets41
        Security Software Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
        Virtualization/Sandbox Evasion
        DCSync21
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Access Token Manipulation
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
        Process Injection
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
        Bootkit
        Network Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        etwSnBeIC2.exe21%ReversingLabsWin32.Trojan.Munp
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe100%AviraHEUR/AGEN.1329998
        C:\ProgramData\ET Ammeter Side 10.7.45\ET Ammeter Side 10.7.45.exe100%AviraHEUR/AGEN.1329998
        C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe100%Joe Sandbox ML
        C:\ProgramData\ET Ammeter Side 10.7.45\ET Ammeter Side 10.7.45.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Jenny Video Converter\is-17BMK.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-1N1JF.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-2DHLG.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-3C13B.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-3MH90.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-4IH98.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-6ES77.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-7IMBQ.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-8F8OG.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-8IPC7.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-8RAC0.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-9O8U2.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-CABM6.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-DNMH8.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-E6D02.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-FLG21.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-GNC2U.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-HJPUM.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-JJ6AT.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-M5TJM.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-MRRC0.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-N1N9Q.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-NESP7.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-QAKC5.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-R08OU.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-S9L3Q.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\is-T7CO0.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_shfoldr.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.innosetup.com/0%URL Reputationsafe
        http://www.remobjects.com/psU0%URL Reputationsafe
        http://www.remobjects.com/ps0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        aqplodo.ru
        185.208.158.248
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          aqplodo.rutrue
            unknown
            http://aqplodo.ru/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911ftrue
              unknown
              http://aqplodo.ru/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c1e9939d32true
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.innosetup.com/etwSnBeIC2.tmp, etwSnBeIC2.tmp, 00000001.00000000.1676013101.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-CMV2A.tmp.1.dr, etwSnBeIC2.tmp.0.drfalse
                • URL Reputation: safe
                unknown
                http://185.208.1c8jennyvideoconverter32.exe, 00000002.00000002.2939103811.0000000000B78000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://tukaani.org/is-8RAC0.tmp.1.drfalse
                    unknown
                    http://www.remobjects.com/psUetwSnBeIC2.exe, 00000000.00000003.1675402617.0000000002320000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.exe, 00000000.00000003.1675588675.0000000002094000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000000.1676013101.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-CMV2A.tmp.1.dr, etwSnBeIC2.tmp.0.drfalse
                    • URL Reputation: safe
                    unknown
                    http://tukaani.org/xz/is-8RAC0.tmp.1.drfalse
                      unknown
                      http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82djennyvideoconverter32.exe, 00000002.00000002.2939103811.0000000000B78000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://mingw-w64.sourceforge.net/Xis-R08OU.tmp.1.drfalse
                          unknown
                          http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee948jennyvideoconverter32.exe, 00000002.00000002.2939962100.0000000003634000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000002.00000002.2939103811.0000000000B56000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000002.00000002.2940019556.00000000036C0000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000002.00000002.2940122726.00000000037C7000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000002.00000002.2939103811.0000000000B78000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://www.remobjects.com/psetwSnBeIC2.exe, 00000000.00000003.1675402617.0000000002320000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.exe, 00000000.00000003.1675588675.0000000002094000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, etwSnBeIC2.tmp, 00000001.00000000.1676013101.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-CMV2A.tmp.1.dr, etwSnBeIC2.tmp.0.drfalse
                            • URL Reputation: safe
                            unknown
                            http://fsf.org/etwSnBeIC2.exe, 00000000.00000003.1674445346.0000000002320000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.exe, 00000000.00000002.2938929789.0000000002088000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1679799123.0000000000680000.00000004.00000020.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1676732032.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000002.2939308102.0000000002258000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000002.2939046246.0000000000680000.00000004.00000020.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1676844695.0000000002260000.00000004.00001000.00020000.00000000.sdmpfalse
                              unknown
                              http://www.gnu.org/licenses/etwSnBeIC2.exe, 00000000.00000003.1674445346.0000000002320000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.exe, 00000000.00000002.2938929789.0000000002088000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1679799123.0000000000680000.00000004.00000020.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1676732032.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000002.2939308102.0000000002258000.00000004.00001000.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000002.2939046246.0000000000680000.00000004.00000020.00020000.00000000.sdmp, etwSnBeIC2.tmp, 00000001.00000003.1676844695.0000000002260000.00000004.00001000.00020000.00000000.sdmp, is-JJ6AT.tmp.1.drfalse
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                185.208.158.248
                                aqplodo.ruSwitzerland
                                34888SIMPLECARRER2ITtrue
                                89.105.201.183
                                unknownNetherlands
                                24875NOVOSERVE-ASNLfalse
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1528260
                                Start date and time:2024-10-07 17:56:06 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 6m 19s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:7
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:etwSnBeIC2.exe
                                renamed because original name is a hash value
                                Original Sample Name:179d076b3fa5c27a6ab53e7113363290.exe
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@5/69@1/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 91%
                                • Number of executed functions: 191
                                • Number of non-executed functions: 249
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: etwSnBeIC2.exe
                                TimeTypeDescription
                                11:57:33API Interceptor530840x Sleep call for process: jennyvideoconverter32.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                185.208.158.248ZFllSoXpoT.exeGet hashmaliciousSocks5SystemzBrowse
                                  OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                    Ui6sm6N5JG.exeGet hashmaliciousSocks5SystemzBrowse
                                      ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                        AyiNxJ98mL.exeGet hashmaliciousSocks5SystemzBrowse
                                          0IQmaTXO62.exeGet hashmaliciousSocks5SystemzBrowse
                                            2d3on76vhf.exeGet hashmaliciousSocks5SystemzBrowse
                                              Dw0MqzrLWq.exeGet hashmaliciousSocks5SystemzBrowse
                                                noode.exeGet hashmaliciousSocks5SystemzBrowse
                                                  eCh9R4T214.exeGet hashmaliciousSocks5SystemzBrowse
                                                    89.105.201.183cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 200
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    NOVOSERVE-ASNLjyU2NpOg5L.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 89.105.201.183
                                                    ZFllSoXpoT.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 89.105.201.183
                                                    OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 89.105.201.183
                                                    ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 89.105.201.183
                                                    SQE6u2kmJL.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 89.105.201.183
                                                    sl9B1ty1iL.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 89.105.201.183
                                                    okkWFXQP0G.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 89.105.201.183
                                                    xW98tuRe0i.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 89.105.201.183
                                                    AyiNxJ98mL.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 89.105.201.183
                                                    pTQN2MIbjQ.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 89.105.201.183
                                                    SIMPLECARRER2ITjyU2NpOg5L.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 185.196.8.214
                                                    ZFllSoXpoT.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 185.208.158.248
                                                    fHeDaDg5FQ.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 185.196.8.214
                                                    OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 185.208.158.248
                                                    Ui6sm6N5JG.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 185.208.158.248
                                                    ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 185.208.158.248
                                                    SQE6u2kmJL.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 185.196.8.214
                                                    sl9B1ty1iL.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 185.196.8.214
                                                    okkWFXQP0G.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 185.196.8.214
                                                    xW98tuRe0i.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 185.196.8.214
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    C:\Users\user\AppData\Local\Jenny Video Converter\is-17BMK.tmpjyU2NpOg5L.exeGet hashmaliciousSocks5SystemzBrowse
                                                      ZFllSoXpoT.exeGet hashmaliciousSocks5SystemzBrowse
                                                        fHeDaDg5FQ.exeGet hashmaliciousSocks5SystemzBrowse
                                                          OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                                            Ui6sm6N5JG.exeGet hashmaliciousSocks5SystemzBrowse
                                                              ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                                                SQE6u2kmJL.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  sl9B1ty1iL.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    okkWFXQP0G.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      xW98tuRe0i.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        Process:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):3350528
                                                                        Entropy (8bit):6.833281566054271
                                                                        Encrypted:false
                                                                        SSDEEP:49152:1P2vi4Uvo9GnB3o7+YkUKcR70IEWEMlBietXJVKQ28g/:QOo9Kto7TkUKknEHY9tXL28g
                                                                        MD5:FBEE756977ABC585C336AD6E5BFB1E9F
                                                                        SHA1:0602DD15DFEE4B9E5AA1060FFC7AF50E24DFDD95
                                                                        SHA-256:125E58D7C9DC4ED375BA06B3D6663B9C07A3ADF3EF3EB6E5433216478435C857
                                                                        SHA-512:DD71025F6CF85B8D99783BC29D66CBAAEC1F151EE9FB5982F67F9F2F64949F8A7343B515C38BDD74A88294E4423D2BEC0B23A42D25479DE2DBB84344976EA3A8
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Avira, Detection: 100%
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        Reputation:low
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L......L.................."..........y"......."...@...........................3......(3.....................................<.".......#...............................................................................".`............................text.....".......".................`....rdata...(...."..*....".............@..@_cde_3..8.....#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):8
                                                                        Entropy (8bit):2.0
                                                                        Encrypted:false
                                                                        SSDEEP:3:gl/:g/
                                                                        MD5:F568BDD334852B3FD2DE0A15EF95E47E
                                                                        SHA1:058BBBE2B72AABF4DDE133AFEEC0FE4BC7409D41
                                                                        SHA-256:2AAFD85112A19380594D1D4DF4F5E8704D1899063E252E88D5B5B63052C49182
                                                                        SHA-512:A3ADBD1033A2DF29FAB668922CD9F9452D061F9EC479C11D526C30C02E48F310283F86F90BEE6EB0AC9BDA63FEDCB9F1CD6319CED4B0744B4D54E53A2A6E7385
                                                                        Malicious:false
                                                                        Reputation:low
                                                                        Preview:...g....
                                                                        Process:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):4
                                                                        Entropy (8bit):0.8112781244591328
                                                                        Encrypted:false
                                                                        SSDEEP:3:q:q
                                                                        MD5:14CB44A8EE0BB0AA43F9C59CEDBEFA31
                                                                        SHA1:E5132D2015F3F9DBB4EC2449BAC2514B9FE5FFE8
                                                                        SHA-256:2EA111B9F81F7210FEFEA434E9A0BA054543754D83CE8368156138F22EB36134
                                                                        SHA-512:3DC09D5FAFA204053F2D2B7F6D6008B614A08EBD5D8488E948906B9CC7620773F661D899B8C8D94022CEF6C6599D80457A3F6E2317DEC6E18A9ED579C23BA6E9
                                                                        Malicious:false
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview:[...
                                                                        Process:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):128
                                                                        Entropy (8bit):2.9545817380615236
                                                                        Encrypted:false
                                                                        SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                                        MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                                        SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                                        SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                                        SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                                        Malicious:false
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                                        Process:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):128
                                                                        Entropy (8bit):1.7095628900165245
                                                                        Encrypted:false
                                                                        SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                                        MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                                        SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                                        SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                                        SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                                        Malicious:false
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):706136
                                                                        Entropy (8bit):6.517672165992715
                                                                        Encrypted:false
                                                                        SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                                        MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                                        SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                                        SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                                        SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Joe Sandbox View:
                                                                        • Filename: jyU2NpOg5L.exe, Detection: malicious, Browse
                                                                        • Filename: ZFllSoXpoT.exe, Detection: malicious, Browse
                                                                        • Filename: fHeDaDg5FQ.exe, Detection: malicious, Browse
                                                                        • Filename: OTC71Ny3Ta.exe, Detection: malicious, Browse
                                                                        • Filename: Ui6sm6N5JG.exe, Detection: malicious, Browse
                                                                        • Filename: ITJ8wVQL5s.exe, Detection: malicious, Browse
                                                                        • Filename: SQE6u2kmJL.exe, Detection: malicious, Browse
                                                                        • Filename: sl9B1ty1iL.exe, Detection: malicious, Browse
                                                                        • Filename: okkWFXQP0G.exe, Detection: malicious, Browse
                                                                        • Filename: xW98tuRe0i.exe, Detection: malicious, Browse
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):248694
                                                                        Entropy (8bit):6.346971642353424
                                                                        Encrypted:false
                                                                        SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                                        MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                                        SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                                        SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                                        SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):337171
                                                                        Entropy (8bit):6.46334441651647
                                                                        Encrypted:false
                                                                        SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                                        MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                                        SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                                        SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                                        SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):441975
                                                                        Entropy (8bit):6.372283713065844
                                                                        Encrypted:false
                                                                        SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                                        MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                                        SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                                        SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                                        SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):814068
                                                                        Entropy (8bit):6.5113626552096
                                                                        Encrypted:false
                                                                        SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                                        MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                                        SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                                        SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                                        SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):26562
                                                                        Entropy (8bit):5.606958768500933
                                                                        Encrypted:false
                                                                        SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                                        MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                                        SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                                        SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                                        SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):92019
                                                                        Entropy (8bit):5.974787373427489
                                                                        Encrypted:false
                                                                        SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                                        MD5:CC7DAD980DD04E0387795741D809CBF7
                                                                        SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                                        SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                                        SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):397808
                                                                        Entropy (8bit):6.396146399966879
                                                                        Encrypted:false
                                                                        SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                                        MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                                        SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                                        SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                                        SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 2%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):64724
                                                                        Entropy (8bit):5.910307743399971
                                                                        Encrypted:false
                                                                        SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                                        MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                                        SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                                        SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                                        SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):121524
                                                                        Entropy (8bit):6.347995296737745
                                                                        Encrypted:false
                                                                        SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                                        MD5:6CE25FB0302F133CC244889C360A6541
                                                                        SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                                        SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                                        SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):171848
                                                                        Entropy (8bit):6.579154579239999
                                                                        Encrypted:false
                                                                        SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                                        MD5:236A679AB1B16E66625AFBA86A4669EB
                                                                        SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                                        SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                                        SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):463112
                                                                        Entropy (8bit):6.363613724826455
                                                                        Encrypted:false
                                                                        SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                                        MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                                        SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                                        SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                                        SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):291245
                                                                        Entropy (8bit):6.234245376773595
                                                                        Encrypted:false
                                                                        SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                                        MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                                        SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                                        SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                                        SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):268404
                                                                        Entropy (8bit):6.265024248848175
                                                                        Encrypted:false
                                                                        SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                                        MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                                        SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                                        SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                                        SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):248781
                                                                        Entropy (8bit):6.474165596279956
                                                                        Encrypted:false
                                                                        SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                                        MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                                        SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                                        SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                                        SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 2%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):3350528
                                                                        Entropy (8bit):6.833281279080268
                                                                        Encrypted:false
                                                                        SSDEEP:49152:UP2vi4Uvo9GnB3o7+YkUKcR70IEWEMlBietXJVKQ28g/:VOo9Kto7TkUKknEHY9tXL28g
                                                                        MD5:6AB884312C4C144F8AE6C9BE14A30C87
                                                                        SHA1:C6118CCA0955D62FFBF70E5523FB391383BBC676
                                                                        SHA-256:DA641368118C2E86E67FA1CB3D49B2A9914DE0FB11B8BD5BDE7798BD60F3B386
                                                                        SHA-512:41EFAE682F48A8FE4B013D0D08EE3B08823E2DBBCF0E8A73D2F0827A9A7D8EBBA67486CC73615ECA21B6387D3159205C21FAC7AA697B513B9C44CDFE04A8F1D6
                                                                        Malicious:false
                                                                        Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L......L.................."..........y"......."...@...........................3......(3.....................................<.".......#...............................................................................".`............................text.....".......".................`....rdata...(...."..*....".............@..@_cde_3..8.....#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):509934
                                                                        Entropy (8bit):6.031080686301204
                                                                        Encrypted:false
                                                                        SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                                        MD5:02E6C6AB886700E6F184EEE43157C066
                                                                        SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                                        SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                                        SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):98626
                                                                        Entropy (8bit):6.478068795827396
                                                                        Encrypted:false
                                                                        SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                                        MD5:70CA53E8B46464CCF956D157501D367A
                                                                        SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                                        SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                                        SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):235032
                                                                        Entropy (8bit):6.398850087061798
                                                                        Encrypted:false
                                                                        SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                                        MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                                        SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                                        SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                                        SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):140752
                                                                        Entropy (8bit):6.52778891175594
                                                                        Encrypted:false
                                                                        SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                                        MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                                        SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                                        SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                                        SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 2%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):181527
                                                                        Entropy (8bit):6.362061002967905
                                                                        Encrypted:false
                                                                        SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                                        MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                                        SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                                        SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                                        SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):165739
                                                                        Entropy (8bit):6.062324507479428
                                                                        Encrypted:false
                                                                        SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                                        MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                                        SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                                        SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                                        SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):30994
                                                                        Entropy (8bit):5.666281517516177
                                                                        Encrypted:false
                                                                        SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                                        MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                                        SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                                        SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                                        SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):259014
                                                                        Entropy (8bit):6.075222655669795
                                                                        Encrypted:false
                                                                        SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                                        MD5:B4FDE05A19346072C713BE2926AF8961
                                                                        SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                                        SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                                        SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):101544
                                                                        Entropy (8bit):6.237382830377451
                                                                        Encrypted:false
                                                                        SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                                        MD5:E13FCD8FB16E483E4DE47A036687D904
                                                                        SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                                        SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                                        SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):65181
                                                                        Entropy (8bit):6.085572761520829
                                                                        Encrypted:false
                                                                        SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                                        MD5:98A49CC8AE2D608C6E377E95833C569B
                                                                        SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                                        SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                                        SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):448557
                                                                        Entropy (8bit):6.353356595345232
                                                                        Encrypted:false
                                                                        SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                                        MD5:908111F583B7019D2ED3492435E5092D
                                                                        SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                                        SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                                        SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 2%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):174543
                                                                        Entropy (8bit):6.3532700320638025
                                                                        Encrypted:false
                                                                        SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                                        MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                                        SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                                        SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                                        SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:modified
                                                                        Size (bytes):3350528
                                                                        Entropy (8bit):6.833281566054271
                                                                        Encrypted:false
                                                                        SSDEEP:49152:1P2vi4Uvo9GnB3o7+YkUKcR70IEWEMlBietXJVKQ28g/:QOo9Kto7TkUKknEHY9tXL28g
                                                                        MD5:FBEE756977ABC585C336AD6E5BFB1E9F
                                                                        SHA1:0602DD15DFEE4B9E5AA1060FFC7AF50E24DFDD95
                                                                        SHA-256:125E58D7C9DC4ED375BA06B3D6663B9C07A3ADF3EF3EB6E5433216478435C857
                                                                        SHA-512:DD71025F6CF85B8D99783BC29D66CBAAEC1F151EE9FB5982F67F9F2F64949F8A7343B515C38BDD74A88294E4423D2BEC0B23A42D25479DE2DBB84344976EA3A8
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Avira, Detection: 100%
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L......L.................."..........y"......."...@...........................3......(3.....................................<.".......#...............................................................................".`............................text.....".......".................`....rdata...(...."..*....".............@..@_cde_3..8.....#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):121524
                                                                        Entropy (8bit):6.347995296737745
                                                                        Encrypted:false
                                                                        SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                                        MD5:6CE25FB0302F133CC244889C360A6541
                                                                        SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                                        SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                                        SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):814068
                                                                        Entropy (8bit):6.5113626552096
                                                                        Encrypted:false
                                                                        SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                                        MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                                        SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                                        SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                                        SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):181527
                                                                        Entropy (8bit):6.362061002967905
                                                                        Encrypted:false
                                                                        SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                                        MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                                        SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                                        SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                                        SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):268404
                                                                        Entropy (8bit):6.265024248848175
                                                                        Encrypted:false
                                                                        SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                                        MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                                        SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                                        SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                                        SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):463112
                                                                        Entropy (8bit):6.363613724826455
                                                                        Encrypted:false
                                                                        SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                                        MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                                        SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                                        SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                                        SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):26562
                                                                        Entropy (8bit):5.606958768500933
                                                                        Encrypted:false
                                                                        SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                                        MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                                        SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                                        SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                                        SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):337171
                                                                        Entropy (8bit):6.46334441651647
                                                                        Encrypted:false
                                                                        SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                                        MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                                        SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                                        SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                                        SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):174543
                                                                        Entropy (8bit):6.3532700320638025
                                                                        Encrypted:false
                                                                        SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                                        MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                                        SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                                        SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                                        SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):235032
                                                                        Entropy (8bit):6.398850087061798
                                                                        Encrypted:false
                                                                        SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                                        MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                                        SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                                        SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                                        SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):441975
                                                                        Entropy (8bit):6.372283713065844
                                                                        Encrypted:false
                                                                        SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                                        MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                                        SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                                        SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                                        SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):140752
                                                                        Entropy (8bit):6.52778891175594
                                                                        Encrypted:false
                                                                        SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                                        MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                                        SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                                        SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                                        SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 2%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):509934
                                                                        Entropy (8bit):6.031080686301204
                                                                        Encrypted:false
                                                                        SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                                        MD5:02E6C6AB886700E6F184EEE43157C066
                                                                        SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                                        SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                                        SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):397808
                                                                        Entropy (8bit):6.396146399966879
                                                                        Encrypted:false
                                                                        SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                                        MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                                        SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                                        SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                                        SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 2%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):171848
                                                                        Entropy (8bit):6.579154579239999
                                                                        Encrypted:false
                                                                        SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                                        MD5:236A679AB1B16E66625AFBA86A4669EB
                                                                        SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                                        SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                                        SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):259014
                                                                        Entropy (8bit):6.075222655669795
                                                                        Encrypted:false
                                                                        SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                                        MD5:B4FDE05A19346072C713BE2926AF8961
                                                                        SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                                        SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                                        SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):64724
                                                                        Entropy (8bit):5.910307743399971
                                                                        Encrypted:false
                                                                        SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                                        MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                                        SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                                        SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                                        SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):92019
                                                                        Entropy (8bit):5.974787373427489
                                                                        Encrypted:false
                                                                        SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                                        MD5:CC7DAD980DD04E0387795741D809CBF7
                                                                        SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                                        SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                                        SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):165739
                                                                        Entropy (8bit):6.062324507479428
                                                                        Encrypted:false
                                                                        SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                                        MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                                        SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                                        SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                                        SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):101544
                                                                        Entropy (8bit):6.237382830377451
                                                                        Encrypted:false
                                                                        SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                                        MD5:E13FCD8FB16E483E4DE47A036687D904
                                                                        SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                                        SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                                        SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):291245
                                                                        Entropy (8bit):6.234245376773595
                                                                        Encrypted:false
                                                                        SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                                        MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                                        SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                                        SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                                        SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):706136
                                                                        Entropy (8bit):6.517672165992715
                                                                        Encrypted:false
                                                                        SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                                        MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                                        SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                                        SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                                        SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):248781
                                                                        Entropy (8bit):6.474165596279956
                                                                        Encrypted:false
                                                                        SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                                        MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                                        SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                                        SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                                        SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 2%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):248694
                                                                        Entropy (8bit):6.346971642353424
                                                                        Encrypted:false
                                                                        SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                                        MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                                        SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                                        SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                                        SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):30994
                                                                        Entropy (8bit):5.666281517516177
                                                                        Encrypted:false
                                                                        SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                                        MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                                        SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                                        SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                                        SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):448557
                                                                        Entropy (8bit):6.353356595345232
                                                                        Encrypted:false
                                                                        SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                                        MD5:908111F583B7019D2ED3492435E5092D
                                                                        SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                                        SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                                        SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 2%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):65181
                                                                        Entropy (8bit):6.085572761520829
                                                                        Encrypted:false
                                                                        SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                                        MD5:98A49CC8AE2D608C6E377E95833C569B
                                                                        SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                                        SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                                        SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):720373
                                                                        Entropy (8bit):6.507189676512941
                                                                        Encrypted:false
                                                                        SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjUR/FDExyFn:nu7eEYCP8trP837szHUA60SLtcV3E9uT
                                                                        MD5:AFA4B60A210DE60D116CB232B68A85E3
                                                                        SHA1:B563BD5092ABA460EA531859270C460CE24B42B2
                                                                        SHA-256:5DA4AA2169C68DD8E5FC626140A8853DF46D0E186C292739CBEA69AF80E258FC
                                                                        SHA-512:23816C1F111F00E59EDCA08CE5E9EC62DF8CD34F4BEB580BF908C069C742FE5BF2DBC218BEF4936A1F837F39F2AABA98A217EED4800947CC740514063BB13B4F
                                                                        Malicious:true
                                                                        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:InnoSetup Log Jenny Video Converter, version 0x30, 5926 bytes, 921702\user, "C:\Users\user\AppData\Local\Jenny Video Converter"
                                                                        Category:dropped
                                                                        Size (bytes):5926
                                                                        Entropy (8bit):4.83611148894394
                                                                        Encrypted:false
                                                                        SSDEEP:96:MIbdWIl4488GpZPwPYY9a+eOIh3y7QkFuhP9tuIgCTk/3Qa1E6iVZeIs42RQXQwH:MidWY448JppwdHIh3xKKH
                                                                        MD5:73DA6AE0F29CD2ED307A0B1159B1F06D
                                                                        SHA1:1F3FAA4CCC994BCF59A230DA57DC5C25A5278641
                                                                        SHA-256:4E061A7C9BD71BD9F2B65F763653F9270ECFBEEBEC456BA8D8809A146F3AC897
                                                                        SHA-512:AD1AF70AA6199139B047A6ED702F5DC1C93AD5AC20F8175FCAEB7FD1B20060B4F4E1B2E01E3E1E2BDBFF2E973975CDD4FA002B1C538E8D2F36066D7B2D4CCD13
                                                                        Malicious:false
                                                                        Preview:Inno Setup Uninstall Log (b)....................................Jenny Video Converter...........................................................................................................Jenny Video Converter...........................................................................................................0..."...&...%.............................................................................................................................<.......R....921702.user2C:\Users\user\AppData\Local\Jenny Video Converter...........8.9.d.. ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):720373
                                                                        Entropy (8bit):6.507189676512941
                                                                        Encrypted:false
                                                                        SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjUR/FDExyFn:nu7eEYCP8trP837szHUA60SLtcV3E9uT
                                                                        MD5:AFA4B60A210DE60D116CB232B68A85E3
                                                                        SHA1:B563BD5092ABA460EA531859270C460CE24B42B2
                                                                        SHA-256:5DA4AA2169C68DD8E5FC626140A8853DF46D0E186C292739CBEA69AF80E258FC
                                                                        SHA-512:23816C1F111F00E59EDCA08CE5E9EC62DF8CD34F4BEB580BF908C069C742FE5BF2DBC218BEF4936A1F837F39F2AABA98A217EED4800947CC740514063BB13B4F
                                                                        Malicious:true
                                                                        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):98626
                                                                        Entropy (8bit):6.478068795827396
                                                                        Encrypted:false
                                                                        SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                                        MD5:70CA53E8B46464CCF956D157501D367A
                                                                        SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                                        SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                                        SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\Desktop\etwSnBeIC2.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):709120
                                                                        Entropy (8bit):6.498758528397668
                                                                        Encrypted:false
                                                                        SSDEEP:12288:thu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjUR/FDExyF:Pu7eEYCP8trP837szHUA60SLtcV3E9uT
                                                                        MD5:5F843818412603E159B8CFB0B6A0BC74
                                                                        SHA1:DEF31463B44AA73BE0B39DA10E9388A8294DFA3F
                                                                        SHA-256:6AF0FC06F6E0237810E7AFF1CEE4B628A2B5DBCBB2262C43FE52E044310C22A9
                                                                        SHA-512:5A9B2055305276424FE3B17BD4422A5F9BCEAFF185724F28BDBC5F21B9150DA076851A7072CD69EA14B37C08E3B13CBA75E769E3F3DB42D0AA00D8768A612A56
                                                                        Malicious:true
                                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):4096
                                                                        Entropy (8bit):4.026670007889822
                                                                        Encrypted:false
                                                                        SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                                        MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                                        SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                                        SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                                        SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):2560
                                                                        Entropy (8bit):2.8818118453929262
                                                                        Encrypted:false
                                                                        SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                        MD5:A69559718AB506675E907FE49DEB71E9
                                                                        SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                        SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                        SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):6144
                                                                        Entropy (8bit):4.215994423157539
                                                                        Encrypted:false
                                                                        SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                        MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                        SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                        SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                        SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):23312
                                                                        Entropy (8bit):4.596242908851566
                                                                        Encrypted:false
                                                                        SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                        MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                        SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                        SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                        SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Entropy (8bit):7.9986575460092135
                                                                        TrID:
                                                                        • Win32 Executable (generic) a (10002005/4) 98.86%
                                                                        • Inno Setup installer (109748/4) 1.08%
                                                                        • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                        File name:etwSnBeIC2.exe
                                                                        File size:4'523'554 bytes
                                                                        MD5:179d076b3fa5c27a6ab53e7113363290
                                                                        SHA1:e22eccd0873023e35f6f03082614a3249de8f9f3
                                                                        SHA256:d754713c54d38eb1f1f19b07c62b0029f3fd9c1a29eb6f8c4c3034e19200c286
                                                                        SHA512:09a0e670d98672ebb4cdfc889ae6c2052576995fff194608c69f1614965ac0f7cd0928a9bd463f6e12406bd92af028639b9dd07849ed7e8841c77282d16c8370
                                                                        SSDEEP:98304:Nt3mkJemJt3SSd4DJ+wnaR/W5HQlEuAwyufegfvhndjX:j2kLt3LdG9eW5HbQd5Rnl
                                                                        TLSH:482633D76A220E70F3CBF5BA44B7582AF5197A7A487821AD269AF81FCDF2C1001C7711
                                                                        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                        Icon Hash:2d2e3797b32b2b99
                                                                        Entrypoint:0x409c40
                                                                        Entrypoint Section:CODE
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:1
                                                                        OS Version Minor:0
                                                                        File Version Major:1
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:1
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                        Instruction
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        add esp, FFFFFFC4h
                                                                        push ebx
                                                                        push esi
                                                                        push edi
                                                                        xor eax, eax
                                                                        mov dword ptr [ebp-10h], eax
                                                                        mov dword ptr [ebp-24h], eax
                                                                        call 00007F3C8081B8EBh
                                                                        call 00007F3C8081CAF2h
                                                                        call 00007F3C8081CD81h
                                                                        call 00007F3C8081EDB8h
                                                                        call 00007F3C8081EDFFh
                                                                        call 00007F3C8082172Eh
                                                                        call 00007F3C80821895h
                                                                        xor eax, eax
                                                                        push ebp
                                                                        push 0040A2FCh
                                                                        push dword ptr fs:[eax]
                                                                        mov dword ptr fs:[eax], esp
                                                                        xor edx, edx
                                                                        push ebp
                                                                        push 0040A2C5h
                                                                        push dword ptr fs:[edx]
                                                                        mov dword ptr fs:[edx], esp
                                                                        mov eax, dword ptr [0040C014h]
                                                                        call 00007F3C808222FBh
                                                                        call 00007F3C80821F2Eh
                                                                        lea edx, dword ptr [ebp-10h]
                                                                        xor eax, eax
                                                                        call 00007F3C8081F3E8h
                                                                        mov edx, dword ptr [ebp-10h]
                                                                        mov eax, 0040CE24h
                                                                        call 00007F3C8081B997h
                                                                        push 00000002h
                                                                        push 00000000h
                                                                        push 00000001h
                                                                        mov ecx, dword ptr [0040CE24h]
                                                                        mov dl, 01h
                                                                        mov eax, 0040738Ch
                                                                        call 00007F3C8081FC77h
                                                                        mov dword ptr [0040CE28h], eax
                                                                        xor edx, edx
                                                                        push ebp
                                                                        push 0040A27Dh
                                                                        push dword ptr fs:[edx]
                                                                        mov dword ptr fs:[edx], esp
                                                                        call 00007F3C8082236Bh
                                                                        mov dword ptr [0040CE30h], eax
                                                                        mov eax, dword ptr [0040CE30h]
                                                                        cmp dword ptr [eax+0Ch], 01h
                                                                        jne 00007F3C808224AAh
                                                                        mov eax, dword ptr [0040CE30h]
                                                                        mov edx, 00000028h
                                                                        call 00007F3C80820078h
                                                                        mov edx, dword ptr [00000030h]
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        CODE0x10000x93640x94002c410dfc3efd04d9b69c35c70921424eFalse0.6147856841216216data6.560885192755103IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        DATA0xb0000x24c0x400d5ea23d4ecf110fd2591314cbaa84278False0.310546875data2.7390956346874638IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        BSS0xc0000xe880x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                        .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                        .rsrc0x110000x2c000x2c0007343abcd88be70b9b0cff94dcd13d80False0.32279829545454547data4.461337231537198IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                        RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                        RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                        RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                        RT_STRING0x125740x2f2data0.35543766578249336
                                                                        RT_STRING0x128680x30cdata0.3871794871794872
                                                                        RT_STRING0x12b740x2cedata0.42618384401114207
                                                                        RT_STRING0x12e440x68data0.75
                                                                        RT_STRING0x12eac0xb4data0.6277777777777778
                                                                        RT_STRING0x12f600xaedata0.5344827586206896
                                                                        RT_RCDATA0x130100x2cdata1.2045454545454546
                                                                        RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                        RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.2764900662251656
                                                                        RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                                        DLLImport
                                                                        kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                        user32.dllMessageBoxA
                                                                        oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                        advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                        kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                        user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                        comctl32.dllInitCommonControls
                                                                        advapi32.dllAdjustTokenPrivileges
                                                                        Language of compilation systemCountry where language is spokenMap
                                                                        DutchNetherlands
                                                                        EnglishUnited States
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2024-10-07T17:57:54.168288+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.208.158.24880TCP
                                                                        2024-10-07T17:57:54.168288+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.208.158.24880TCP
                                                                        2024-10-07T17:57:57.059701+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.208.158.24880TCP
                                                                        2024-10-07T17:57:57.059701+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.208.158.24880TCP
                                                                        2024-10-07T17:57:57.866643+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449745185.208.158.24880TCP
                                                                        2024-10-07T17:57:57.866643+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449745185.208.158.24880TCP
                                                                        2024-10-07T17:57:58.676031+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449755185.208.158.24880TCP
                                                                        2024-10-07T17:57:58.676031+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449755185.208.158.24880TCP
                                                                        2024-10-07T17:57:59.511220+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449763185.208.158.24880TCP
                                                                        2024-10-07T17:57:59.511220+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449763185.208.158.24880TCP
                                                                        2024-10-07T17:58:00.350791+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449769185.208.158.24880TCP
                                                                        2024-10-07T17:58:00.350791+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449769185.208.158.24880TCP
                                                                        2024-10-07T17:58:01.211455+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449775185.208.158.24880TCP
                                                                        2024-10-07T17:58:01.211455+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449775185.208.158.24880TCP
                                                                        2024-10-07T17:58:02.015244+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449781185.208.158.24880TCP
                                                                        2024-10-07T17:58:02.015244+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449781185.208.158.24880TCP
                                                                        2024-10-07T17:58:02.810524+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449787185.208.158.24880TCP
                                                                        2024-10-07T17:58:02.810524+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449787185.208.158.24880TCP
                                                                        2024-10-07T17:58:03.777824+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449793185.208.158.24880TCP
                                                                        2024-10-07T17:58:03.777824+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449793185.208.158.24880TCP
                                                                        2024-10-07T17:58:04.127670+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449793185.208.158.24880TCP
                                                                        2024-10-07T17:58:04.127670+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449793185.208.158.24880TCP
                                                                        2024-10-07T17:58:04.926313+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449804185.208.158.24880TCP
                                                                        2024-10-07T17:58:04.926313+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449804185.208.158.24880TCP
                                                                        2024-10-07T17:58:05.738499+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449805185.208.158.24880TCP
                                                                        2024-10-07T17:58:05.738499+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449805185.208.158.24880TCP
                                                                        2024-10-07T17:58:06.684546+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449811185.208.158.24880TCP
                                                                        2024-10-07T17:58:06.684546+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449811185.208.158.24880TCP
                                                                        2024-10-07T17:58:07.528429+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449817185.208.158.24880TCP
                                                                        2024-10-07T17:58:07.528429+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449817185.208.158.24880TCP
                                                                        2024-10-07T17:58:07.871872+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449817185.208.158.24880TCP
                                                                        2024-10-07T17:58:07.871872+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449817185.208.158.24880TCP
                                                                        2024-10-07T17:58:08.221127+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449817185.208.158.24880TCP
                                                                        2024-10-07T17:58:08.221127+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449817185.208.158.24880TCP
                                                                        2024-10-07T17:58:09.004532+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449830185.208.158.24880TCP
                                                                        2024-10-07T17:58:09.004532+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449830185.208.158.24880TCP
                                                                        2024-10-07T17:58:09.814801+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449836185.208.158.24880TCP
                                                                        2024-10-07T17:58:09.814801+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449836185.208.158.24880TCP
                                                                        2024-10-07T17:58:10.689558+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449843185.208.158.24880TCP
                                                                        2024-10-07T17:58:10.689558+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449843185.208.158.24880TCP
                                                                        2024-10-07T17:58:11.622460+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449850185.208.158.24880TCP
                                                                        2024-10-07T17:58:11.622460+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449850185.208.158.24880TCP
                                                                        2024-10-07T17:58:12.509052+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449857185.208.158.24880TCP
                                                                        2024-10-07T17:58:12.509052+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449857185.208.158.24880TCP
                                                                        2024-10-07T17:58:12.854443+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449857185.208.158.24880TCP
                                                                        2024-10-07T17:58:12.854443+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449857185.208.158.24880TCP
                                                                        2024-10-07T17:58:13.218819+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449857185.208.158.24880TCP
                                                                        2024-10-07T17:58:13.218819+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449857185.208.158.24880TCP
                                                                        2024-10-07T17:58:14.007996+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449868185.208.158.24880TCP
                                                                        2024-10-07T17:58:14.007996+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449868185.208.158.24880TCP
                                                                        2024-10-07T17:58:14.793048+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449874185.208.158.24880TCP
                                                                        2024-10-07T17:58:14.793048+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449874185.208.158.24880TCP
                                                                        2024-10-07T17:58:15.144716+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449874185.208.158.24880TCP
                                                                        2024-10-07T17:58:15.144716+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449874185.208.158.24880TCP
                                                                        2024-10-07T17:58:15.948392+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449882185.208.158.24880TCP
                                                                        2024-10-07T17:58:15.948392+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449882185.208.158.24880TCP
                                                                        2024-10-07T17:58:16.952949+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449888185.208.158.24880TCP
                                                                        2024-10-07T17:58:16.952949+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449888185.208.158.24880TCP
                                                                        2024-10-07T17:58:17.767364+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449895185.208.158.24880TCP
                                                                        2024-10-07T17:58:17.767364+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449895185.208.158.24880TCP
                                                                        2024-10-07T17:58:18.559131+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449903185.208.158.24880TCP
                                                                        2024-10-07T17:58:18.559131+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449903185.208.158.24880TCP
                                                                        2024-10-07T17:58:19.467071+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449909185.208.158.24880TCP
                                                                        2024-10-07T17:58:19.467071+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449909185.208.158.24880TCP
                                                                        2024-10-07T17:58:20.384383+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449915185.208.158.24880TCP
                                                                        2024-10-07T17:58:20.384383+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449915185.208.158.24880TCP
                                                                        2024-10-07T17:58:20.728693+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449915185.208.158.24880TCP
                                                                        2024-10-07T17:58:20.728693+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449915185.208.158.24880TCP
                                                                        2024-10-07T17:58:21.102429+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449915185.208.158.24880TCP
                                                                        2024-10-07T17:58:21.102429+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449915185.208.158.24880TCP
                                                                        2024-10-07T17:58:22.161542+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449923185.208.158.24880TCP
                                                                        2024-10-07T17:58:22.161542+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449923185.208.158.24880TCP
                                                                        2024-10-07T17:58:22.944523+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449932185.208.158.24880TCP
                                                                        2024-10-07T17:58:22.944523+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449932185.208.158.24880TCP
                                                                        2024-10-07T17:58:23.803296+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449937185.208.158.24880TCP
                                                                        2024-10-07T17:58:23.803296+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449937185.208.158.24880TCP
                                                                        2024-10-07T17:58:24.628138+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449940185.208.158.24880TCP
                                                                        2024-10-07T17:58:24.628138+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449940185.208.158.24880TCP
                                                                        2024-10-07T17:58:25.446978+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449946185.208.158.24880TCP
                                                                        2024-10-07T17:58:25.446978+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449946185.208.158.24880TCP
                                                                        2024-10-07T17:58:25.800856+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449946185.208.158.24880TCP
                                                                        2024-10-07T17:58:25.800856+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449946185.208.158.24880TCP
                                                                        2024-10-07T17:58:26.967788+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449955185.208.158.24880TCP
                                                                        2024-10-07T17:58:26.967788+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449955185.208.158.24880TCP
                                                                        2024-10-07T17:58:27.846476+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449961185.208.158.24880TCP
                                                                        2024-10-07T17:58:27.846476+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449961185.208.158.24880TCP
                                                                        2024-10-07T17:58:28.657625+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449967185.208.158.24880TCP
                                                                        2024-10-07T17:58:28.657625+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449967185.208.158.24880TCP
                                                                        2024-10-07T17:58:29.467755+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449973185.208.158.24880TCP
                                                                        2024-10-07T17:58:29.467755+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449973185.208.158.24880TCP
                                                                        2024-10-07T17:58:30.293649+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449979185.208.158.24880TCP
                                                                        2024-10-07T17:58:30.293649+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449979185.208.158.24880TCP
                                                                        2024-10-07T17:58:31.111451+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449985185.208.158.24880TCP
                                                                        2024-10-07T17:58:31.111451+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449985185.208.158.24880TCP
                                                                        2024-10-07T17:58:31.894760+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449991185.208.158.24880TCP
                                                                        2024-10-07T17:58:31.894760+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449991185.208.158.24880TCP
                                                                        2024-10-07T17:58:32.721947+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449997185.208.158.24880TCP
                                                                        2024-10-07T17:58:32.721947+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449997185.208.158.24880TCP
                                                                        2024-10-07T17:58:33.607220+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450002185.208.158.24880TCP
                                                                        2024-10-07T17:58:33.607220+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450002185.208.158.24880TCP
                                                                        2024-10-07T17:58:33.950950+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450002185.208.158.24880TCP
                                                                        2024-10-07T17:58:33.950950+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450002185.208.158.24880TCP
                                                                        2024-10-07T17:58:34.299686+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450002185.208.158.24880TCP
                                                                        2024-10-07T17:58:34.299686+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450002185.208.158.24880TCP
                                                                        2024-10-07T17:58:35.574466+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450012185.208.158.24880TCP
                                                                        2024-10-07T17:58:35.574466+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450012185.208.158.24880TCP
                                                                        2024-10-07T17:58:35.915205+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450012185.208.158.24880TCP
                                                                        2024-10-07T17:58:35.915205+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450012185.208.158.24880TCP
                                                                        2024-10-07T17:58:36.265269+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450012185.208.158.24880TCP
                                                                        2024-10-07T17:58:36.265269+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450012185.208.158.24880TCP
                                                                        2024-10-07T17:58:38.011847+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450023185.208.158.24880TCP
                                                                        2024-10-07T17:58:38.011847+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450023185.208.158.24880TCP
                                                                        2024-10-07T17:58:38.452996+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450023185.208.158.24880TCP
                                                                        2024-10-07T17:58:38.452996+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450023185.208.158.24880TCP
                                                                        2024-10-07T17:58:39.286239+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450034185.208.158.24880TCP
                                                                        2024-10-07T17:58:39.286239+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450034185.208.158.24880TCP
                                                                        2024-10-07T17:58:40.260850+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450040185.208.158.24880TCP
                                                                        2024-10-07T17:58:40.260850+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450040185.208.158.24880TCP
                                                                        2024-10-07T17:58:40.606161+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450040185.208.158.24880TCP
                                                                        2024-10-07T17:58:40.606161+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450040185.208.158.24880TCP
                                                                        2024-10-07T17:58:40.962671+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450040185.208.158.24880TCP
                                                                        2024-10-07T17:58:40.962671+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450040185.208.158.24880TCP
                                                                        2024-10-07T17:58:41.350317+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450040185.208.158.24880TCP
                                                                        2024-10-07T17:58:41.350317+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450040185.208.158.24880TCP
                                                                        2024-10-07T17:58:42.155266+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450048185.208.158.24880TCP
                                                                        2024-10-07T17:58:42.155266+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450048185.208.158.24880TCP
                                                                        2024-10-07T17:58:42.494685+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450048185.208.158.24880TCP
                                                                        2024-10-07T17:58:42.494685+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450048185.208.158.24880TCP
                                                                        2024-10-07T17:58:42.836885+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450048185.208.158.24880TCP
                                                                        2024-10-07T17:58:42.836885+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450048185.208.158.24880TCP
                                                                        2024-10-07T17:58:43.189267+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450048185.208.158.24880TCP
                                                                        2024-10-07T17:58:43.189267+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450048185.208.158.24880TCP
                                                                        2024-10-07T17:58:43.976287+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450049185.208.158.24880TCP
                                                                        2024-10-07T17:58:43.976287+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450049185.208.158.24880TCP
                                                                        2024-10-07T17:58:44.770835+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450050185.208.158.24880TCP
                                                                        2024-10-07T17:58:44.770835+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450050185.208.158.24880TCP
                                                                        2024-10-07T17:58:45.621808+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450051185.208.158.24880TCP
                                                                        2024-10-07T17:58:45.621808+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450051185.208.158.24880TCP
                                                                        2024-10-07T17:58:46.420108+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450052185.208.158.24880TCP
                                                                        2024-10-07T17:58:46.420108+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450052185.208.158.24880TCP
                                                                        2024-10-07T17:58:47.339259+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450053185.208.158.24880TCP
                                                                        2024-10-07T17:58:47.339259+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450053185.208.158.24880TCP
                                                                        2024-10-07T17:58:48.123195+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450054185.208.158.24880TCP
                                                                        2024-10-07T17:58:48.123195+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450054185.208.158.24880TCP
                                                                        2024-10-07T17:58:48.463338+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450054185.208.158.24880TCP
                                                                        2024-10-07T17:58:48.463338+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450054185.208.158.24880TCP
                                                                        2024-10-07T17:58:48.805829+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450054185.208.158.24880TCP
                                                                        2024-10-07T17:58:48.805829+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450054185.208.158.24880TCP
                                                                        2024-10-07T17:58:49.683309+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450055185.208.158.24880TCP
                                                                        2024-10-07T17:58:49.683309+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450055185.208.158.24880TCP
                                                                        2024-10-07T17:58:50.025649+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450055185.208.158.24880TCP
                                                                        2024-10-07T17:58:50.025649+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450055185.208.158.24880TCP
                                                                        2024-10-07T17:58:50.375192+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450055185.208.158.24880TCP
                                                                        2024-10-07T17:58:50.375192+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450055185.208.158.24880TCP
                                                                        2024-10-07T17:58:51.200205+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450056185.208.158.24880TCP
                                                                        2024-10-07T17:58:51.200205+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450056185.208.158.24880TCP
                                                                        2024-10-07T17:58:51.978153+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450057185.208.158.24880TCP
                                                                        2024-10-07T17:58:51.978153+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450057185.208.158.24880TCP
                                                                        2024-10-07T17:58:52.810123+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450058185.208.158.24880TCP
                                                                        2024-10-07T17:58:52.810123+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450058185.208.158.24880TCP
                                                                        2024-10-07T17:58:53.600730+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450059185.208.158.24880TCP
                                                                        2024-10-07T17:58:53.600730+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450059185.208.158.24880TCP
                                                                        2024-10-07T17:58:54.407555+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450060185.208.158.24880TCP
                                                                        2024-10-07T17:58:54.407555+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450060185.208.158.24880TCP
                                                                        2024-10-07T17:58:55.269630+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450061185.208.158.24880TCP
                                                                        2024-10-07T17:58:55.269630+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450061185.208.158.24880TCP
                                                                        2024-10-07T17:58:56.070447+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450062185.208.158.24880TCP
                                                                        2024-10-07T17:58:56.070447+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450062185.208.158.24880TCP
                                                                        2024-10-07T17:58:56.860282+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450063185.208.158.24880TCP
                                                                        2024-10-07T17:58:56.860282+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450063185.208.158.24880TCP
                                                                        2024-10-07T17:58:57.677999+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450064185.208.158.24880TCP
                                                                        2024-10-07T17:58:57.677999+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450064185.208.158.24880TCP
                                                                        2024-10-07T17:58:58.467221+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450065185.208.158.24880TCP
                                                                        2024-10-07T17:58:58.467221+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450065185.208.158.24880TCP
                                                                        2024-10-07T17:58:59.281668+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450066185.208.158.24880TCP
                                                                        2024-10-07T17:58:59.281668+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450066185.208.158.24880TCP
                                                                        2024-10-07T17:59:00.099937+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450067185.208.158.24880TCP
                                                                        2024-10-07T17:59:00.099937+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450067185.208.158.24880TCP
                                                                        2024-10-07T17:59:00.951029+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450068185.208.158.24880TCP
                                                                        2024-10-07T17:59:00.951029+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450068185.208.158.24880TCP
                                                                        2024-10-07T17:59:02.016629+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450069185.208.158.24880TCP
                                                                        2024-10-07T17:59:02.016629+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450069185.208.158.24880TCP
                                                                        2024-10-07T17:59:02.819134+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450070185.208.158.24880TCP
                                                                        2024-10-07T17:59:02.819134+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450070185.208.158.24880TCP
                                                                        2024-10-07T17:59:03.644311+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450071185.208.158.24880TCP
                                                                        2024-10-07T17:59:03.644311+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450071185.208.158.24880TCP
                                                                        2024-10-07T17:59:04.607149+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450072185.208.158.24880TCP
                                                                        2024-10-07T17:59:04.607149+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450072185.208.158.24880TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Oct 7, 2024 17:57:53.474870920 CEST4973680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:53.480400085 CEST8049736185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:53.481529951 CEST4973680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:53.487400055 CEST4973680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:53.492376089 CEST8049736185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:54.168081045 CEST8049736185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:54.168287992 CEST4973680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:54.169754028 CEST497382023192.168.2.489.105.201.183
                                                                        Oct 7, 2024 17:57:54.178097963 CEST20234973889.105.201.183192.168.2.4
                                                                        Oct 7, 2024 17:57:54.178201914 CEST497382023192.168.2.489.105.201.183
                                                                        Oct 7, 2024 17:57:54.178292036 CEST497382023192.168.2.489.105.201.183
                                                                        Oct 7, 2024 17:57:54.183315992 CEST20234973889.105.201.183192.168.2.4
                                                                        Oct 7, 2024 17:57:54.183432102 CEST497382023192.168.2.489.105.201.183
                                                                        Oct 7, 2024 17:57:54.188656092 CEST20234973889.105.201.183192.168.2.4
                                                                        Oct 7, 2024 17:57:54.756838083 CEST20234973889.105.201.183192.168.2.4
                                                                        Oct 7, 2024 17:57:54.805908918 CEST497382023192.168.2.489.105.201.183
                                                                        Oct 7, 2024 17:57:56.763511896 CEST4973680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:56.769217014 CEST8049736185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:57.059523106 CEST8049736185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:57.059700966 CEST4973680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.184951067 CEST4973680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.185472965 CEST4974580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.190418005 CEST8049745185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:57.190613031 CEST4974580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.190927982 CEST4974580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.191020012 CEST8049736185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:57.191076040 CEST4973680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.196082115 CEST8049745185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:57.866565943 CEST8049745185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:57.866642952 CEST4974580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.867455006 CEST497512023192.168.2.489.105.201.183
                                                                        Oct 7, 2024 17:57:57.873254061 CEST20234975189.105.201.183192.168.2.4
                                                                        Oct 7, 2024 17:57:57.873338938 CEST497512023192.168.2.489.105.201.183
                                                                        Oct 7, 2024 17:57:57.873395920 CEST497512023192.168.2.489.105.201.183
                                                                        Oct 7, 2024 17:57:57.873451948 CEST497512023192.168.2.489.105.201.183
                                                                        Oct 7, 2024 17:57:57.879666090 CEST20234975189.105.201.183192.168.2.4
                                                                        Oct 7, 2024 17:57:57.923505068 CEST20234975189.105.201.183192.168.2.4
                                                                        Oct 7, 2024 17:57:57.984419107 CEST4974580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.984774113 CEST4975580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.990199089 CEST8049755185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:57.990283012 CEST4975580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.990405083 CEST8049745185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:57.990468025 CEST4974580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:57.997629881 CEST4975580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:58.003732920 CEST8049755185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:58.291589022 CEST20234975189.105.201.183192.168.2.4
                                                                        Oct 7, 2024 17:57:58.291806936 CEST497512023192.168.2.489.105.201.183
                                                                        Oct 7, 2024 17:57:58.675929070 CEST8049755185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:58.676031113 CEST4975580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:58.810014009 CEST4975580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:58.810376883 CEST4976380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:58.815562963 CEST8049763185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:58.815650940 CEST4976380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:58.815851927 CEST4976380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:58.816081047 CEST8049755185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:58.816168070 CEST4975580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:58.820842028 CEST8049763185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:59.511159897 CEST8049763185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:59.511219978 CEST4976380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:59.636894941 CEST4976380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:59.637267113 CEST4976980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:59.642448902 CEST8049763185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:59.642524958 CEST4976380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:59.642606020 CEST8049769185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:57:59.642678976 CEST4976980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:59.642822027 CEST4976980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:57:59.648278952 CEST8049769185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:00.350697994 CEST8049769185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:00.350790977 CEST4976980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:00.466340065 CEST4976980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:00.466715097 CEST4977580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:00.471905947 CEST8049775185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:00.471961975 CEST8049769185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:00.472026110 CEST4977580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:00.472064972 CEST4976980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:00.472176075 CEST4977580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:00.477565050 CEST8049775185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:01.211257935 CEST8049775185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:01.211455107 CEST4977580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:01.324588060 CEST4977580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:01.324933052 CEST4978180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:01.330135107 CEST8049781185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:01.330216885 CEST4978180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:01.330276012 CEST8049775185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:01.330352068 CEST4977580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:01.330440998 CEST4978180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:01.335294008 CEST8049781185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:02.014760971 CEST8049781185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:02.015244007 CEST4978180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:02.136643887 CEST4978180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:02.136893988 CEST4978780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:02.142278910 CEST8049787185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:02.142353058 CEST8049781185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:02.142380953 CEST4978780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:02.142409086 CEST4978180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:02.142714977 CEST4978780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:02.147629023 CEST8049787185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:02.810313940 CEST8049787185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:02.810523987 CEST4978780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:03.066991091 CEST4978780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:03.077054977 CEST4979380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:03.082345009 CEST8049793185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:03.082474947 CEST4979380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:03.088171959 CEST4979380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:03.093158960 CEST8049793185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:03.107934952 CEST8049787185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:03.107995033 CEST4978780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:03.777740955 CEST8049793185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:03.777823925 CEST4979380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:03.888042927 CEST4979380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:03.893599033 CEST8049793185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:04.127588034 CEST8049793185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:04.127670050 CEST4979380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:04.247317076 CEST4979380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:04.247633934 CEST4980480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:04.252582073 CEST8049804185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:04.252671957 CEST4980480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:04.252830029 CEST4980480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:04.253393888 CEST8049793185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:04.253443956 CEST4979380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:04.257658958 CEST8049804185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:04.923023939 CEST8049804185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:04.926312923 CEST4980480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.042854071 CEST4980480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.043158054 CEST4980580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.048074961 CEST8049805185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:05.048165083 CEST4980580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.048496962 CEST8049804185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:05.048556089 CEST4980480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.049487114 CEST4980580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.054339886 CEST8049805185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:05.738296032 CEST8049805185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:05.738498926 CEST4980580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.857052088 CEST4980580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.858156919 CEST4981180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.862754107 CEST8049805185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:05.862835884 CEST4980580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.863189936 CEST8049811185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:05.863275051 CEST4981180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.863377094 CEST4981180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:05.868427038 CEST8049811185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:06.681232929 CEST8049811185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:06.684545994 CEST4981180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:06.808752060 CEST4981180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:06.809058905 CEST4981780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:06.814053059 CEST8049817185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:06.814130068 CEST4981780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:06.814256907 CEST8049811185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:06.814289093 CEST4981780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:06.814318895 CEST4981180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:06.819150925 CEST8049817185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:07.528353930 CEST8049817185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:07.528429031 CEST4981780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:07.636814117 CEST4981780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:07.641957045 CEST8049817185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:07.871728897 CEST8049817185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:07.871871948 CEST4981780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:07.981862068 CEST4981780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:07.987037897 CEST8049817185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:08.221014023 CEST8049817185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:08.221127033 CEST4981780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:08.340883970 CEST4981780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:08.341125965 CEST4983080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:08.346345901 CEST8049830185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:08.346410036 CEST8049817185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:08.346422911 CEST4983080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:08.346452951 CEST4981780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:08.346561909 CEST4983080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:08.351449013 CEST8049830185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:09.003329992 CEST8049830185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:09.004532099 CEST4983080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.121398926 CEST4983080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.121695042 CEST4983680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.126537085 CEST8049836185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:09.127202988 CEST8049830185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:09.127275944 CEST4983080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.127531052 CEST4983680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.127531052 CEST4983680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.132410049 CEST8049836185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:09.814729929 CEST8049836185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:09.814800978 CEST4983680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.933367968 CEST4983680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.933530092 CEST4984380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.938611984 CEST8049843185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:09.939409971 CEST8049836185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:09.939486027 CEST4983680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.939609051 CEST4984380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.939609051 CEST4984380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:09.944724083 CEST8049843185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:10.689481974 CEST8049843185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:10.689558029 CEST4984380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:10.809920073 CEST4984380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:10.810360909 CEST4985080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:10.815207005 CEST8049843185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:10.815294981 CEST4984380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:10.815747023 CEST8049850185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:10.815846920 CEST4985080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:10.815943003 CEST4985080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:10.820801020 CEST8049850185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:11.622282982 CEST8049850185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:11.622459888 CEST4985080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:11.746251106 CEST4985080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:11.746699095 CEST4985780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:11.752177954 CEST8049857185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:11.752191067 CEST8049850185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:11.752253056 CEST4985080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:11.752253056 CEST4985780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:11.752441883 CEST4985780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:11.757671118 CEST8049857185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:12.506978989 CEST8049857185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:12.509052038 CEST4985780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:12.621397972 CEST4985780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:12.627830029 CEST8049857185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:12.854371071 CEST8049857185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:12.854443073 CEST4985780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:12.964771986 CEST4985780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:12.969727039 CEST8049857185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:13.218678951 CEST8049857185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:13.218818903 CEST4985780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:13.339653015 CEST4985780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:13.339960098 CEST4986880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:13.345017910 CEST8049857185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:13.345061064 CEST8049868185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:13.345118046 CEST4985780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:13.345163107 CEST4986880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:13.345268011 CEST4986880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:13.350068092 CEST8049868185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:14.007879972 CEST8049868185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:14.007996082 CEST4986880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:14.121202946 CEST4986880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:14.121634007 CEST4987480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:14.126624107 CEST8049874185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:14.126655102 CEST8049868185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:14.126744986 CEST4986880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:14.126900911 CEST4987480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:14.126900911 CEST4987480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:14.131833076 CEST8049874185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:14.793001890 CEST8049874185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:14.793047905 CEST4987480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:14.902237892 CEST4987480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:14.907905102 CEST8049874185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:15.144532919 CEST8049874185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:15.144716024 CEST4987480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:15.261394024 CEST4987480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:15.262000084 CEST4988280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:15.266670942 CEST8049874185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:15.266722918 CEST4987480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:15.266963959 CEST8049882185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:15.267024994 CEST4988280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:15.267201900 CEST4988280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:15.272564888 CEST8049882185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:15.948304892 CEST8049882185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:15.948391914 CEST4988280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:16.164717913 CEST4988280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:16.169224024 CEST4988880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:16.171231031 CEST8049882185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:16.171287060 CEST4988280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:16.174163103 CEST8049888185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:16.174243927 CEST4988880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:16.176589012 CEST4988880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:16.181461096 CEST8049888185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:16.952806950 CEST8049888185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:16.952949047 CEST4988880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.074621916 CEST4988880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.074980974 CEST4989580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.079819918 CEST8049895185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:17.079894066 CEST4989580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.080024004 CEST4989580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.084830999 CEST8049895185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:17.095849991 CEST8049888185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:17.095907927 CEST4988880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.767163992 CEST8049895185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:17.767364025 CEST4989580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.888381958 CEST4989580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.888813972 CEST4990380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.893687010 CEST8049903185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:17.893789053 CEST4990380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.893886089 CEST8049895185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:17.893942118 CEST4990380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.893944025 CEST4989580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:17.898782969 CEST8049903185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:18.559060097 CEST8049903185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:18.559130907 CEST4990380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:18.764512062 CEST4990380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:18.767559052 CEST4990980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:18.770001888 CEST8049903185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:18.770132065 CEST4990380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:18.772655010 CEST8049909185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:18.772737026 CEST4990980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:18.774178982 CEST4990980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:18.779045105 CEST8049909185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:19.467020035 CEST8049909185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:19.467071056 CEST4990980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:19.589757919 CEST4990980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:19.590071917 CEST4991580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:19.594851017 CEST8049915185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:19.594933987 CEST4991580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:19.594965935 CEST8049909185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:19.595012903 CEST4990980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:19.595103025 CEST4991580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:19.599864006 CEST8049915185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:20.384314060 CEST8049915185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:20.384382963 CEST4991580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:20.495733023 CEST4991580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:20.500897884 CEST8049915185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:20.728635073 CEST8049915185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:20.728693008 CEST4991580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:20.839449883 CEST4991580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:20.844366074 CEST8049915185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:21.096522093 CEST8049915185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:21.102428913 CEST4991580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:21.282357931 CEST4991580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:21.282644987 CEST4992380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:21.491445065 CEST8049923185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:21.491537094 CEST4992380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:21.491571903 CEST8049915185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:21.494436979 CEST4991580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:21.513631105 CEST4992380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:21.518455029 CEST8049923185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:22.160795927 CEST8049923185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:22.161541939 CEST4992380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:22.277293921 CEST4992380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:22.277550936 CEST4993280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:22.282571077 CEST8049923185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:22.282766104 CEST8049932185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:22.282829046 CEST4992380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:22.282856941 CEST4993280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:22.282953978 CEST4993280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:22.287933111 CEST8049932185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:22.943171978 CEST8049932185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:22.944523096 CEST4993280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.074197054 CEST4993280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.074481010 CEST4993780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.080728054 CEST8049937185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:23.080976009 CEST4993780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.080976009 CEST4993780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.085928917 CEST8049937185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:23.323784113 CEST8049932185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:23.323851109 CEST4993280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.325078964 CEST8049932185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:23.325126886 CEST4993280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.708590031 CEST8049932185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:23.708739996 CEST4993280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.710274935 CEST8049932185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:23.713938951 CEST8049932185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:23.803204060 CEST8049937185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:23.803296089 CEST4993780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.938424110 CEST4993780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.938729048 CEST4994080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.944161892 CEST8049937185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:23.944269896 CEST4993780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.944426060 CEST8049940185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:23.944499969 CEST4994080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.944780111 CEST4994080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:23.949862003 CEST8049940185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:24.628051996 CEST8049940185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:24.628138065 CEST4994080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:24.746407986 CEST4994080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:24.746687889 CEST4994680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:24.751790047 CEST8049940185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:24.751806021 CEST8049946185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:24.751840115 CEST4994080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:24.751892090 CEST4994680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:24.752033949 CEST4994680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:24.757252932 CEST8049946185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:25.446913004 CEST8049946185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:25.446978092 CEST4994680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:25.559312105 CEST4994680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:25.564300060 CEST8049946185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:25.800800085 CEST8049946185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:25.800856113 CEST4994680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:25.923038960 CEST4994680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:25.923505068 CEST4995580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:25.928621054 CEST8049946185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:25.928771019 CEST4994680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:25.928966999 CEST8049955185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:25.929030895 CEST4995580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:25.929153919 CEST4995580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:25.934132099 CEST8049955185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:26.966705084 CEST8049955185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:26.967757940 CEST8049955185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:26.967787981 CEST4995580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:26.967817068 CEST4995580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.089467049 CEST4995580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.089782953 CEST4996180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.095149994 CEST8049961185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:27.096540928 CEST4996180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.096662045 CEST4996180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.098763943 CEST8049955185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:27.100522041 CEST4995580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.101866961 CEST8049961185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:27.846415997 CEST8049961185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:27.846476078 CEST4996180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.964346886 CEST4996180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.964628935 CEST4996780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.969659090 CEST8049961185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:27.969724894 CEST4996180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.970331907 CEST8049967185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:27.970407009 CEST4996780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.970478058 CEST4996780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:27.975433111 CEST8049967185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:28.657535076 CEST8049967185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:28.657624960 CEST4996780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:28.776926041 CEST4996780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:28.777215958 CEST4997380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:28.782569885 CEST8049967185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:28.782613039 CEST8049973185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:28.782632113 CEST4996780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:28.782696962 CEST4997380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:28.782854080 CEST4997380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:28.787974119 CEST8049973185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:29.467581034 CEST8049973185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:29.467755079 CEST4997380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:29.622759104 CEST4997380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:29.623415947 CEST4997980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:29.629522085 CEST8049973185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:29.629564047 CEST8049979185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:29.629642963 CEST4997380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:29.629689932 CEST4997980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:29.629942894 CEST4997980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:29.634896994 CEST8049979185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:30.293579102 CEST8049979185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:30.293648958 CEST4997980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:30.402013063 CEST4997980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:30.402468920 CEST4998580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:30.407546997 CEST8049979185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:30.407622099 CEST4997980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:30.407701969 CEST8049985185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:30.407772064 CEST4998580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:30.407929897 CEST4998580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:30.412801981 CEST8049985185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:31.111376047 CEST8049985185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:31.111450911 CEST4998580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:31.230120897 CEST4998580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:31.230424881 CEST4999180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:31.235403061 CEST8049985185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:31.235455990 CEST4998580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:31.235532999 CEST8049991185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:31.235593081 CEST4999180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:31.235914946 CEST4999180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:31.240845919 CEST8049991185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:31.894685984 CEST8049991185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:31.894759893 CEST4999180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.012923956 CEST4999180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.013055086 CEST4999780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.019416094 CEST8049997185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:32.019489050 CEST4999780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.019562960 CEST4999780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.019783974 CEST8049991185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:32.019840002 CEST4999180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.024889946 CEST8049997185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:32.720289946 CEST8049997185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:32.721946955 CEST4999780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.839684963 CEST4999780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.840066910 CEST5000280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.844984055 CEST8049997185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:32.845043898 CEST4999780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.845227957 CEST8050002185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:32.845439911 CEST5000280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.845439911 CEST5000280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:32.850518942 CEST8050002185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:33.607148886 CEST8050002185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:33.607219934 CEST5000280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:33.715961933 CEST5000280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:33.720875978 CEST8050002185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:33.950836897 CEST8050002185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:33.950949907 CEST5000280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:34.059240103 CEST5000280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:34.064312935 CEST8050002185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:34.299566031 CEST8050002185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:34.299685955 CEST5000280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:34.417556047 CEST5000280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:34.417964935 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:34.676855087 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:34.676899910 CEST8050002185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:34.676938057 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:34.676970005 CEST5000280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:34.677134991 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:34.682089090 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:35.574359894 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:35.574465990 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:35.577440977 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:35.577634096 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:35.683559895 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:35.689048052 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:35.915074110 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:35.915205002 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:36.026978016 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:36.032016993 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:36.265167952 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:36.265269041 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:36.386393070 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:36.386698008 CEST5002380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:37.276810884 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:37.334304094 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:37.334364891 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:37.335886002 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:37.335957050 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:37.337691069 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:37.337748051 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:37.341484070 CEST8050023185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:37.341495037 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:37.341556072 CEST5002380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:37.341574907 CEST8050012185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:37.341628075 CEST5001280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:37.341810942 CEST5002380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:37.346647024 CEST8050023185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:38.011732101 CEST8050023185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:38.011847019 CEST5002380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:38.121054888 CEST5002380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:38.126032114 CEST8050023185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:38.452938080 CEST8050023185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:38.452996016 CEST5002380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:38.573750019 CEST5002380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:38.573944092 CEST5003480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:38.578938007 CEST8050034185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:38.579014063 CEST5003480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:38.579134941 CEST5003480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:38.579252005 CEST8050023185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:38.579298019 CEST5002380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:38.583970070 CEST8050034185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:39.285665989 CEST8050034185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:39.286238909 CEST5003480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:39.417762041 CEST5003480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:39.418106079 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:39.423433065 CEST8050034185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:39.423685074 CEST8050040185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:39.423748016 CEST5003480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:39.423785925 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:39.423918962 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:39.430526972 CEST8050040185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:40.260766029 CEST8050040185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:40.260849953 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:40.370651960 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:40.375560999 CEST8050040185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:40.606076956 CEST8050040185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:40.606161118 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:40.719654083 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:40.724837065 CEST8050040185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:40.962496042 CEST8050040185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:40.962671041 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:41.080827951 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:41.086153030 CEST8050040185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:41.346651077 CEST8050040185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:41.350317001 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:41.479872942 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:41.480195045 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:41.485837936 CEST8050048185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:41.486282110 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:41.486361980 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:41.487046957 CEST8050040185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:41.489276886 CEST5004080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:41.492079973 CEST8050048185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:42.155189991 CEST8050048185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:42.155266047 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:42.262670994 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:42.267755985 CEST8050048185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:42.494582891 CEST8050048185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:42.494684935 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:42.605087042 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:42.610163927 CEST8050048185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:42.836615086 CEST8050048185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:42.836884975 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:42.948343992 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:42.953332901 CEST8050048185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:43.189187050 CEST8050048185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:43.189266920 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:43.308146954 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:43.308496952 CEST5004980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:43.313730955 CEST8050048185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:43.313817024 CEST5004880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:43.313863039 CEST8050049185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:43.313925982 CEST5004980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:43.314028025 CEST5004980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:43.319053888 CEST8050049185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:43.976178885 CEST8050049185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:43.976286888 CEST5004980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.089176893 CEST5004980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.089468956 CEST5005080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.094360113 CEST8050050185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:44.094506979 CEST5005080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.094609022 CEST5005080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.098112106 CEST8050049185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:44.098174095 CEST5004980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.099980116 CEST8050050185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:44.770678043 CEST8050050185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:44.770834923 CEST5005080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.886313915 CEST5005080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.886624098 CEST5005180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.891987085 CEST8050050185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:44.892071962 CEST5005080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.892265081 CEST8050051185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:44.892359972 CEST5005180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.892579079 CEST5005180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:44.897911072 CEST8050051185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:45.621681929 CEST8050051185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:45.621808052 CEST5005180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:45.730238914 CEST5005180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:45.730554104 CEST5005280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:45.735699892 CEST8050052185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:45.735790968 CEST5005280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:45.735935926 CEST5005280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:45.736495018 CEST8050051185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:45.736557007 CEST5005180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:45.740890980 CEST8050052185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:46.419982910 CEST8050052185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:46.420108080 CEST5005280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:46.632901907 CEST5005280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:46.633241892 CEST5005380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:46.638674974 CEST8050052185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:46.638704062 CEST8050053185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:46.638757944 CEST5005280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:46.638808966 CEST5005380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:46.639336109 CEST5005380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:46.644198895 CEST8050053185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:47.339167118 CEST8050053185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:47.339258909 CEST5005380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:47.448745012 CEST5005380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:47.449125051 CEST5005480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:47.454185009 CEST8050054185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:47.454289913 CEST5005480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:47.454446077 CEST5005480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:47.455477953 CEST8050053185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:47.455543041 CEST5005380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:47.459902048 CEST8050054185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:48.123069048 CEST8050054185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:48.123194933 CEST5005480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:48.230498075 CEST5005480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:48.235471010 CEST8050054185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:48.463186026 CEST8050054185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:48.463337898 CEST5005480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:48.573637009 CEST5005480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:48.578773975 CEST8050054185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:48.805686951 CEST8050054185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:48.805829048 CEST5005480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:48.923924923 CEST5005480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:48.924437046 CEST5005580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:48.929653883 CEST8050055185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:48.929822922 CEST5005580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:48.930005074 CEST5005580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:48.930316925 CEST8050054185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:48.930406094 CEST5005480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:48.936067104 CEST8050055185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:49.683132887 CEST8050055185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:49.683309078 CEST5005580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:49.794440985 CEST5005580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:49.799447060 CEST8050055185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:50.025563955 CEST8050055185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:50.025649071 CEST5005580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:50.137959957 CEST5005580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:50.143234015 CEST8050055185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:50.375034094 CEST8050055185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:50.375191927 CEST5005580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:50.497339964 CEST5005580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:50.497649908 CEST5005680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:50.502552986 CEST8050056185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:50.502649069 CEST5005680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:50.502738953 CEST8050055185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:50.502811909 CEST5005580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:50.502966881 CEST5005680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:50.507802963 CEST8050056185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:51.200129986 CEST8050056185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:51.200205088 CEST5005680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:51.308438063 CEST5005680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:51.308852911 CEST5005780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:51.313728094 CEST8050057185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:51.313952923 CEST8050056185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:51.314173937 CEST5005680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:51.314192057 CEST5005780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:51.314363956 CEST5005780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:51.319360971 CEST8050057185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:51.978010893 CEST8050057185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:51.978152990 CEST5005780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.110095024 CEST5005780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.114975929 CEST5005880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.115804911 CEST8050057185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:52.115896940 CEST5005780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.121454000 CEST8050058185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:52.121560097 CEST5005880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.138506889 CEST5005880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.144756079 CEST8050058185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:52.809986115 CEST8050058185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:52.810122967 CEST5005880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.918941975 CEST5005880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.919369936 CEST5005980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.924159050 CEST8050058185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:52.924307108 CEST8050059185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:52.924341917 CEST5005880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.924410105 CEST5005980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.924617052 CEST5005980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:52.929434061 CEST8050059185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:53.600644112 CEST8050059185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:53.600729942 CEST5005980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:53.715754986 CEST5005980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:53.716159105 CEST5006080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:53.721082926 CEST8050059185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:53.721096992 CEST8050060185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:53.721141100 CEST5005980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:53.721223116 CEST5006080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:53.721366882 CEST5006080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:53.726435900 CEST8050060185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:54.407393932 CEST8050060185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:54.407555103 CEST5006080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:54.595191002 CEST5006080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:54.595520020 CEST5006180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:54.601216078 CEST8050061185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:54.601308107 CEST5006180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:54.601526022 CEST8050060185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:54.601588964 CEST5006080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:54.604406118 CEST5006180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:54.610223055 CEST8050061185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:55.269476891 CEST8050061185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:55.269629955 CEST5006180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:55.388601065 CEST5006180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:55.389118910 CEST5006280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:55.394078016 CEST8050062185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:55.394159079 CEST5006280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:55.394336939 CEST5006280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:55.394911051 CEST8050061185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:55.394980907 CEST5006180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:55.399410009 CEST8050062185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:56.070245028 CEST8050062185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:56.070446968 CEST5006280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.187928915 CEST5006280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.188111067 CEST5006380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.193238020 CEST8050063185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:56.193309069 CEST5006380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.193416119 CEST5006380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.193996906 CEST8050062185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:56.194052935 CEST5006280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.198306084 CEST8050063185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:56.859138966 CEST8050063185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:56.860281944 CEST5006380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.982465982 CEST5006380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.982875109 CEST5006480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.988006115 CEST8050063185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:56.988811970 CEST8050064185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:56.988924026 CEST5006380192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.988948107 CEST5006480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.989139080 CEST5006480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:56.994198084 CEST8050064185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:57.677911043 CEST8050064185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:57.677999020 CEST5006480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:57.796444893 CEST5006480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:57.796737909 CEST5006580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:57.801677942 CEST8050065185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:57.802046061 CEST8050064185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:57.802186966 CEST5006480192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:57.802198887 CEST5006580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:57.802550077 CEST5006580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:57.807667971 CEST8050065185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:58.466890097 CEST8050065185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:58.467221022 CEST5006580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:58.595395088 CEST5006580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:58.595757961 CEST5006680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:58.600735903 CEST8050066185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:58.600794077 CEST8050065185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:58.600814104 CEST5006680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:58.600848913 CEST5006580192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:58.601150036 CEST5006680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:58.605997086 CEST8050066185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:59.281388998 CEST8050066185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:59.281667948 CEST5006680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:59.406461000 CEST5006680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:59.406800032 CEST5006780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:59.411788940 CEST8050067185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:59.411885023 CEST8050066185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:58:59.411923885 CEST5006780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:59.412077904 CEST5006680192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:59.412267923 CEST5006780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:58:59.417124033 CEST8050067185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:00.099869013 CEST8050067185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:00.099936962 CEST5006780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:00.218458891 CEST5006780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:00.218842983 CEST5006880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:00.223767042 CEST8050068185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:00.223825932 CEST5006880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:00.223962069 CEST5006880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:00.224244118 CEST8050067185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:00.224313021 CEST5006780192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:00.229126930 CEST8050068185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:00.949871063 CEST8050068185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:00.951029062 CEST5006880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:01.091655970 CEST5006880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:01.091659069 CEST5006980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:01.310497046 CEST8050069185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:01.310573101 CEST8050068185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:01.310607910 CEST5006980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:01.310662985 CEST5006880192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:01.311279058 CEST5006980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:01.316072941 CEST8050069185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:02.016549110 CEST8050069185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:02.016628981 CEST5006980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.140081882 CEST5006980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.140466928 CEST5007080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.145756960 CEST8050069185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:02.145816088 CEST5006980192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.146541119 CEST8050070185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:02.146600008 CEST5007080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.146707058 CEST5007080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.151891947 CEST8050070185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:02.814469099 CEST8050070185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:02.819133997 CEST5007080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.966624022 CEST5007180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.966643095 CEST5007080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.971609116 CEST8050071185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:02.972126961 CEST8050070185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:02.972210884 CEST5007180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.972222090 CEST5007080192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.972338915 CEST5007180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:02.977679014 CEST8050071185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:03.644201040 CEST8050071185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:03.644310951 CEST5007180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:03.783359051 CEST5007180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:03.783910990 CEST5007280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:03.789289951 CEST8050072185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:03.789357901 CEST8050071185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:03.789499998 CEST5007180192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:03.789514065 CEST5007280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:03.789683104 CEST5007280192.168.2.4185.208.158.248
                                                                        Oct 7, 2024 17:59:03.794904947 CEST8050072185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:04.607065916 CEST8050072185.208.158.248192.168.2.4
                                                                        Oct 7, 2024 17:59:04.607148886 CEST5007280192.168.2.4185.208.158.248
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Oct 7, 2024 17:57:52.691075087 CEST5367253192.168.2.4141.98.234.31
                                                                        Oct 7, 2024 17:57:53.063499928 CEST5353672141.98.234.31192.168.2.4
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Oct 7, 2024 17:57:52.691075087 CEST192.168.2.4141.98.234.310xbb9eStandard query (0)aqplodo.ruA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Oct 7, 2024 17:57:53.063499928 CEST141.98.234.31192.168.2.40xbb9eNo error (0)aqplodo.ru185.208.158.248A (IP address)IN (0x0001)false
                                                                        • aqplodo.ru
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.449736185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:57:53.487400055 CEST317OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c1e9939d32 HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:57:54.168081045 CEST500INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:57:54 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 31 32 34 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 63 38 31 63 34 35 39 66 65 38 62 64 32 65 39 31 66 31 65 66 35 61 32 35 63 65 39 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 30 37 33 34 36 61 63 37 30 66 65 37 39 61 62 33 37 35 33 64 65 66 66 64 34 30 30 63 61 34 36 63 64 37 64 62 62 31 33 66 65 32 64 38 38 32 37 65 30 30 65 61 37 36 33 63 32 34 64 62 39 65 31 34 38 65 37 35 39 37 66 34 33 65 63 32 66 36 36 39 64 33 65 37 39 38 66 66 62 31 30 64 65 65 39 39 36 38 34 33 32 63 37 36 63 39 36 31 36 64 38 34 36 64 65 36 66 66 32 30 31 64 63 62 35 30 30 37 36 62 34 32 35 64 66 65 62 32 38 66 63 63 62 62 37 62 61 30 61 62 37 37 64 38 61 31 62 32 33 30 66 30 36 37 66 62 30 37 65 37 66 30 61 36 33 62 32 65 38 38 62 66 62 38 64 32 34 35 38 65 33 36 63 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: 12467b68a8a3203a77b0418f55f677c81c459fe8bd2e91f1ef5a25ce91585bccfb5fbc40ad9088be8de2266e208a6bb9d592de07346ac70fe79ab3753deffd400ca46cd7dbb13fe2d8827e00ea763c24db9e148e7597f43ec2f669d3e798ffb10dee9968432c76c9616d846de6ff201dcb50076b425dfeb28fccbb7ba0ab77d8a1b230f067fb07e7f0a63b2e88bfb8d2458e36c0
                                                                        Oct 7, 2024 17:57:56.763511896 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:57:57.059523106 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:57:56 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        1192.168.2.449745185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:57:57.190927982 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:57:57.866565943 CEST355INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:57:57 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 39 34 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 37 38 61 64 32 65 61 31 61 31 37 66 35 61 31 35 30 65 63 31 64 64 35 66 65 38 33 65 37 39 31 38 37 34 64 38 62 34 66 64 32 66 62 64 63 33 35 33 33 62 39 34 64 66 62 64 33 64 61 31 62 32 32 65 66 37 64 35 62 61 64 37 35 66 36 36 63 61 38 33 62 35 30 64 65 66 66 64 37 30 39 64 65 34 35 63 65 36 33 62 39 31 61 66 63 33 33 38 61 32 36 64 34 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: 9467b69c953804b26b565fe95b321bd19a55f78ad2ea1a17f5a150ec1dd5fe83e791874d8b4fd2fbdc3533b94dfbd3da1b22ef7d5bad75f66ca83b50deffd709de45ce63b91afc338a26d40


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        2192.168.2.449755185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:57:57.997629881 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:57:58.675929070 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:57:58 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        3192.168.2.449763185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:57:58.815851927 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:57:59.511159897 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:57:59 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        4192.168.2.449769185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:57:59.642822027 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:00.350697994 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:00 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        5192.168.2.449775185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:00.472176075 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:01.211257935 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:01 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        6192.168.2.449781185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:01.330440998 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:02.014760971 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:01 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        7192.168.2.449787185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:02.142714977 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:02.810313940 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:02 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        8192.168.2.449793185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:03.088171959 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:03.777740955 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:03 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:03.888042927 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:04.127588034 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:04 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        9192.168.2.449804185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:04.252830029 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:04.923023939 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:04 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        10192.168.2.449805185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:05.049487114 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:05.738296032 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:05 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        11192.168.2.449811185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:05.863377094 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:06.681232929 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:06 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        12192.168.2.449817185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:06.814289093 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:07.528353930 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:07 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:07.636814117 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:07.871728897 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:07 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:07.981862068 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:08.221014023 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:08 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        13192.168.2.449830185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:08.346561909 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:09.003329992 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:08 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        14192.168.2.449836185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:09.127531052 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:09.814729929 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:09 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        15192.168.2.449843185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:09.939609051 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:10.689481974 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:10 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        16192.168.2.449850185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:10.815943003 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:11.622282982 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:11 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        17192.168.2.449857185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:11.752441883 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:12.506978989 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:12 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:12.621397972 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:12.854371071 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:12 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:12.964771986 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:13.218678951 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:13 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        18192.168.2.449868185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:13.345268011 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:14.007879972 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:13 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        19192.168.2.449874185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:14.126900911 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:14.793001890 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:14 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:14.902237892 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:15.144532919 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:15 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        20192.168.2.449882185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:15.267201900 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:15.948304892 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:15 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        21192.168.2.449888185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:16.176589012 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:16.952806950 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:16 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        22192.168.2.449895185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:17.080024004 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:17.767163992 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:17 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        23192.168.2.449903185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:17.893942118 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:18.559060097 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:18 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        24192.168.2.449909185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:18.774178982 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:19.467020035 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:19 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        25192.168.2.449915185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:19.595103025 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:20.384314060 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:20 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:20.495733023 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:20.728635073 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:20 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:20.839449883 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:21.096522093 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:20 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        26192.168.2.449923185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:21.513631105 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:22.160795927 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:22 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        27192.168.2.449932185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:22.282953978 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:22.943171978 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:22 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        28192.168.2.449937185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:23.080976009 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:23.803204060 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:23 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        29192.168.2.449940185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:23.944780111 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:24.628051996 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:24 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        30192.168.2.449946185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:24.752033949 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:25.446913004 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:25 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:25.559312105 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:25.800800085 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:25 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        31192.168.2.449955185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:25.929153919 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:26.966705084 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:26 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:26.967757940 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:26 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        32192.168.2.449961185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:27.096662045 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:27.846415997 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:27 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        33192.168.2.449967185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:27.970478058 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:28.657535076 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:28 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        34192.168.2.449973185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:28.782854080 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:29.467581034 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:29 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        35192.168.2.449979185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:29.629942894 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:30.293579102 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:30 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        36192.168.2.449985185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:30.407929897 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:31.111376047 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:31 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        37192.168.2.449991185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:31.235914946 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:31.894685984 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:31 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        38192.168.2.449997185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:32.019562960 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:32.720289946 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:32 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        39192.168.2.450002185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:32.845439911 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:33.607148886 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:33 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:33.715961933 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:33.950836897 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:33 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:34.059240103 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:34.299566031 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:34 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        40192.168.2.450012185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:34.677134991 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:35.574359894 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:35 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:35.577440977 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:35 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:35.683559895 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:35.915074110 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:35 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:36.026978016 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:36.265167952 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:36 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:37.334304094 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:36 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:37.335886002 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:36 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:37.337691069 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:36 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        41192.168.2.450023185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:37.341810942 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:38.011732101 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:37 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:38.121054888 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:38.452938080 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:38 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        42192.168.2.450034185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:38.579134941 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:39.285665989 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:39 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        43192.168.2.450040185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:39.423918962 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:40.260766029 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:40 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:40.370651960 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:40.606076956 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:40 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:40.719654083 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:40.962496042 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:40 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:41.080827951 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:41.346651077 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:41 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        44192.168.2.450048185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:41.486361980 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:42.155189991 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:42 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:42.262670994 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:42.494582891 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:42 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:42.605087042 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:42.836615086 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:42 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:42.948343992 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:43.189187050 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:43 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        45192.168.2.450049185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:43.314028025 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:43.976178885 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:43 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        46192.168.2.450050185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:44.094609022 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:44.770678043 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:44 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        47192.168.2.450051185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:44.892579079 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:45.621681929 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:45 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        48192.168.2.450052185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:45.735935926 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:46.419982910 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:46 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        49192.168.2.450053185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:46.639336109 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:47.339167118 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:47 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        50192.168.2.450054185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:47.454446077 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:48.123069048 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:48 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:48.230498075 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:48.463186026 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:48 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:48.573637009 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:48.805686951 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:48 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        51192.168.2.450055185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:48.930005074 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:49.683132887 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:49 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:49.794440985 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:50.025563955 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:49 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20
                                                                        Oct 7, 2024 17:58:50.137959957 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:50.375034094 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:50 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        52192.168.2.450056185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:50.502966881 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:51.200129986 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:51 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        53192.168.2.450057185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:51.314363956 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:51.978010893 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:51 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        54192.168.2.450058185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:52.138506889 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:52.809986115 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:52 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        55192.168.2.450059185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:52.924617052 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:53.600644112 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:53 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        56192.168.2.450060185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:53.721366882 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:54.407393932 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:54 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        57192.168.2.450061185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:54.604406118 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:55.269476891 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:55 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        58192.168.2.450062185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:55.394336939 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:56.070245028 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:55 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        59192.168.2.450063185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:56.193416119 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:56.859138966 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:56 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        60192.168.2.450064185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:56.989139080 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:57.677911043 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:57 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        61192.168.2.450065185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:57.802550077 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:58.466890097 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:58 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        62192.168.2.450066185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:58.601150036 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:58:59.281388998 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:59 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        63192.168.2.450067185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:58:59.412267923 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:59:00.099869013 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:58:59 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        64192.168.2.450068185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:59:00.223962069 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:59:00.949871063 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:59:00 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        65192.168.2.450069185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:59:01.311279058 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:59:02.016549110 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:59:01 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        66192.168.2.450070185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:59:02.146707058 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:59:02.814469099 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:59:02 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        67192.168.2.450071185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:59:02.972338915 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:59:03.644201040 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:59:03 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        68192.168.2.450072185.208.158.248805472C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Oct 7, 2024 17:59:03.789683104 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f HTTP/1.1
                                                                        Host: aqplodo.ru
                                                                        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                        Oct 7, 2024 17:59:04.607065916 CEST220INHTTP/1.1 200 OK
                                                                        Server: nginx/1.20.1
                                                                        Date: Mon, 07 Oct 2024 15:59:04 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: keep-alive
                                                                        X-Powered-By: PHP/7.4.33
                                                                        Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                        Data Ascii: e67b680813008c20


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:11:56:56
                                                                        Start date:07/10/2024
                                                                        Path:C:\Users\user\Desktop\etwSnBeIC2.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\etwSnBeIC2.exe"
                                                                        Imagebase:0x400000
                                                                        File size:4'523'554 bytes
                                                                        MD5 hash:179D076B3FA5C27A6AB53E7113363290
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:false

                                                                        Target ID:1
                                                                        Start time:11:56:56
                                                                        Start date:07/10/2024
                                                                        Path:C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp" /SL5="$2042C,4242250,54272,C:\Users\user\Desktop\etwSnBeIC2.exe"
                                                                        Imagebase:0x400000
                                                                        File size:709'120 bytes
                                                                        MD5 hash:5F843818412603E159B8CFB0B6A0BC74
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:false

                                                                        Target ID:2
                                                                        Start time:11:56:59
                                                                        Start date:07/10/2024
                                                                        Path:C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i
                                                                        Imagebase:0x400000
                                                                        File size:3'350'528 bytes
                                                                        MD5 hash:FBEE756977ABC585C336AD6E5BFB1E9F
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2939637806.0000000002C83000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        Antivirus matches:
                                                                        • Detection: 100%, Avira
                                                                        • Detection: 100%, Joe Sandbox ML
                                                                        Reputation:low
                                                                        Has exited:false

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:21%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:2.4%
                                                                          Total number of Nodes:1504
                                                                          Total number of Limit Nodes:22
                                                                          execution_graph 4988 409c40 5029 4030dc 4988->5029 4990 409c56 5032 4042e8 4990->5032 4992 409c5b 5035 40457c GetModuleHandleA GetProcAddress 4992->5035 4998 409c6a 5052 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 4998->5052 5015 409d43 5114 4074a0 5015->5114 5017 409d05 5017->5015 5147 409aa0 5017->5147 5018 409d84 5118 407a28 5018->5118 5019 409d69 5019->5018 5020 409aa0 4 API calls 5019->5020 5020->5018 5022 409da9 5128 408b08 5022->5128 5026 409def 5027 408b08 21 API calls 5026->5027 5028 409e28 5026->5028 5027->5026 5157 403094 5029->5157 5031 4030e1 GetModuleHandleA GetCommandLineA 5031->4990 5034 404323 5032->5034 5158 403154 5032->5158 5034->4992 5036 404598 5035->5036 5037 40459f GetProcAddress 5035->5037 5036->5037 5038 4045b5 GetProcAddress 5037->5038 5039 4045ae 5037->5039 5040 4045c4 SetProcessDEPPolicy 5038->5040 5041 4045c8 5038->5041 5039->5038 5040->5041 5042 4065b8 5041->5042 5171 405c98 5042->5171 5051 406604 6F551CD0 5051->4998 5053 4090f7 5052->5053 5299 406fa0 SetErrorMode 5053->5299 5058 403198 4 API calls 5059 40913c 5058->5059 5060 409b30 GetSystemInfo VirtualQuery 5059->5060 5061 409be4 5060->5061 5064 409b5a 5060->5064 5066 409768 5061->5066 5062 409bc5 VirtualQuery 5062->5061 5062->5064 5063 409b84 VirtualProtect 5063->5064 5064->5061 5064->5062 5064->5063 5065 409bb3 VirtualProtect 5064->5065 5065->5062 5309 406bd0 GetCommandLineA 5066->5309 5068 409825 5070 4031b8 4 API calls 5068->5070 5069 406c2c 6 API calls 5073 409785 5069->5073 5071 40983f 5070->5071 5074 406c2c 5071->5074 5072 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5072->5073 5073->5068 5073->5069 5073->5072 5075 406c53 GetModuleFileNameA 5074->5075 5076 406c77 GetCommandLineA 5074->5076 5077 403278 4 API calls 5075->5077 5078 406c7c 5076->5078 5079 406c75 5077->5079 5080 406c81 5078->5080 5081 406af0 4 API calls 5078->5081 5084 406c89 5078->5084 5082 406ca4 5079->5082 5083 403198 4 API calls 5080->5083 5081->5078 5085 403198 4 API calls 5082->5085 5083->5084 5086 40322c 4 API calls 5084->5086 5087 406cb9 5085->5087 5086->5082 5088 4031e8 5087->5088 5089 4031ec 5088->5089 5092 4031fc 5088->5092 5091 403254 4 API calls 5089->5091 5089->5092 5090 403228 5094 4074e0 5090->5094 5091->5092 5092->5090 5093 4025ac 4 API calls 5092->5093 5093->5090 5095 4074ea 5094->5095 5330 407576 5095->5330 5333 407578 5095->5333 5096 407516 5097 40752a 5096->5097 5336 40748c GetLastError 5096->5336 5101 409bec FindResourceA 5097->5101 5102 409c01 5101->5102 5103 409c06 SizeofResource 5101->5103 5104 409aa0 4 API calls 5102->5104 5105 409c13 5103->5105 5106 409c18 LoadResource 5103->5106 5104->5103 5107 409aa0 4 API calls 5105->5107 5108 409c26 5106->5108 5109 409c2b LockResource 5106->5109 5107->5106 5110 409aa0 4 API calls 5108->5110 5111 409c37 5109->5111 5112 409c3c 5109->5112 5110->5109 5113 409aa0 4 API calls 5111->5113 5112->5017 5144 407918 5112->5144 5113->5112 5115 4074b4 5114->5115 5116 4074c4 5115->5116 5117 4073ec 20 API calls 5115->5117 5116->5019 5117->5116 5119 407a35 5118->5119 5120 405880 4 API calls 5119->5120 5121 407a89 5119->5121 5120->5121 5122 407918 InterlockedExchange 5121->5122 5123 407a9b 5122->5123 5124 405880 4 API calls 5123->5124 5125 407ab1 5123->5125 5124->5125 5126 407af4 5125->5126 5127 405880 4 API calls 5125->5127 5126->5022 5127->5126 5132 408b39 5128->5132 5134 408b82 5128->5134 5129 408bcd 5444 407cb8 5129->5444 5131 407cb8 21 API calls 5131->5134 5132->5134 5138 403420 4 API calls 5132->5138 5139 4031e8 4 API calls 5132->5139 5143 407cb8 21 API calls 5132->5143 5435 4034f0 5132->5435 5133 408be4 5137 4031b8 4 API calls 5133->5137 5134->5129 5134->5131 5136 4034f0 4 API calls 5134->5136 5141 4031e8 4 API calls 5134->5141 5142 403420 4 API calls 5134->5142 5136->5134 5140 408bfe 5137->5140 5138->5132 5139->5132 5154 404c10 5140->5154 5141->5134 5142->5134 5143->5132 5470 4078c4 5144->5470 5148 409ac1 5147->5148 5149 409aa9 5147->5149 5151 405880 4 API calls 5148->5151 5150 405880 4 API calls 5149->5150 5152 409abb 5150->5152 5153 409ad2 5151->5153 5152->5015 5153->5015 5155 402594 4 API calls 5154->5155 5156 404c1b 5155->5156 5156->5026 5157->5031 5159 403164 5158->5159 5160 40318c TlsGetValue 5158->5160 5159->5034 5161 403196 5160->5161 5162 40316f 5160->5162 5161->5034 5166 40310c 5162->5166 5164 403174 TlsGetValue 5165 403184 5164->5165 5165->5034 5167 403120 LocalAlloc 5166->5167 5168 403116 5166->5168 5169 403132 5167->5169 5170 40313e TlsSetValue 5167->5170 5168->5167 5169->5164 5170->5169 5243 405930 5171->5243 5174 405270 GetSystemDefaultLCID 5178 4052a6 5174->5178 5175 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5175->5178 5176 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5176->5178 5177 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5177->5178 5178->5175 5178->5176 5178->5177 5182 405308 5178->5182 5179 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5179->5182 5180 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5180->5182 5181 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5181->5182 5182->5179 5182->5180 5182->5181 5183 40538b 5182->5183 5277 4031b8 5183->5277 5186 4053b4 GetSystemDefaultLCID 5281 4051fc GetLocaleInfoA 5186->5281 5189 4031e8 4 API calls 5190 4053f4 5189->5190 5191 4051fc 5 API calls 5190->5191 5192 405409 5191->5192 5193 4051fc 5 API calls 5192->5193 5194 40542d 5193->5194 5287 405248 GetLocaleInfoA 5194->5287 5197 405248 GetLocaleInfoA 5198 40545d 5197->5198 5199 4051fc 5 API calls 5198->5199 5200 405477 5199->5200 5201 405248 GetLocaleInfoA 5200->5201 5202 405494 5201->5202 5203 4051fc 5 API calls 5202->5203 5204 4054ae 5203->5204 5205 4031e8 4 API calls 5204->5205 5206 4054bb 5205->5206 5207 4051fc 5 API calls 5206->5207 5208 4054d0 5207->5208 5209 4031e8 4 API calls 5208->5209 5210 4054dd 5209->5210 5211 405248 GetLocaleInfoA 5210->5211 5212 4054eb 5211->5212 5213 4051fc 5 API calls 5212->5213 5214 405505 5213->5214 5215 4031e8 4 API calls 5214->5215 5216 405512 5215->5216 5217 4051fc 5 API calls 5216->5217 5218 405527 5217->5218 5219 4031e8 4 API calls 5218->5219 5220 405534 5219->5220 5221 4051fc 5 API calls 5220->5221 5222 405549 5221->5222 5223 405566 5222->5223 5224 405557 5222->5224 5226 40322c 4 API calls 5223->5226 5295 40322c 5224->5295 5227 405564 5226->5227 5228 4051fc 5 API calls 5227->5228 5229 405588 5228->5229 5230 4055a5 5229->5230 5231 405596 5229->5231 5233 403198 4 API calls 5230->5233 5232 40322c 4 API calls 5231->5232 5234 4055a3 5232->5234 5233->5234 5289 4033b4 5234->5289 5236 4055c7 5237 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5236->5237 5238 4055e1 5237->5238 5239 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5238->5239 5240 4055fb 5239->5240 5241 405ce4 GetVersionExA 5240->5241 5242 405cfb 5241->5242 5242->5051 5244 40593c 5243->5244 5251 404ccc LoadStringA 5244->5251 5247 4031e8 4 API calls 5248 40596d 5247->5248 5254 403198 5248->5254 5258 403278 5251->5258 5255 4031b7 5254->5255 5256 40319e 5254->5256 5255->5174 5256->5255 5273 4025ac 5256->5273 5263 403254 5258->5263 5260 403288 5261 403198 4 API calls 5260->5261 5262 4032a0 5261->5262 5262->5247 5264 403274 5263->5264 5265 403258 5263->5265 5264->5260 5268 402594 5265->5268 5269 4025a2 5268->5269 5271 402598 5268->5271 5269->5260 5270 402632 5270->5270 5271->5269 5271->5270 5272 403154 4 API calls 5271->5272 5272->5270 5274 4025b0 5273->5274 5275 4025ba 5273->5275 5274->5275 5276 403154 4 API calls 5274->5276 5275->5255 5275->5275 5276->5275 5278 4031be 5277->5278 5279 4031e3 5278->5279 5280 4025ac 4 API calls 5278->5280 5279->5186 5280->5278 5282 405223 5281->5282 5283 405235 5281->5283 5284 403278 4 API calls 5282->5284 5285 40322c 4 API calls 5283->5285 5286 405233 5284->5286 5285->5286 5286->5189 5288 405264 5287->5288 5288->5197 5290 4033bc 5289->5290 5291 403254 4 API calls 5290->5291 5292 4033cf 5291->5292 5293 4031e8 4 API calls 5292->5293 5294 4033f7 5293->5294 5297 403230 5295->5297 5296 403252 5296->5227 5297->5296 5298 4025ac 4 API calls 5297->5298 5298->5296 5307 403414 5299->5307 5302 406fee 5303 407284 FormatMessageA 5302->5303 5304 4072aa 5303->5304 5305 403278 4 API calls 5304->5305 5306 4072c7 5305->5306 5306->5058 5308 403418 LoadLibraryA 5307->5308 5308->5302 5316 406af0 5309->5316 5311 406bf3 5312 406c05 5311->5312 5313 406af0 4 API calls 5311->5313 5314 403198 4 API calls 5312->5314 5313->5311 5315 406c1a 5314->5315 5315->5073 5317 406b1c 5316->5317 5318 403278 4 API calls 5317->5318 5319 406b29 5318->5319 5326 403420 5319->5326 5321 406b31 5322 4031e8 4 API calls 5321->5322 5323 406b49 5322->5323 5324 403198 4 API calls 5323->5324 5325 406b6b 5324->5325 5325->5311 5327 403426 5326->5327 5329 403437 5326->5329 5328 403254 4 API calls 5327->5328 5327->5329 5328->5329 5329->5321 5331 407578 5330->5331 5332 4075b7 CreateFileA 5331->5332 5332->5096 5334 403414 5333->5334 5335 4075b7 CreateFileA 5334->5335 5335->5096 5339 4073ec 5336->5339 5340 407284 5 API calls 5339->5340 5341 407414 5340->5341 5342 407434 5341->5342 5348 405184 5341->5348 5351 405880 5342->5351 5345 407443 5346 403198 4 API calls 5345->5346 5347 407460 5346->5347 5347->5097 5355 405198 5348->5355 5352 405887 5351->5352 5353 4031e8 4 API calls 5352->5353 5354 40589f 5353->5354 5354->5345 5356 4051b5 5355->5356 5363 404e48 5356->5363 5358 4051e1 5361 403278 4 API calls 5358->5361 5362 405193 5361->5362 5362->5342 5366 404e63 5363->5366 5364 404e75 5364->5358 5368 404bd4 5364->5368 5366->5364 5371 404f6a 5366->5371 5378 404e3c 5366->5378 5369 405930 5 API calls 5368->5369 5370 404be5 5369->5370 5370->5358 5372 404f7b 5371->5372 5375 404fc9 5371->5375 5374 40504f 5372->5374 5372->5375 5377 404fe7 5374->5377 5385 404e28 5374->5385 5375->5377 5381 404de4 5375->5381 5377->5366 5379 403198 4 API calls 5378->5379 5380 404e46 5379->5380 5380->5366 5382 404df2 5381->5382 5388 404bec 5382->5388 5384 404e20 5384->5375 5401 4039a4 5385->5401 5391 4059a0 5388->5391 5390 404c05 5390->5384 5392 4059ae 5391->5392 5393 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5392->5393 5394 4059d8 5393->5394 5395 405184 19 API calls 5394->5395 5396 4059e6 5395->5396 5397 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5396->5397 5398 4059f1 5397->5398 5399 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5398->5399 5400 405a0b 5399->5400 5400->5390 5402 4039ab 5401->5402 5407 4038b4 5402->5407 5404 4039cb 5405 403198 4 API calls 5404->5405 5406 4039d2 5405->5406 5406->5377 5408 4038d5 5407->5408 5409 4038c8 5407->5409 5410 403934 5408->5410 5411 4038db 5408->5411 5412 403780 6 API calls 5409->5412 5415 403993 5410->5415 5416 40393b 5410->5416 5413 4038e1 5411->5413 5414 4038ee 5411->5414 5417 4038d0 5412->5417 5418 403894 6 API calls 5413->5418 5419 403894 6 API calls 5414->5419 5420 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5415->5420 5421 403941 5416->5421 5422 40394b 5416->5422 5417->5404 5418->5417 5424 4038fc 5419->5424 5420->5417 5425 403864 9 API calls 5421->5425 5423 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5422->5423 5426 40395d 5423->5426 5427 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5424->5427 5425->5417 5428 403864 9 API calls 5426->5428 5429 403917 5427->5429 5430 403976 5428->5430 5431 40374c VariantClear 5429->5431 5432 40374c VariantClear 5430->5432 5433 40392c 5431->5433 5434 40398b 5432->5434 5433->5404 5434->5404 5436 4034fd 5435->5436 5443 40352d 5435->5443 5438 403526 5436->5438 5440 403509 5436->5440 5437 403198 4 API calls 5439 403517 5437->5439 5441 403254 4 API calls 5438->5441 5439->5132 5450 4025c4 5440->5450 5441->5443 5443->5437 5445 407cd3 5444->5445 5448 407cc8 5444->5448 5454 407c5c 5445->5454 5448->5133 5449 405880 4 API calls 5449->5448 5451 4025ca 5450->5451 5452 4025dc 5451->5452 5453 403154 4 API calls 5451->5453 5452->5439 5452->5452 5453->5452 5455 407c70 5454->5455 5456 407caf 5454->5456 5455->5456 5458 407bac 5455->5458 5456->5448 5456->5449 5459 407bb7 5458->5459 5460 407bc8 5458->5460 5461 405880 4 API calls 5459->5461 5462 4074a0 20 API calls 5460->5462 5461->5460 5463 407bdc 5462->5463 5464 4074a0 20 API calls 5463->5464 5465 407bfd 5464->5465 5466 407918 InterlockedExchange 5465->5466 5467 407c12 5466->5467 5468 407c28 5467->5468 5469 405880 4 API calls 5467->5469 5468->5455 5469->5468 5471 4078d6 5470->5471 5472 4078e7 5470->5472 5473 4078db InterlockedExchange 5471->5473 5472->5017 5473->5472 6241 404246 6243 404212 6241->6243 6242 404282 6243->6242 6244 403154 4 API calls 6243->6244 6245 404323 6244->6245 6246 409e47 6247 409e6c 6246->6247 6248 4098f4 15 API calls 6247->6248 6252 409e71 6248->6252 6249 409ec4 6280 4026c4 GetSystemTime 6249->6280 6251 409ec9 6253 409330 32 API calls 6251->6253 6252->6249 6255 408dd8 4 API calls 6252->6255 6254 409ed1 6253->6254 6256 4031e8 4 API calls 6254->6256 6257 409ea0 6255->6257 6258 409ede 6256->6258 6260 409ea8 MessageBoxA 6257->6260 6259 406928 5 API calls 6258->6259 6261 409eeb 6259->6261 6260->6249 6262 409eb5 6260->6262 6263 4066c0 5 API calls 6261->6263 6264 405854 5 API calls 6262->6264 6265 409efb 6263->6265 6264->6249 6266 406638 5 API calls 6265->6266 6267 409f0c 6266->6267 6268 403340 4 API calls 6267->6268 6269 409f1a 6268->6269 6270 4031e8 4 API calls 6269->6270 6271 409f2a 6270->6271 6272 4074e0 23 API calls 6271->6272 6273 409f69 6272->6273 6274 402594 4 API calls 6273->6274 6275 409f89 6274->6275 6276 407a28 5 API calls 6275->6276 6277 409fcb 6276->6277 6278 407cb8 21 API calls 6277->6278 6279 409ff2 6278->6279 6280->6251 6207 407548 6208 407554 CloseHandle 6207->6208 6209 40755d 6207->6209 6208->6209 6659 402b48 RaiseException 6210 407749 6211 4076dc WriteFile 6210->6211 6217 407724 6210->6217 6212 4076e8 6211->6212 6213 4076ef 6211->6213 6214 40748c 21 API calls 6212->6214 6215 407700 6213->6215 6216 4073ec 20 API calls 6213->6216 6214->6213 6216->6215 6217->6210 6218 4077e0 6217->6218 6219 4078db InterlockedExchange 6218->6219 6221 407890 6218->6221 6220 4078e7 6219->6220 6660 40294a 6663 402952 6660->6663 6661 403554 4 API calls 6661->6663 6662 402967 6663->6661 6663->6662 6664 403f4a 6665 403f53 6664->6665 6666 403f5c 6664->6666 6668 403f07 6665->6668 6671 403f09 6668->6671 6670 403f3c 6670->6666 6672 403154 4 API calls 6671->6672 6674 403e9c 6671->6674 6678 403f3d 6671->6678 6691 403e9c 6671->6691 6672->6671 6673 403ef2 6676 402674 4 API calls 6673->6676 6674->6670 6674->6673 6677 403ea9 6674->6677 6682 403e8e 6674->6682 6680 403ecf 6676->6680 6677->6680 6681 402674 4 API calls 6677->6681 6678->6666 6680->6666 6681->6680 6683 403e4c 6682->6683 6684 403e62 6683->6684 6685 403e7b 6683->6685 6687 403e67 6683->6687 6686 403cc8 4 API calls 6684->6686 6688 402674 4 API calls 6685->6688 6686->6687 6689 403e78 6687->6689 6690 402674 4 API calls 6687->6690 6688->6689 6689->6673 6689->6677 6690->6689 6692 403ed7 6691->6692 6698 403ea9 6691->6698 6694 403ef2 6692->6694 6695 403e8e 4 API calls 6692->6695 6693 403ecf 6693->6671 6696 402674 4 API calls 6694->6696 6697 403ee6 6695->6697 6696->6693 6697->6694 6697->6698 6698->6693 6699 402674 4 API calls 6698->6699 6699->6693 6708 405150 6709 405163 6708->6709 6710 404e48 19 API calls 6709->6710 6711 405177 6710->6711 6281 403a52 6282 403a74 6281->6282 6283 403a5a WriteFile 6281->6283 6283->6282 6284 403a78 GetLastError 6283->6284 6284->6282 6285 402654 6286 403154 4 API calls 6285->6286 6288 402614 6286->6288 6287 402632 6287->6287 6288->6287 6289 403154 4 API calls 6288->6289 6289->6287 5656 409e62 5657 409aa0 4 API calls 5656->5657 5658 409e67 5657->5658 5659 409e6c 5658->5659 5759 402f24 5658->5759 5693 4098f4 5659->5693 5662 409ec4 5698 4026c4 GetSystemTime 5662->5698 5664 409ec9 5699 409330 5664->5699 5665 409e71 5665->5662 5764 408dd8 5665->5764 5669 4031e8 4 API calls 5671 409ede 5669->5671 5670 409ea0 5673 409ea8 MessageBoxA 5670->5673 5717 406928 5671->5717 5673->5662 5675 409eb5 5673->5675 5767 405854 5675->5767 5680 409f0c 5744 403340 5680->5744 5682 409f1a 5683 4031e8 4 API calls 5682->5683 5684 409f2a 5683->5684 5685 4074e0 23 API calls 5684->5685 5686 409f69 5685->5686 5687 402594 4 API calls 5686->5687 5688 409f89 5687->5688 5689 407a28 5 API calls 5688->5689 5690 409fcb 5689->5690 5691 407cb8 21 API calls 5690->5691 5692 409ff2 5691->5692 5771 40953c 5693->5771 5698->5664 5702 409350 5699->5702 5703 409375 CreateDirectoryA 5702->5703 5707 408dd8 4 API calls 5702->5707 5713 407284 5 API calls 5702->5713 5716 405880 4 API calls 5702->5716 5863 406cf4 5702->5863 5886 409224 5702->5886 5905 404c84 5702->5905 5908 408da8 5702->5908 5704 4093ed 5703->5704 5705 40937f GetLastError 5703->5705 5706 40322c 4 API calls 5704->5706 5705->5702 5708 4093f7 5706->5708 5707->5702 5709 4031b8 4 API calls 5708->5709 5711 409411 5709->5711 5712 4031b8 4 API calls 5711->5712 5714 40941e 5712->5714 5713->5702 5714->5669 5716->5702 6018 406820 5717->6018 5720 403454 4 API calls 5721 40694a 5720->5721 5722 4066c0 5721->5722 6023 4068e4 5722->6023 5725 4066f0 5727 403340 4 API calls 5725->5727 5726 4066fe 5728 403454 4 API calls 5726->5728 5730 4066fc 5727->5730 5729 406711 5728->5729 5731 403340 4 API calls 5729->5731 5732 403198 4 API calls 5730->5732 5731->5730 5733 406733 5732->5733 5734 406638 5733->5734 5735 406642 5734->5735 5736 406665 5734->5736 6029 406950 5735->6029 5737 40322c 4 API calls 5736->5737 5739 40666e 5737->5739 5739->5680 5740 406649 5740->5736 5741 406654 5740->5741 5742 403340 4 API calls 5741->5742 5743 406662 5742->5743 5743->5680 5745 403344 5744->5745 5746 4033a5 5744->5746 5747 40334c 5745->5747 5749 4031e8 5745->5749 5747->5746 5750 4031e8 4 API calls 5747->5750 5753 40335b 5747->5753 5748 403228 5748->5682 5752 403254 4 API calls 5749->5752 5754 4031fc 5749->5754 5750->5753 5751 403254 4 API calls 5756 403375 5751->5756 5752->5754 5753->5751 5754->5748 5755 4025ac 4 API calls 5754->5755 5755->5748 5757 4031e8 4 API calls 5756->5757 5758 4033a1 5757->5758 5758->5682 5760 403154 4 API calls 5759->5760 5761 402f29 5760->5761 6035 402bcc 5761->6035 5763 402f51 5763->5763 5765 408da8 4 API calls 5764->5765 5766 408df4 5765->5766 5766->5670 5768 405859 5767->5768 5769 405930 5 API calls 5768->5769 5770 40586b 5769->5770 5770->5770 5777 40955b 5771->5777 5772 409590 5774 40959d GetUserDefaultLangID 5772->5774 5779 409592 5772->5779 5773 409594 5789 407024 GetModuleHandleA GetProcAddress 5773->5789 5774->5779 5777->5772 5777->5773 5778 40956f 5777->5778 5783 409884 5778->5783 5779->5778 5780 4095cb GetACP 5779->5780 5781 4095ef 5779->5781 5780->5778 5780->5779 5781->5778 5782 409615 GetACP 5781->5782 5782->5778 5782->5781 5784 40988c 5783->5784 5788 4098c6 5783->5788 5785 403420 4 API calls 5784->5785 5784->5788 5786 4098c0 5785->5786 5847 408e80 5786->5847 5788->5665 5790 407067 5789->5790 5791 40705e 5789->5791 5792 407070 5790->5792 5793 4070a8 5790->5793 5802 403198 4 API calls 5791->5802 5810 406f68 5792->5810 5795 406f68 RegOpenKeyExA 5793->5795 5797 4070c1 5795->5797 5796 407089 5798 4070de 5796->5798 5813 406f5c 5796->5813 5797->5798 5799 406f5c 6 API calls 5797->5799 5800 40322c 4 API calls 5798->5800 5803 4070d5 RegCloseKey 5799->5803 5804 4070eb 5800->5804 5806 407120 5802->5806 5803->5798 5816 4032fc 5804->5816 5808 403198 4 API calls 5806->5808 5809 407128 5808->5809 5809->5779 5811 406f73 5810->5811 5812 406f79 RegOpenKeyExA 5810->5812 5811->5812 5812->5796 5830 406e10 5813->5830 5817 403300 5816->5817 5818 40333f 5816->5818 5819 40330a 5817->5819 5824 4031e8 5817->5824 5818->5791 5820 403334 5819->5820 5821 40331d 5819->5821 5823 4034f0 4 API calls 5820->5823 5825 4034f0 4 API calls 5821->5825 5822 403228 5822->5791 5829 403322 5823->5829 5826 403254 4 API calls 5824->5826 5827 4031fc 5824->5827 5825->5829 5826->5827 5827->5822 5828 4025ac 4 API calls 5827->5828 5828->5822 5829->5791 5831 406e36 RegQueryValueExA 5830->5831 5832 406e7b 5831->5832 5837 406e59 5831->5837 5834 403198 4 API calls 5832->5834 5833 406e73 5835 403198 4 API calls 5833->5835 5836 406f47 RegCloseKey 5834->5836 5835->5832 5836->5798 5837->5832 5837->5833 5838 403278 4 API calls 5837->5838 5839 403420 4 API calls 5837->5839 5838->5837 5840 406eb0 RegQueryValueExA 5839->5840 5840->5831 5841 406ecc 5840->5841 5841->5832 5842 4034f0 4 API calls 5841->5842 5843 406f0e 5842->5843 5844 406f20 5843->5844 5846 403420 4 API calls 5843->5846 5845 4031e8 4 API calls 5844->5845 5845->5832 5846->5844 5848 408e8e 5847->5848 5850 408ea6 5848->5850 5860 408e18 5848->5860 5851 408e18 4 API calls 5850->5851 5852 408eca 5850->5852 5851->5852 5853 407918 InterlockedExchange 5852->5853 5854 408ee5 5853->5854 5855 408e18 4 API calls 5854->5855 5856 408ef8 5854->5856 5855->5856 5857 408e18 4 API calls 5856->5857 5858 403278 4 API calls 5856->5858 5859 408f27 5856->5859 5857->5856 5858->5856 5859->5788 5861 405880 4 API calls 5860->5861 5862 408e29 5861->5862 5862->5850 5912 406a58 5863->5912 5866 406d26 5867 406a58 5 API calls 5866->5867 5870 406d72 5866->5870 5869 406d36 5867->5869 5871 406a34 7 API calls 5869->5871 5872 406d42 5869->5872 5920 406888 5870->5920 5871->5872 5872->5870 5875 406a58 5 API calls 5872->5875 5883 406d67 5872->5883 5878 406d5b 5875->5878 5877 406638 5 API calls 5879 406d87 5877->5879 5881 406a34 7 API calls 5878->5881 5878->5883 5880 40322c 4 API calls 5879->5880 5882 406d91 5880->5882 5881->5883 5884 4031b8 4 API calls 5882->5884 5883->5870 5932 406cc8 GetWindowsDirectoryA 5883->5932 5885 406dab 5884->5885 5885->5702 5887 409244 5886->5887 5888 406638 5 API calls 5887->5888 5889 40925d 5888->5889 5890 40322c 4 API calls 5889->5890 5897 409268 5890->5897 5891 406978 6 API calls 5891->5897 5893 4033b4 4 API calls 5893->5897 5894 408dd8 4 API calls 5894->5897 5896 405880 4 API calls 5896->5897 5897->5891 5897->5893 5897->5894 5897->5896 5898 4092e4 5897->5898 5972 4091b0 5897->5972 5980 409034 5897->5980 5899 40322c 4 API calls 5898->5899 5900 4092ef 5899->5900 5901 4031b8 4 API calls 5900->5901 5902 409309 5901->5902 5903 403198 4 API calls 5902->5903 5904 409311 5903->5904 5904->5702 5906 405198 19 API calls 5905->5906 5907 404ca2 5906->5907 5907->5702 5909 408dc8 5908->5909 6008 408c80 5909->6008 5913 4034f0 4 API calls 5912->5913 5914 406a6b 5913->5914 5915 406a82 GetEnvironmentVariableA 5914->5915 5919 406a95 5914->5919 5934 406dec 5914->5934 5915->5914 5916 406a8e 5915->5916 5917 403198 4 API calls 5916->5917 5917->5919 5919->5866 5929 406a34 5919->5929 5921 403414 5920->5921 5922 4068ab GetFullPathNameA 5921->5922 5923 4068b7 5922->5923 5924 4068ce 5922->5924 5923->5924 5925 4068bf 5923->5925 5926 40322c 4 API calls 5924->5926 5928 403278 4 API calls 5925->5928 5927 4068cc 5926->5927 5927->5877 5928->5927 5938 4069dc 5929->5938 5933 406ce9 5932->5933 5933->5870 5935 406dfa 5934->5935 5936 4034f0 4 API calls 5935->5936 5937 406e08 5936->5937 5937->5914 5945 406978 5938->5945 5940 4069fe 5941 406a06 GetFileAttributesA 5940->5941 5942 406a1b 5941->5942 5943 403198 4 API calls 5942->5943 5944 406a23 5943->5944 5944->5866 5955 406744 5945->5955 5947 4069b0 5950 4069c6 5947->5950 5951 4069bb 5947->5951 5949 406989 5949->5947 5962 406970 CharPrevA 5949->5962 5963 403454 5950->5963 5952 40322c 4 API calls 5951->5952 5954 4069c4 5952->5954 5954->5940 5959 406755 5955->5959 5956 4067b9 5957 4067b4 5956->5957 5958 406680 IsDBCSLeadByte 5956->5958 5957->5949 5958->5957 5959->5956 5960 406773 5959->5960 5960->5957 5970 406680 IsDBCSLeadByte 5960->5970 5962->5949 5964 403486 5963->5964 5965 403459 5963->5965 5966 403198 4 API calls 5964->5966 5965->5964 5968 40346d 5965->5968 5967 40347c 5966->5967 5967->5954 5969 403278 4 API calls 5968->5969 5969->5967 5971 406694 5970->5971 5971->5960 5973 403198 4 API calls 5972->5973 5975 4091d1 5973->5975 5977 4091fe 5975->5977 5989 4032a8 5975->5989 5992 403494 5975->5992 5978 403198 4 API calls 5977->5978 5979 409213 5978->5979 5979->5897 5996 408f70 5980->5996 5982 40904a 5983 40904e 5982->5983 6002 406a48 5982->6002 5983->5897 5986 409081 6005 408fac 5986->6005 5990 403278 4 API calls 5989->5990 5991 4032b5 5990->5991 5991->5975 5993 4034c3 5992->5993 5994 403498 5992->5994 5993->5975 5995 4034f0 4 API calls 5994->5995 5995->5993 5997 408f7a 5996->5997 5998 408f7e 5996->5998 5997->5982 5999 408fa0 SetLastError 5998->5999 6000 408f87 Wow64DisableWow64FsRedirection 5998->6000 6001 408f9b 5999->6001 6000->6001 6001->5982 6003 4069dc 7 API calls 6002->6003 6004 406a52 GetLastError 6003->6004 6004->5986 6006 408fb1 Wow64RevertWow64FsRedirection 6005->6006 6007 408fbb 6005->6007 6006->6007 6007->5897 6009 403198 4 API calls 6008->6009 6010 408cb1 6008->6010 6009->6010 6012 408cc8 6010->6012 6014 403278 4 API calls 6010->6014 6016 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6010->6016 6017 408cdc 6010->6017 6011 4031b8 4 API calls 6013 408d69 6011->6013 6015 4032fc 4 API calls 6012->6015 6013->5702 6014->6010 6015->6017 6016->6010 6017->6011 6019 406744 IsDBCSLeadByte 6018->6019 6021 406835 6019->6021 6020 40687f 6020->5720 6021->6020 6022 406680 IsDBCSLeadByte 6021->6022 6022->6021 6024 4068f3 6023->6024 6025 406820 IsDBCSLeadByte 6024->6025 6028 4068fe 6025->6028 6026 4066ea 6026->5725 6026->5726 6027 406680 IsDBCSLeadByte 6027->6028 6028->6026 6028->6027 6030 406957 6029->6030 6031 40695b 6029->6031 6030->5740 6034 406970 CharPrevA 6031->6034 6033 40696c 6033->5740 6034->6033 6036 402bd5 RaiseException 6035->6036 6037 402be6 6035->6037 6036->6037 6037->5763 6290 402e64 6291 402e69 6290->6291 6292 402e7a RtlUnwind 6291->6292 6293 402e5e 6291->6293 6294 402e9d 6292->6294 6311 40667c IsDBCSLeadByte 6312 406694 6311->6312 6724 403f7d 6725 403fa2 6724->6725 6728 403f84 6724->6728 6727 403e8e 4 API calls 6725->6727 6725->6728 6726 403f8c 6727->6728 6728->6726 6729 402674 4 API calls 6728->6729 6730 403fca 6729->6730 6737 403d02 6739 403d12 6737->6739 6738 403ddf ExitProcess 6739->6738 6740 403db8 6739->6740 6742 403dea 6739->6742 6747 403da4 6739->6747 6748 403d8f MessageBoxA 6739->6748 6741 403cc8 4 API calls 6740->6741 6743 403dc2 6741->6743 6744 403cc8 4 API calls 6743->6744 6745 403dcc 6744->6745 6757 4019dc 6745->6757 6753 403fe4 6747->6753 6748->6740 6749 403dd1 6749->6738 6749->6742 6754 403fe8 6753->6754 6755 403f07 4 API calls 6754->6755 6756 404006 6755->6756 6758 401abb 6757->6758 6759 4019ed 6757->6759 6758->6749 6760 401a04 RtlEnterCriticalSection 6759->6760 6761 401a0e LocalFree 6759->6761 6760->6761 6762 401a41 6761->6762 6763 401a2f VirtualFree 6762->6763 6764 401a49 6762->6764 6763->6762 6765 401a70 LocalFree 6764->6765 6766 401a87 6764->6766 6765->6765 6765->6766 6767 401aa9 RtlDeleteCriticalSection 6766->6767 6768 401a9f RtlLeaveCriticalSection 6766->6768 6767->6749 6768->6767 6321 404206 6322 4041cc 6321->6322 6325 40420a 6321->6325 6323 404282 6324 403154 4 API calls 6326 404323 6324->6326 6325->6323 6325->6324 6327 402c08 6330 402c82 6327->6330 6331 402c19 6327->6331 6328 402c56 RtlUnwind 6329 403154 4 API calls 6328->6329 6329->6330 6331->6328 6331->6330 6334 402b28 6331->6334 6335 402b31 RaiseException 6334->6335 6336 402b47 6334->6336 6335->6336 6336->6328 6337 408c10 6338 408c17 6337->6338 6339 403198 4 API calls 6338->6339 6346 408cb1 6339->6346 6340 408cdc 6341 4031b8 4 API calls 6340->6341 6343 408d69 6341->6343 6342 408cc8 6345 4032fc 4 API calls 6342->6345 6344 403278 4 API calls 6344->6346 6345->6340 6346->6340 6346->6342 6346->6344 6347 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6346->6347 6347->6346 6348 40a011 6349 40a036 6348->6349 6350 407918 InterlockedExchange 6349->6350 6352 40a060 6350->6352 6351 40a070 6358 4076ac SetEndOfFile 6351->6358 6352->6351 6353 409aa0 4 API calls 6352->6353 6353->6351 6355 40a08c 6356 4025ac 4 API calls 6355->6356 6357 40a0c3 6356->6357 6359 4076c3 6358->6359 6360 4076bc 6358->6360 6359->6355 6361 40748c 21 API calls 6360->6361 6361->6359 6773 409916 6774 409918 6773->6774 6775 409956 CallWindowProcA 6774->6775 6776 40993a 6774->6776 6775->6776 6089 407017 6090 407008 SetErrorMode 6089->6090 6366 403018 6367 403070 6366->6367 6368 403025 6366->6368 6369 40302a RtlUnwind 6368->6369 6370 40304e 6369->6370 6372 402f78 6370->6372 6373 402be8 6370->6373 6374 402bf1 RaiseException 6373->6374 6375 402c04 6373->6375 6374->6375 6375->6367 6783 409918 6784 40993a 6783->6784 6786 409927 6783->6786 6785 409956 CallWindowProcA 6785->6784 6786->6784 6786->6785 6380 40901e 6381 409010 6380->6381 6382 408fac Wow64RevertWow64FsRedirection 6381->6382 6383 409018 6382->6383 6384 409020 SetLastError 6385 409029 6384->6385 6396 403a28 ReadFile 6397 403a46 6396->6397 6398 403a49 GetLastError 6396->6398 6227 40762c ReadFile 6228 407663 6227->6228 6229 40764c 6227->6229 6230 407652 GetLastError 6229->6230 6231 40765c 6229->6231 6230->6228 6230->6231 6232 40748c 21 API calls 6231->6232 6232->6228 6403 40a02c 6404 409aa0 4 API calls 6403->6404 6405 40a031 6404->6405 6406 40a036 6405->6406 6407 402f24 5 API calls 6405->6407 6408 407918 InterlockedExchange 6406->6408 6407->6406 6409 40a060 6408->6409 6410 40a070 6409->6410 6411 409aa0 4 API calls 6409->6411 6412 4076ac 22 API calls 6410->6412 6411->6410 6413 40a08c 6412->6413 6414 4025ac 4 API calls 6413->6414 6415 40a0c3 6414->6415 6787 40712e 6788 407118 6787->6788 6789 403198 4 API calls 6788->6789 6790 407120 6789->6790 6791 403198 4 API calls 6790->6791 6792 407128 6791->6792 6793 408f30 6796 408dfc 6793->6796 6798 408e05 6796->6798 6797 403198 4 API calls 6797->6798 6798->6797 6799 408e13 6798->6799 6800 403932 6801 403924 6800->6801 6804 40374c 6801->6804 6803 40392c 6805 403766 6804->6805 6806 403759 6804->6806 6805->6803 6806->6805 6807 403779 VariantClear 6806->6807 6807->6803 6038 4075c4 SetFilePointer 6039 4075f7 6038->6039 6040 4075e7 GetLastError 6038->6040 6040->6039 6041 4075f0 6040->6041 6042 40748c 21 API calls 6041->6042 6042->6039 6416 405ac4 6417 405ad4 6416->6417 6418 405acc 6416->6418 6419 405ad2 6418->6419 6420 405adb 6418->6420 6423 405a3c 6419->6423 6421 405930 5 API calls 6420->6421 6421->6417 6424 405a44 6423->6424 6425 405a5e 6424->6425 6426 403154 4 API calls 6424->6426 6427 405a63 6425->6427 6428 405a7a 6425->6428 6426->6424 6429 405930 5 API calls 6427->6429 6430 403154 4 API calls 6428->6430 6431 405a76 6429->6431 6432 405a7f 6430->6432 6434 403154 4 API calls 6431->6434 6433 4059a0 19 API calls 6432->6433 6433->6431 6435 405aa8 6434->6435 6436 403154 4 API calls 6435->6436 6437 405ab6 6436->6437 6437->6417 6438 4076c8 WriteFile 6439 4076e8 6438->6439 6440 4076ef 6438->6440 6441 40748c 21 API calls 6439->6441 6442 407700 6440->6442 6443 4073ec 20 API calls 6440->6443 6441->6440 6443->6442 6444 40a2ca 6453 4096fc 6444->6453 6447 402f24 5 API calls 6448 40a2d4 6447->6448 6449 403198 4 API calls 6448->6449 6450 40a2f3 6449->6450 6451 403198 4 API calls 6450->6451 6452 40a2fb 6451->6452 6462 40569c 6453->6462 6455 409745 6458 403198 4 API calls 6455->6458 6456 409717 6456->6455 6468 40720c 6456->6468 6460 40975a 6458->6460 6459 409735 6461 40973d MessageBoxA 6459->6461 6460->6447 6461->6455 6463 403154 4 API calls 6462->6463 6464 4056a1 6463->6464 6465 4056b9 6464->6465 6466 403154 4 API calls 6464->6466 6465->6456 6467 4056af 6466->6467 6467->6456 6469 40569c 4 API calls 6468->6469 6470 40721b 6469->6470 6471 407221 6470->6471 6472 40722f 6470->6472 6473 40322c 4 API calls 6471->6473 6475 40724b 6472->6475 6476 40723f 6472->6476 6474 40722d 6473->6474 6474->6459 6486 4032b8 6475->6486 6479 4071d0 6476->6479 6480 40322c 4 API calls 6479->6480 6481 4071df 6480->6481 6482 4071fc 6481->6482 6483 406950 CharPrevA 6481->6483 6482->6474 6484 4071eb 6483->6484 6484->6482 6485 4032fc 4 API calls 6484->6485 6485->6482 6487 403278 4 API calls 6486->6487 6488 4032c2 6487->6488 6488->6474 6489 402ccc 6490 402cdd 6489->6490 6494 402cfe 6489->6494 6491 402d88 RtlUnwind 6490->6491 6493 402b28 RaiseException 6490->6493 6490->6494 6492 403154 4 API calls 6491->6492 6492->6494 6495 402d7f 6493->6495 6495->6491 6816 403fcd 6817 403f07 4 API calls 6816->6817 6818 403fd6 6817->6818 6819 403e9c 4 API calls 6818->6819 6820 403fe2 6819->6820 5474 4024d0 5475 4024e4 5474->5475 5476 4024f7 5474->5476 5513 401918 RtlInitializeCriticalSection 5475->5513 5478 402518 5476->5478 5479 40250e RtlEnterCriticalSection 5476->5479 5490 402300 5478->5490 5479->5478 5482 4024ed 5484 402525 5487 402581 5484->5487 5488 402577 RtlLeaveCriticalSection 5484->5488 5486 402531 5486->5484 5520 40215c 5486->5520 5488->5487 5491 402314 5490->5491 5492 402335 5491->5492 5494 4023b8 5491->5494 5493 402344 5492->5493 5534 401b74 5492->5534 5493->5484 5500 401fd4 5493->5500 5494->5493 5498 402455 5494->5498 5537 401d80 5494->5537 5545 401e84 5494->5545 5498->5493 5541 401d00 5498->5541 5501 401fe8 5500->5501 5502 401ffb 5500->5502 5504 401918 4 API calls 5501->5504 5503 402012 RtlEnterCriticalSection 5502->5503 5507 40201c 5502->5507 5503->5507 5505 401fed 5504->5505 5505->5502 5506 401ff1 5505->5506 5510 402052 5506->5510 5507->5510 5627 401ee0 5507->5627 5510->5486 5511 402147 5511->5486 5512 40213d RtlLeaveCriticalSection 5512->5511 5514 40193c RtlEnterCriticalSection 5513->5514 5515 401946 5513->5515 5514->5515 5516 401964 LocalAlloc 5515->5516 5517 40197e 5516->5517 5518 4019c3 RtlLeaveCriticalSection 5517->5518 5519 4019cd 5517->5519 5518->5519 5519->5476 5519->5482 5521 40217a 5520->5521 5522 402175 5520->5522 5524 4021ab RtlEnterCriticalSection 5521->5524 5527 4021b5 5521->5527 5528 40217e 5521->5528 5523 401918 4 API calls 5522->5523 5523->5521 5524->5527 5525 4021c1 5529 4022e3 RtlLeaveCriticalSection 5525->5529 5530 4022ed 5525->5530 5526 402244 5526->5528 5531 401d80 7 API calls 5526->5531 5527->5525 5527->5526 5532 402270 5527->5532 5528->5484 5529->5530 5530->5484 5531->5528 5532->5525 5533 401d00 7 API calls 5532->5533 5533->5525 5535 40215c 9 API calls 5534->5535 5536 401b95 5535->5536 5536->5493 5538 401d92 5537->5538 5539 401d89 5537->5539 5538->5494 5539->5538 5540 401b74 9 API calls 5539->5540 5540->5538 5542 401d4e 5541->5542 5543 401d1e 5541->5543 5542->5543 5550 401c68 5542->5550 5543->5493 5605 401768 5545->5605 5547 401e99 5548 401ea6 5547->5548 5616 401dcc 5547->5616 5548->5494 5551 401c7a 5550->5551 5552 401c9d 5551->5552 5553 401caf 5551->5553 5563 40188c 5552->5563 5554 40188c 3 API calls 5553->5554 5556 401cad 5554->5556 5557 401cc5 5556->5557 5573 401b44 5556->5573 5557->5543 5559 401cd4 5560 401cee 5559->5560 5578 401b98 5559->5578 5583 4013a0 5560->5583 5564 4018b2 5563->5564 5565 40190b 5563->5565 5587 401658 5564->5587 5565->5556 5570 4018e6 5570->5565 5572 4013a0 LocalAlloc 5570->5572 5572->5565 5574 401b61 5573->5574 5575 401b52 5573->5575 5574->5559 5576 401d00 9 API calls 5575->5576 5577 401b5f 5576->5577 5577->5559 5579 401b9d 5578->5579 5581 401bab 5578->5581 5580 401b74 9 API calls 5579->5580 5582 401baa 5580->5582 5581->5560 5582->5560 5584 4013ab 5583->5584 5585 4013c6 5584->5585 5586 4012e4 LocalAlloc 5584->5586 5585->5557 5586->5585 5589 40168f 5587->5589 5588 4016cf 5591 40132c 5588->5591 5589->5588 5590 4016a9 VirtualFree 5589->5590 5590->5589 5592 401348 5591->5592 5599 4012e4 5592->5599 5595 40150c 5598 40153b 5595->5598 5596 401594 5596->5570 5597 401568 VirtualFree 5597->5598 5598->5596 5598->5597 5602 40128c 5599->5602 5603 401298 LocalAlloc 5602->5603 5604 4012aa 5602->5604 5603->5604 5604->5570 5604->5595 5606 401787 5605->5606 5607 40183b 5606->5607 5608 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5606->5608 5609 40132c LocalAlloc 5606->5609 5611 401821 5606->5611 5613 4017d6 5606->5613 5615 4017e7 5607->5615 5623 4015c4 5607->5623 5608->5606 5609->5606 5612 40150c VirtualFree 5611->5612 5612->5615 5614 40150c VirtualFree 5613->5614 5614->5615 5615->5547 5617 401d80 9 API calls 5616->5617 5618 401de0 5617->5618 5619 40132c LocalAlloc 5618->5619 5620 401df0 5619->5620 5621 401df8 5620->5621 5622 401b44 9 API calls 5620->5622 5621->5548 5622->5621 5624 40160a 5623->5624 5625 40163a 5624->5625 5626 401626 VirtualAlloc 5624->5626 5625->5615 5626->5624 5626->5625 5630 401ef0 5627->5630 5628 401f1c 5629 401d00 9 API calls 5628->5629 5632 401f40 5628->5632 5629->5632 5630->5628 5630->5632 5633 401e58 5630->5633 5632->5511 5632->5512 5638 4016d8 5633->5638 5636 401e75 5636->5630 5637 401dcc 9 API calls 5637->5636 5642 4016f4 5638->5642 5639 4016fe 5641 4015c4 VirtualAlloc 5639->5641 5646 40170a 5641->5646 5642->5639 5643 40175b 5642->5643 5644 40132c LocalAlloc 5642->5644 5645 40174f 5642->5645 5648 401430 5642->5648 5643->5636 5643->5637 5644->5642 5647 40150c VirtualFree 5645->5647 5646->5643 5647->5643 5649 40143f VirtualAlloc 5648->5649 5651 40146c 5649->5651 5652 40148f 5649->5652 5653 4012e4 LocalAlloc 5651->5653 5652->5642 5654 401478 5653->5654 5654->5652 5655 40147c VirtualFree 5654->5655 5655->5652 6496 4028d2 6497 4028da 6496->6497 6498 403554 4 API calls 6497->6498 6499 4028ef 6497->6499 6498->6497 6500 4025ac 4 API calls 6499->6500 6501 4028f4 6500->6501 6821 4019d3 6822 4019ba 6821->6822 6823 4019c3 RtlLeaveCriticalSection 6822->6823 6824 4019cd 6822->6824 6823->6824 6043 407fd4 6044 407fe6 6043->6044 6046 407fed 6043->6046 6054 407f10 6044->6054 6047 408015 6046->6047 6048 408017 6046->6048 6052 408021 6046->6052 6068 407e2c 6047->6068 6065 407d7c 6048->6065 6049 40804e 6051 407d7c 19 API calls 6051->6049 6052->6049 6052->6051 6055 407f25 6054->6055 6056 407d7c 19 API calls 6055->6056 6057 407f34 6055->6057 6056->6057 6058 407f6e 6057->6058 6059 407d7c 19 API calls 6057->6059 6060 407f82 6058->6060 6061 407d7c 19 API calls 6058->6061 6059->6058 6064 407fae 6060->6064 6075 407eb8 6060->6075 6061->6060 6064->6046 6078 4058b4 6065->6078 6067 407d9e 6067->6052 6069 405184 19 API calls 6068->6069 6070 407e57 6069->6070 6086 407de4 6070->6086 6072 407e5f 6073 403198 4 API calls 6072->6073 6074 407e74 6073->6074 6074->6052 6076 407ec7 VirtualFree 6075->6076 6077 407ed9 VirtualAlloc 6075->6077 6076->6077 6077->6064 6079 4058c0 6078->6079 6080 405184 19 API calls 6079->6080 6081 4058ed 6080->6081 6082 4031e8 4 API calls 6081->6082 6083 4058f8 6082->6083 6084 403198 4 API calls 6083->6084 6085 40590d 6084->6085 6085->6067 6087 4058b4 19 API calls 6086->6087 6088 407e06 6087->6088 6088->6072 6506 40a0d5 6507 40a105 6506->6507 6508 40a10f CreateWindowExA SetWindowLongA 6507->6508 6509 405184 19 API calls 6508->6509 6510 40a192 6509->6510 6511 4032fc 4 API calls 6510->6511 6512 40a1a0 6511->6512 6513 4032fc 4 API calls 6512->6513 6514 40a1ad 6513->6514 6515 406b7c 5 API calls 6514->6515 6516 40a1b9 6515->6516 6517 4032fc 4 API calls 6516->6517 6518 40a1c2 6517->6518 6519 4099a4 29 API calls 6518->6519 6520 40a1d4 6519->6520 6521 409884 5 API calls 6520->6521 6522 40a1e7 6520->6522 6521->6522 6523 40a220 6522->6523 6524 4094d8 9 API calls 6522->6524 6525 40a239 6523->6525 6528 40a233 RemoveDirectoryA 6523->6528 6524->6523 6526 40a242 73A25CF0 6525->6526 6527 40a24d 6525->6527 6526->6527 6529 40a275 6527->6529 6530 40357c 4 API calls 6527->6530 6528->6525 6531 40a26b 6530->6531 6532 4025ac 4 API calls 6531->6532 6532->6529 6091 40a0e7 6092 40a0eb SetLastError 6091->6092 6123 409648 GetLastError 6092->6123 6095 40a105 6097 40a10f CreateWindowExA SetWindowLongA 6095->6097 6096 402f24 5 API calls 6096->6095 6098 405184 19 API calls 6097->6098 6099 40a192 6098->6099 6100 4032fc 4 API calls 6099->6100 6101 40a1a0 6100->6101 6102 4032fc 4 API calls 6101->6102 6103 40a1ad 6102->6103 6136 406b7c GetCommandLineA 6103->6136 6106 4032fc 4 API calls 6107 40a1c2 6106->6107 6141 4099a4 6107->6141 6110 409884 5 API calls 6111 40a1e7 6110->6111 6112 40a220 6111->6112 6113 40a207 6111->6113 6115 40a239 6112->6115 6118 40a233 RemoveDirectoryA 6112->6118 6157 4094d8 6113->6157 6116 40a242 73A25CF0 6115->6116 6117 40a24d 6115->6117 6116->6117 6119 40a275 6117->6119 6165 40357c 6117->6165 6118->6115 6121 40a26b 6122 4025ac 4 API calls 6121->6122 6122->6119 6124 404c84 19 API calls 6123->6124 6125 40968f 6124->6125 6126 407284 5 API calls 6125->6126 6127 40969f 6126->6127 6128 408da8 4 API calls 6127->6128 6129 4096b4 6128->6129 6130 405880 4 API calls 6129->6130 6131 4096c3 6130->6131 6132 4031b8 4 API calls 6131->6132 6133 4096e2 6132->6133 6134 403198 4 API calls 6133->6134 6135 4096ea 6134->6135 6135->6095 6135->6096 6137 406af0 4 API calls 6136->6137 6138 406ba1 6137->6138 6139 403198 4 API calls 6138->6139 6140 406bbf 6139->6140 6140->6106 6142 4033b4 4 API calls 6141->6142 6143 4099df 6142->6143 6144 409a11 CreateProcessA 6143->6144 6145 409a24 CloseHandle 6144->6145 6146 409a1d 6144->6146 6148 409a2d 6145->6148 6147 409648 21 API calls 6146->6147 6147->6145 6178 409978 6148->6178 6151 409a49 6152 409978 3 API calls 6151->6152 6153 409a4e GetExitCodeProcess CloseHandle 6152->6153 6154 409a6e 6153->6154 6155 403198 4 API calls 6154->6155 6156 409a76 6155->6156 6156->6110 6156->6111 6158 409532 6157->6158 6160 4094eb 6157->6160 6158->6112 6159 4094f3 Sleep 6159->6160 6160->6158 6160->6159 6161 409503 Sleep 6160->6161 6163 40951a GetLastError 6160->6163 6182 408fbc 6160->6182 6161->6160 6163->6158 6164 409524 GetLastError 6163->6164 6164->6158 6164->6160 6166 403591 6165->6166 6167 4035a0 6165->6167 6170 4035d0 6166->6170 6171 40359b 6166->6171 6175 4035b6 6166->6175 6168 4035b1 6167->6168 6169 4035b8 6167->6169 6172 403198 4 API calls 6168->6172 6173 4031b8 4 API calls 6169->6173 6170->6175 6176 40357c 4 API calls 6170->6176 6171->6167 6174 4035ec 6171->6174 6172->6175 6173->6175 6174->6175 6190 403554 6174->6190 6175->6121 6176->6170 6179 40998c PeekMessageA 6178->6179 6180 409980 TranslateMessage DispatchMessageA 6179->6180 6181 40999e MsgWaitForMultipleObjects 6179->6181 6180->6179 6181->6148 6181->6151 6183 408f70 2 API calls 6182->6183 6184 408fd2 6183->6184 6185 408fd6 6184->6185 6186 408ff2 DeleteFileA GetLastError 6184->6186 6185->6160 6187 409010 6186->6187 6188 408fac Wow64RevertWow64FsRedirection 6187->6188 6189 409018 6188->6189 6189->6160 6191 403566 6190->6191 6193 403578 6191->6193 6194 403604 6191->6194 6193->6174 6195 40357c 6194->6195 6196 4035a0 6195->6196 6199 4035b6 6195->6199 6200 4035d0 6195->6200 6201 40359b 6195->6201 6197 4035b1 6196->6197 6198 4035b8 6196->6198 6202 403198 4 API calls 6197->6202 6203 4031b8 4 API calls 6198->6203 6199->6191 6200->6199 6204 40357c 4 API calls 6200->6204 6201->6196 6206 4035ec 6201->6206 6202->6199 6203->6199 6204->6200 6205 403554 4 API calls 6205->6206 6206->6199 6206->6205 6828 402be9 RaiseException 6829 402c04 6828->6829 6539 402af2 6540 402afe 6539->6540 6543 402ed0 6540->6543 6544 403154 4 API calls 6543->6544 6546 402ee0 6544->6546 6545 402b03 6546->6545 6548 402b0c 6546->6548 6549 402b25 6548->6549 6550 402b15 RaiseException 6548->6550 6549->6545 6550->6549 6830 402dfa 6831 402e26 6830->6831 6832 402e0d 6830->6832 6834 402ba4 6832->6834 6835 402bc9 6834->6835 6836 402bad 6834->6836 6835->6831 6837 402bb5 RaiseException 6836->6837 6837->6835 6838 4075fa GetFileSize 6839 407626 6838->6839 6840 407616 GetLastError 6838->6840 6840->6839 6841 40761f 6840->6841 6842 40748c 21 API calls 6841->6842 6842->6839 6843 406ffb 6844 407008 SetErrorMode 6843->6844 6555 403a80 CloseHandle 6556 403a90 6555->6556 6557 403a91 GetLastError 6555->6557 6558 40a282 6560 40a1f4 6558->6560 6559 40a220 6562 40a239 6559->6562 6565 40a233 RemoveDirectoryA 6559->6565 6560->6559 6561 4094d8 9 API calls 6560->6561 6561->6559 6563 40a242 73A25CF0 6562->6563 6564 40a24d 6562->6564 6563->6564 6566 40a275 6564->6566 6567 40357c 4 API calls 6564->6567 6565->6562 6568 40a26b 6567->6568 6569 4025ac 4 API calls 6568->6569 6569->6566 6570 404283 6571 4042c3 6570->6571 6572 403154 4 API calls 6571->6572 6573 404323 6572->6573 6845 404185 6847 4041ff 6845->6847 6846 4041cc 6847->6846 6848 404282 6847->6848 6849 403154 4 API calls 6847->6849 6850 404323 6849->6850 6574 40a287 6575 40a290 6574->6575 6578 40a2bb 6574->6578 6584 409448 6575->6584 6577 40a295 6577->6578 6582 40a2b3 MessageBoxA 6577->6582 6579 403198 4 API calls 6578->6579 6580 40a2f3 6579->6580 6581 403198 4 API calls 6580->6581 6583 40a2fb 6581->6583 6582->6578 6585 409454 GetCurrentProcess OpenProcessToken 6584->6585 6586 4094af ExitWindowsEx 6584->6586 6587 409466 6585->6587 6588 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6585->6588 6586->6587 6587->6577 6588->6586 6588->6587 6589 403e87 6590 403e4c 6589->6590 6591 403e62 6590->6591 6592 403e7b 6590->6592 6596 403e67 6590->6596 6598 403cc8 6591->6598 6594 402674 4 API calls 6592->6594 6595 403e78 6594->6595 6596->6595 6602 402674 6596->6602 6599 403cd6 6598->6599 6600 402674 4 API calls 6599->6600 6601 403ceb 6599->6601 6600->6601 6601->6596 6603 403154 4 API calls 6602->6603 6604 40267a 6603->6604 6604->6595 6609 407e90 6610 407eb8 VirtualFree 6609->6610 6611 407e9d 6610->6611 6859 403991 6860 403983 6859->6860 6861 40374c VariantClear 6860->6861 6862 40398b 6861->6862 6863 405b92 6865 405b94 6863->6865 6864 405bd0 6868 405930 5 API calls 6864->6868 6865->6864 6866 405be7 6865->6866 6867 405bca 6865->6867 6871 404ccc 5 API calls 6866->6871 6867->6864 6869 405c3c 6867->6869 6876 405be3 6868->6876 6870 4059a0 19 API calls 6869->6870 6870->6876 6873 405c10 6871->6873 6872 403198 4 API calls 6874 405c76 6872->6874 6875 4059a0 19 API calls 6873->6875 6875->6876 6876->6872 6614 403e95 6615 403e4c 6614->6615 6616 403e67 6615->6616 6617 403e62 6615->6617 6618 403e7b 6615->6618 6621 403e78 6616->6621 6622 402674 4 API calls 6616->6622 6619 403cc8 4 API calls 6617->6619 6620 402674 4 API calls 6618->6620 6619->6616 6620->6621 6622->6621 6623 403a97 6624 403aac 6623->6624 6625 403bbc GetStdHandle 6624->6625 6626 403b0e CreateFileA 6624->6626 6635 403ab2 6624->6635 6627 403c17 GetLastError 6625->6627 6640 403bba 6625->6640 6626->6627 6628 403b2c 6626->6628 6627->6635 6630 403b3b GetFileSize 6628->6630 6628->6640 6630->6627 6631 403b4e SetFilePointer 6630->6631 6631->6627 6636 403b6a ReadFile 6631->6636 6632 403be7 GetFileType 6634 403c02 CloseHandle 6632->6634 6632->6635 6634->6635 6636->6627 6637 403b8c 6636->6637 6638 403b9f SetFilePointer 6637->6638 6637->6640 6638->6627 6639 403bb0 SetEndOfFile 6638->6639 6639->6627 6639->6640 6640->6632 6640->6635 6895 4011aa 6896 4011ac GetStdHandle 6895->6896 6233 4076ac SetEndOfFile 6234 4076c3 6233->6234 6235 4076bc 6233->6235 6236 40748c 21 API calls 6235->6236 6236->6234 6644 4028ac 6645 402594 4 API calls 6644->6645 6646 4028b6 6645->6646 6647 401ab9 6648 401a96 6647->6648 6649 401aa9 RtlDeleteCriticalSection 6648->6649 6650 401a9f RtlLeaveCriticalSection 6648->6650 6650->6649

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 116 409b30-409b54 GetSystemInfo VirtualQuery 117 409be4-409beb 116->117 118 409b5a 116->118 119 409bd9-409bde 118->119 119->117 120 409b5c-409b63 119->120 121 409bc5-409bd7 VirtualQuery 120->121 122 409b65-409b69 120->122 121->117 121->119 122->121 123 409b6b-409b73 122->123 124 409b84-409b95 VirtualProtect 123->124 125 409b75-409b78 123->125 127 409b97 124->127 128 409b99-409b9b 124->128 125->124 126 409b7a-409b7d 125->126 126->124 129 409b7f-409b82 126->129 127->128 130 409baa-409bad 128->130 129->124 129->128 131 409b9d-409ba6 call 409b28 130->131 132 409baf-409bb1 130->132 131->130 132->121 133 409bb3-409bc0 VirtualProtect 132->133 133->121
                                                                          APIs
                                                                          • GetSystemInfo.KERNEL32(?), ref: 00409B42
                                                                          • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B4D
                                                                          • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409B8E
                                                                          • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BC0
                                                                          • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409BD0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Virtual$ProtectQuery$InfoSystem
                                                                          • String ID:
                                                                          • API String ID: 2441996862-0
                                                                          • Opcode ID: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                                          • Instruction ID: 3002c4020e31fcb34e6ffc2d5983d7aa910ebdc8277ab133fd4bc27d875cdae8
                                                                          • Opcode Fuzzy Hash: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                                          • Instruction Fuzzy Hash: F4219DB12003046BD7709AA99C85E5777E9EB85370F04082BFA89E32D3D239FC40C669
                                                                          APIs
                                                                          • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: InfoLocale
                                                                          • String ID:
                                                                          • API String ID: 2299586839-0
                                                                          • Opcode ID: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                                          • Instruction ID: f5e54e9283223dc3068d295e9d46a059fb55c29f9ef527c49189185961fa2cd4
                                                                          • Opcode Fuzzy Hash: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                                          • Instruction Fuzzy Hash: 42E0927170021426D710A9A99C86AEB735CEB58310F4002BFB908E73C6EDB49E844AEE

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,?,00409C60), ref: 00404582
                                                                          • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                          • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                          • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                          • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00409C60), ref: 004045C6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleModulePolicyProcess
                                                                          • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                          • API String ID: 3256987805-3653653586
                                                                          • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                          • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                          • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                          • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • SetLastError.KERNEL32 ref: 0040A0F4
                                                                            • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,020815BC), ref: 0040966C
                                                                          • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                                          • SetWindowLongA.USER32(0002042C,000000FC,00409918), ref: 0040A148
                                                                          • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                                          • 73A25CF0.USER32(0002042C,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastWindow$CreateDirectoryLongRemove
                                                                          • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                          • API String ID: 3341979996-3001827809
                                                                          • Opcode ID: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                                          • Instruction ID: a1ec2b29f79e5ff862fc4fad7e4f310b8339f10a1453332cc6b7faa73b6a426b
                                                                          • Opcode Fuzzy Hash: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                                          • Instruction Fuzzy Hash: C2411F71600205DFD710EBA9EE8AB9977A4EB45304F10467EF514B73E2CBB8A811CB9D

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090C4
                                                                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090DE
                                                                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                          • API String ID: 1646373207-2130885113
                                                                          • Opcode ID: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                                          • Instruction ID: 4a4222b704d734fa8d0781b40c04fe9f9c76e7b4f133337d95099c0c8a01123f
                                                                          • Opcode Fuzzy Hash: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                                          • Instruction Fuzzy Hash: 20017170748342AEFB00BB72DD4AB163A68E785704F50457BF5407A2D3DABD4C04DA6D

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                                          • SetWindowLongA.USER32(0002042C,000000FC,00409918), ref: 0040A148
                                                                            • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040A1B9,?), ref: 00406B94
                                                                            • Part of subcall function 004099A4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020815BC,00409A90,00000000,00409A77), ref: 00409A14
                                                                            • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020815BC,00409A90,00000000), ref: 00409A28
                                                                            • Part of subcall function 004099A4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                            • Part of subcall function 004099A4: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                            • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020815BC,00409A90), ref: 00409A5C
                                                                          • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                                          • 73A25CF0.USER32(0002042C,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                          • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                          • API String ID: 978128352-3001827809
                                                                          • Opcode ID: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                                          • Instruction ID: f39d198f6ca78f9e57da3cbf677d536b45cc778db879de651171db1d1b5627bc
                                                                          • Opcode Fuzzy Hash: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                                          • Instruction Fuzzy Hash: 07411A71604204DFD714EBA9EE86B5A77A4EB49304F10427EE514B73E1CBB8A810CB9D

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020815BC,00409A90,00000000,00409A77), ref: 00409A14
                                                                          • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020815BC,00409A90,00000000), ref: 00409A28
                                                                          • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                          • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                          • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020815BC,00409A90), ref: 00409A5C
                                                                            • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,020815BC), ref: 0040966C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                          • String ID: D
                                                                          • API String ID: 3356880605-2746444292
                                                                          • Opcode ID: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                                          • Instruction ID: 6ea97129cf5aa135a7f7046e3a99eae43c862e8aca722617c6144c18eae127a8
                                                                          • Opcode Fuzzy Hash: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                                          • Instruction Fuzzy Hash: 3A1142B17442486EDB10EBE68C42FAEB7ACEF49714F50017BB604F72C2DA785D048A69

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Message
                                                                          • String ID: .tmp$y@
                                                                          • API String ID: 2030045667-2396523267
                                                                          • Opcode ID: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                                          • Instruction ID: eba11cc0b212557bcf85e4c41764595d0d3f2f842990b0293eb01d0c1562b25b
                                                                          • Opcode Fuzzy Hash: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                                          • Instruction Fuzzy Hash: 9841BD30600200DFC711EF25DE96A5A77A5EB49304B50463AF804B73E2CBB9AC05CBED

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Message
                                                                          • String ID: .tmp$y@
                                                                          • API String ID: 2030045667-2396523267
                                                                          • Opcode ID: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                                          • Instruction ID: fef9de22095f7e51d457e3baefdda2d393bbfb66a144e2f6f14d312cbfdc2d61
                                                                          • Opcode Fuzzy Hash: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                                          • Instruction Fuzzy Hash: 3A418D70610204DFC711EF25DED6A5A77A5EB49308B50463AF804B73E2CBB9AC05CBAD

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                          • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateDirectoryErrorLast
                                                                          • String ID: .tmp
                                                                          • API String ID: 1375471231-2986845003
                                                                          • Opcode ID: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                                          • Instruction ID: a1094b0e4056d8a2da25745c6e48f9a4b2523a9a3c4edc503687ab74cbc79d39
                                                                          • Opcode Fuzzy Hash: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                                          • Instruction Fuzzy Hash: 3A213674A002099BDB05FFA1C9429DEB7B9EF48304F50457BE901B73C2DA7C9E059AA5

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 321 407749-40774a 322 4076dc-4076e6 WriteFile 321->322 323 40774c-40776f 321->323 325 4076e8-4076ea call 40748c 322->325 326 4076ef-4076f2 322->326 324 407770-407785 323->324 330 407787 324->330 331 4077f9 324->331 325->326 328 407700-407704 326->328 329 4076f4-4076fb call 4073ec 326->329 329->328 333 40778a-40778f 330->333 334 4077fd-407802 330->334 335 40783b-40783d 331->335 336 4077fb 331->336 339 407803-407819 333->339 341 407791-407792 333->341 334->339 337 407841-407843 335->337 336->334 340 40785b-40785c 337->340 339->340 351 40781b 339->351 342 4078d6-4078eb call 407890 InterlockedExchange 340->342 343 40785e-40788c 340->343 344 407724-407741 341->344 345 407794-4077b4 341->345 366 407912-407917 342->366 367 4078ed-407910 342->367 360 407820-407823 343->360 361 407890-407893 343->361 347 407743 344->347 348 4077b5 344->348 345->348 352 407746-407747 347->352 353 4077b9 347->353 356 4077b6-4077b7 348->356 357 4077f7-4077f8 348->357 358 40781e-40781f 351->358 352->321 359 4077bb-4077cd 352->359 353->359 356->353 357->331 358->360 359->337 363 4077cf-4077d4 359->363 364 407824 360->364 365 407898 360->365 361->365 363->335 371 4077d6-4077de 363->371 369 407825 364->369 370 40789a 364->370 365->370 367->366 367->367 372 407896-407897 369->372 373 407826-40782d 369->373 374 40789f 370->374 371->324 384 4077e0 371->384 372->365 375 4078a1 373->375 377 40782f 373->377 374->375 378 4078a3 375->378 379 4078ac 375->379 381 407832-407833 377->381 382 4078a5-4078aa 377->382 378->382 383 4078ae-4078af 379->383 381->335 381->358 382->383 383->374 385 4078b1-4078bd 383->385 384->357 385->365 386 4078bf-4078c0 385->386
                                                                          APIs
                                                                          • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite
                                                                          • String ID:
                                                                          • API String ID: 3934441357-0
                                                                          • Opcode ID: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                                          • Instruction ID: ef7112967ca92329f6454244f41010afd6781152a6d2bd16d4b387d8db15cd6b
                                                                          • Opcode Fuzzy Hash: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                                          • Instruction Fuzzy Hash: F951D12294D2910FC7126B7849685A53FE0FE5331532E92FBC5C1AB1A3D27CA847D35B

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 387 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                          APIs
                                                                          • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                          • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLibraryLoadMode
                                                                          • String ID:
                                                                          • API String ID: 2987862817-0
                                                                          • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                          • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                          • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                          • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 397 40766c-407691 SetFilePointer 398 4076a3-4076a8 397->398 399 407693-40769a GetLastError 397->399 399->398 400 40769c-40769e call 40748c 399->400 400->398
                                                                          APIs
                                                                          • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                          • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                            • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$FilePointer
                                                                          • String ID:
                                                                          • API String ID: 1156039329-0
                                                                          • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                          • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                          • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                          • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 391 40762c-40764a ReadFile 392 407663-40766a 391->392 393 40764c-407650 391->393 394 407652-40765a GetLastError 393->394 395 40765c-40765e call 40748c 393->395 394->392 394->395 395->392
                                                                          APIs
                                                                          • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                          • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorFileLastRead
                                                                          • String ID:
                                                                          • API String ID: 1948546556-0
                                                                          • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                          • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                          • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                          • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 402 4075c4-4075e5 SetFilePointer 403 4075f7-4075f9 402->403 404 4075e7-4075ee GetLastError 402->404 404->403 405 4075f0-4075f2 call 40748c 404->405 405->403
                                                                          APIs
                                                                          • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                          • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                            • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$FilePointer
                                                                          • String ID:
                                                                          • API String ID: 1156039329-0
                                                                          • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                          • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                          • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                          • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                          APIs
                                                                          • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Virtual$AllocFree
                                                                          • String ID:
                                                                          • API String ID: 2087232378-0
                                                                          • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                          • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                          • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                          • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                                          APIs
                                                                          • GetSystemDefaultLCID.KERNEL32(00000000,004053A6), ref: 0040528F
                                                                            • Part of subcall function 00404CCC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CE9
                                                                            • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: DefaultInfoLoadLocaleStringSystem
                                                                          • String ID:
                                                                          • API String ID: 1658689577-0
                                                                          • Opcode ID: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                                          • Instruction ID: 2407abf821673f044c2d0b48b7a4a38d2d1f2757cafa01d062fe92b1f2c090cc
                                                                          • Opcode Fuzzy Hash: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                                          • Instruction Fuzzy Hash: 73314D75E0010AABCB00DF95C8C19EEB379FF84304F158977E815BB285E739AE059B98
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID:
                                                                          • API String ID: 823142352-0
                                                                          • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                          • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                          • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                          • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID:
                                                                          • API String ID: 823142352-0
                                                                          • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                          • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                          • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                          • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                          APIs
                                                                          • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AttributesFile
                                                                          • String ID:
                                                                          • API String ID: 3188754299-0
                                                                          • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                          • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                          • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                          • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                          APIs
                                                                          • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                            • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorFileLastWrite
                                                                          • String ID:
                                                                          • API String ID: 442123175-0
                                                                          • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                          • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                          • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                          • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                          APIs
                                                                          • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FormatMessage
                                                                          • String ID:
                                                                          • API String ID: 1306739567-0
                                                                          • Opcode ID: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                                          • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                          • Opcode Fuzzy Hash: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                                          • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                          APIs
                                                                          • SetEndOfFile.KERNEL32(?,02093FF4,0040A08C,00000000), ref: 004076B3
                                                                            • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorFileLast
                                                                          • String ID:
                                                                          • API String ID: 734332943-0
                                                                          • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                          • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                          • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                          • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                          APIs
                                                                          • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorMode
                                                                          • String ID:
                                                                          • API String ID: 2340568224-0
                                                                          • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                          • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                          • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                          • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                          APIs
                                                                          • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorMode
                                                                          • String ID:
                                                                          • API String ID: 2340568224-0
                                                                          • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                          • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                          • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                          • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                          APIs
                                                                          • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CharPrev
                                                                          • String ID:
                                                                          • API String ID: 122130370-0
                                                                          • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                          • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                          • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                          • Instruction Fuzzy Hash:
                                                                          APIs
                                                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                                          • Instruction ID: 20a67eb23ea55951ef5110b519d4bcc97d420124264edb02c1094051c82f9398
                                                                          • Opcode Fuzzy Hash: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                                          • Instruction Fuzzy Hash: D2117571A042059BDB00EF19C881B5B7794AF44359F05807EF958AB3C6DB38EC00CBAA
                                                                          APIs
                                                                          • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FreeVirtual
                                                                          • String ID:
                                                                          • API String ID: 1263568516-0
                                                                          • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                          • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                          • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                          • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle
                                                                          • String ID:
                                                                          • API String ID: 2962429428-0
                                                                          • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                          • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                          • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                          • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                          APIs
                                                                          • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FreeVirtual
                                                                          • String ID:
                                                                          • API String ID: 1263568516-0
                                                                          • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                          • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                          • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                          • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                          • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040949D
                                                                          • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004094A2
                                                                          • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                          • String ID: SeShutdownPrivilege
                                                                          • API String ID: 107509674-3733053543
                                                                          • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                          • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                          • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                          • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                          APIs
                                                                          • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409BF6
                                                                          • SizeofResource.KERNEL32(00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 00409C09
                                                                          • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000), ref: 00409C1B
                                                                          • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5), ref: 00409C2C
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Resource$FindLoadLockSizeof
                                                                          • String ID:
                                                                          • API String ID: 3473537107-0
                                                                          • Opcode ID: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                                          • Instruction ID: ed04ed1443b666af2c347742ca0221af59beed1f1180006ed42e296f861e82c7
                                                                          • Opcode Fuzzy Hash: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                                          • Instruction Fuzzy Hash: ECE07EA0B483562AFA6076FB08C2B2A018C4BA671DF40003BB701B92C3DEBD8C14856E
                                                                          APIs
                                                                          • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: InfoLocale
                                                                          • String ID:
                                                                          • API String ID: 2299586839-0
                                                                          • Opcode ID: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                                          • Instruction ID: 297a7c39c0825e6b478cba46507f56ab37b47465b1590baa0f4eee863dd3b982
                                                                          • Opcode Fuzzy Hash: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                                          • Instruction Fuzzy Hash: AED05EA630E6502AE21051AB2D85EBB4A9CCEC5BA4F18407FF648D7242D6248C069B76
                                                                          APIs
                                                                          • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: SystemTime
                                                                          • String ID:
                                                                          • API String ID: 2656138-0
                                                                          • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                          • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                          • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                          • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                          APIs
                                                                          • GetVersionExA.KERNEL32(?,004065E0,00000000,004065EE,?,?,?,?,?,00409C65), ref: 00405CF2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Version
                                                                          • String ID:
                                                                          • API String ID: 1889659487-0
                                                                          • Opcode ID: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                                          • Instruction ID: 3c95a3e10eaf3ff9c271e05f7503c1a51fdcfb4de7972086e3eff1de8b037954
                                                                          • Opcode Fuzzy Hash: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                                          • Instruction Fuzzy Hash: FDC012A040070186D7109B31EC02B1672D4AB44310F440539AEA4953C2E73C80018A5A
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                          • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                          • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                          • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 0040704D
                                                                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                          • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 004070A1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressCloseHandleModuleProc
                                                                          • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                          • API String ID: 4190037839-2401316094
                                                                          • Opcode ID: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                                          • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                          • Opcode Fuzzy Hash: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                                          • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                          • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                          • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                          • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                          • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                          • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                          • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                          • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                          • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                          • String ID:
                                                                          • API String ID: 1694776339-0
                                                                          • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                          • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                          • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                          • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                          APIs
                                                                          • GetSystemDefaultLCID.KERNEL32(00000000,004055FC,?,?,?,?,00000000,00000000,00000000,?,004065DB,00000000,004065EE), ref: 004053CE
                                                                            • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                            • Part of subcall function 00405248: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: InfoLocale$DefaultSystem
                                                                          • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                          • API String ID: 1044490935-665933166
                                                                          • Opcode ID: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                                          • Instruction ID: af1252b4c964b6680b9f9af4a0d1ea0fc67f86ffa9d2e4d8722b1cefb330e960
                                                                          • Opcode Fuzzy Hash: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                                          • Instruction Fuzzy Hash: 25515334B04548ABDB00EBA59C91A9F776AEB89304F50947BB504BB3C6CA3DCE059B5C
                                                                          APIs
                                                                          • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                          • LocalFree.KERNEL32(004D09A0,00000000,00401AB4), ref: 00401A1B
                                                                          • VirtualFree.KERNEL32(?,00000000,00008000,004D09A0,00000000,00401AB4), ref: 00401A3A
                                                                          • LocalFree.KERNEL32(004CE0D8,?,00000000,00008000,004D09A0,00000000,00401AB4), ref: 00401A79
                                                                          • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                          • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                          • String ID:
                                                                          • API String ID: 3782394904-0
                                                                          • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                          • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                          • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                          • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                          APIs
                                                                          • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                          • ExitProcess.KERNEL32 ref: 00403DE5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ExitMessageProcess
                                                                          • String ID: Error$Runtime error at 00000000$9@
                                                                          • API String ID: 1220098344-1503883590
                                                                          • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                          • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                          • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                          • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                          APIs
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                          • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide$AllocString
                                                                          • String ID:
                                                                          • API String ID: 262959230-0
                                                                          • Opcode ID: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                                          • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                          • Opcode Fuzzy Hash: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                                          • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(00000000,00409C56), ref: 004030E3
                                                                          • GetCommandLineA.KERNEL32(00000000,00409C56), ref: 004030EE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CommandHandleLineModule
                                                                          • String ID: U1hd.@$%K
                                                                          • API String ID: 2123368496-2600722078
                                                                          • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                          • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                          • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                          • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                          APIs
                                                                          • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                          • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                          • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                          • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                          • String ID:
                                                                          • API String ID: 730355536-0
                                                                          • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                          • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                          • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                          • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                                          APIs
                                                                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,004098D0,00000000), ref: 00406E4C
                                                                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue
                                                                          • String ID: )q@
                                                                          • API String ID: 3660427363-2284170586
                                                                          • Opcode ID: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                                          • Instruction ID: 7350e5e82036d2c0193b98364cdb321f9e6d5b5bf7e48a12e03045d443e4f3bd
                                                                          • Opcode Fuzzy Hash: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                                          • Instruction Fuzzy Hash: DC414C31D0021AAFDB21DF95C881BAFB7B8EB05704F56457AE901B7280D738AF108B99
                                                                          APIs
                                                                          • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 004094F7
                                                                          • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409507
                                                                          • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 0040951A
                                                                          • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409524
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2938756977.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.2938733061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938777278.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2938794107.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastSleep
                                                                          • String ID:
                                                                          • API String ID: 1458359878-0
                                                                          • Opcode ID: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                                          • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                          • Opcode Fuzzy Hash: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                                          • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                          Execution Graph

                                                                          Execution Coverage:16%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:4.3%
                                                                          Total number of Nodes:2000
                                                                          Total number of Limit Nodes:69
                                                                          execution_graph 49670 40cf00 49671 40cf0d 49670->49671 49673 40cf12 49670->49673 49674 406f50 CloseHandle 49671->49674 49674->49673 55818 4413a4 55819 4413ad 55818->55819 55820 4413bb WriteFile 55818->55820 55819->55820 55821 4413c6 55820->55821 49675 492208 49676 49223c 49675->49676 49677 49223e 49676->49677 49678 492252 49676->49678 49821 446fac 18 API calls 49677->49821 49681 492261 49678->49681 49683 49228e 49678->49683 49680 492247 Sleep 49695 492289 49680->49695 49811 447008 49681->49811 49687 4922ca 49683->49687 49688 49229d 49683->49688 49685 492270 49689 492278 FindWindowA 49685->49689 49693 4922d9 49687->49693 49694 492320 49687->49694 49690 447008 18 API calls 49688->49690 49815 447288 49689->49815 49692 4922aa 49690->49692 49697 4922b2 FindWindowA 49692->49697 49822 446fac 18 API calls 49693->49822 49700 49237c 49694->49700 49701 49232f 49694->49701 49861 403420 49695->49861 49699 447288 5 API calls 49697->49699 49698 4922e5 49823 446fac 18 API calls 49698->49823 49703 4922c5 49699->49703 49710 4923d8 49700->49710 49711 49238b 49700->49711 49826 446fac 18 API calls 49701->49826 49703->49695 49705 4922f2 49824 446fac 18 API calls 49705->49824 49706 49233b 49827 446fac 18 API calls 49706->49827 49709 4922ff 49825 446fac 18 API calls 49709->49825 49721 492412 49710->49721 49722 4923e7 49710->49722 49831 446fac 18 API calls 49711->49831 49713 492348 49828 446fac 18 API calls 49713->49828 49715 492397 49832 446fac 18 API calls 49715->49832 49717 49230a SendMessageA 49720 447288 5 API calls 49717->49720 49719 492355 49829 446fac 18 API calls 49719->49829 49720->49703 49730 492421 49721->49730 49731 492460 49721->49731 49725 447008 18 API calls 49722->49725 49723 4923a4 49833 446fac 18 API calls 49723->49833 49728 4923f4 49725->49728 49727 492360 PostMessageA 49830 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49727->49830 49733 4923fc RegisterClipboardFormatA 49728->49733 49729 4923b1 49834 446fac 18 API calls 49729->49834 49836 446fac 18 API calls 49730->49836 49739 49246f 49731->49739 49740 4924b4 49731->49740 49736 447288 5 API calls 49733->49736 49736->49695 49737 4923bc SendNotifyMessageA 49835 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49737->49835 49738 49242d 49837 446fac 18 API calls 49738->49837 49839 446fac 18 API calls 49739->49839 49749 492508 49740->49749 49750 4924c3 49740->49750 49744 49243a 49838 446fac 18 API calls 49744->49838 49745 49247b 49840 446fac 18 API calls 49745->49840 49748 492445 SendMessageA 49753 447288 5 API calls 49748->49753 49758 49256a 49749->49758 49759 492517 49749->49759 49843 446fac 18 API calls 49750->49843 49752 492488 49841 446fac 18 API calls 49752->49841 49753->49703 49754 4924cf 49844 446fac 18 API calls 49754->49844 49757 492493 PostMessageA 49842 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49757->49842 49766 492579 49758->49766 49767 4925f1 49758->49767 49762 447008 18 API calls 49759->49762 49760 4924dc 49845 446fac 18 API calls 49760->49845 49764 492524 49762->49764 49847 42e3a4 SetErrorMode 49764->49847 49765 4924e7 SendNotifyMessageA 49846 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49765->49846 49770 447008 18 API calls 49766->49770 49776 492600 49767->49776 49777 492626 49767->49777 49774 492588 49770->49774 49771 492531 49772 492547 GetLastError 49771->49772 49773 492537 49771->49773 49778 447288 5 API calls 49772->49778 49775 447288 5 API calls 49773->49775 49850 446fac 18 API calls 49774->49850 49779 492545 49775->49779 49855 446fac 18 API calls 49776->49855 49786 492658 49777->49786 49787 492635 49777->49787 49778->49779 49783 447288 5 API calls 49779->49783 49782 49260a FreeLibrary 49856 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49782->49856 49783->49695 49784 49259b GetProcAddress 49788 4925e1 49784->49788 49789 4925a7 49784->49789 49794 492667 49786->49794 49800 49269b 49786->49800 49790 447008 18 API calls 49787->49790 49854 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49788->49854 49851 446fac 18 API calls 49789->49851 49792 492641 49790->49792 49798 492649 CreateMutexA 49792->49798 49857 48c638 18 API calls 49794->49857 49795 4925b3 49852 446fac 18 API calls 49795->49852 49798->49695 49799 4925c0 49803 447288 5 API calls 49799->49803 49800->49695 49859 48c638 18 API calls 49800->49859 49802 492673 49804 492684 OemToCharBuffA 49802->49804 49805 4925d1 49803->49805 49858 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49804->49858 49853 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49805->49853 49808 4926b6 49809 4926c7 CharToOemBuffA 49808->49809 49860 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49809->49860 49812 447010 49811->49812 49865 436088 49812->49865 49814 44702f 49814->49685 49816 447290 49815->49816 49919 4363f0 VariantClear 49816->49919 49818 4472ca 49818->49695 49819 4472b3 49819->49818 49920 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49819->49920 49821->49680 49822->49698 49823->49705 49824->49709 49825->49717 49826->49706 49827->49713 49828->49719 49829->49727 49830->49703 49831->49715 49832->49723 49833->49729 49834->49737 49835->49695 49836->49738 49837->49744 49838->49748 49839->49745 49840->49752 49841->49757 49842->49703 49843->49754 49844->49760 49845->49765 49846->49695 49921 403738 49847->49921 49850->49784 49851->49795 49852->49799 49853->49703 49854->49703 49855->49782 49856->49695 49857->49802 49858->49695 49859->49808 49860->49695 49863 403426 49861->49863 49862 40344b 49863->49862 49864 402660 4 API calls 49863->49864 49864->49863 49866 436094 49865->49866 49882 4360b6 49865->49882 49866->49882 49885 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49866->49885 49867 436139 49894 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49867->49894 49869 436121 49889 403494 49869->49889 49870 436109 49874 403510 4 API calls 49870->49874 49871 4360fd 49886 403510 49871->49886 49872 43612d 49893 4040e8 18 API calls 49872->49893 49879 436112 49874->49879 49878 43614a 49878->49814 49879->49814 49880 436115 49880->49814 49882->49867 49882->49869 49882->49870 49882->49871 49882->49872 49882->49880 49883 436136 49883->49814 49885->49882 49895 4034e0 49886->49895 49891 403498 49889->49891 49890 4034ba 49890->49814 49891->49890 49892 402660 4 API calls 49891->49892 49892->49890 49893->49883 49894->49878 49900 4034bc 49895->49900 49897 4034f0 49905 403400 49897->49905 49901 4034c0 49900->49901 49902 4034dc 49900->49902 49909 402648 49901->49909 49902->49897 49904 4034c9 49904->49897 49906 403406 49905->49906 49907 40341f 49905->49907 49906->49907 49914 402660 49906->49914 49907->49814 49910 40264c 49909->49910 49911 402656 49909->49911 49910->49911 49913 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49910->49913 49911->49904 49911->49911 49913->49911 49915 402664 49914->49915 49916 40266e 49914->49916 49915->49916 49918 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49915->49918 49916->49907 49916->49916 49918->49916 49919->49819 49920->49818 49922 40373c LoadLibraryA 49921->49922 49922->49771 49923 402584 49924 402598 49923->49924 49925 4025ab 49923->49925 49953 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49924->49953 49927 4025c2 RtlEnterCriticalSection 49925->49927 49928 4025cc 49925->49928 49927->49928 49939 4023b4 13 API calls 49928->49939 49929 40259d 49929->49925 49931 4025a1 49929->49931 49932 4025d5 49933 4025d9 49932->49933 49940 402088 49932->49940 49935 402635 49933->49935 49936 40262b RtlLeaveCriticalSection 49933->49936 49936->49935 49937 4025e5 49937->49933 49954 402210 9 API calls 49937->49954 49939->49932 49941 40209c 49940->49941 49942 4020af 49940->49942 49961 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49941->49961 49944 4020c6 RtlEnterCriticalSection 49942->49944 49947 4020d0 49942->49947 49944->49947 49945 4020a1 49945->49942 49946 4020a5 49945->49946 49950 402106 49946->49950 49947->49950 49955 401f94 49947->49955 49950->49937 49951 4021f1 RtlLeaveCriticalSection 49952 4021fb 49951->49952 49952->49937 49953->49929 49954->49933 49958 401fa4 49955->49958 49956 401fd0 49960 401ff4 49956->49960 49967 401db4 49956->49967 49958->49956 49958->49960 49962 401f0c 49958->49962 49960->49951 49960->49952 49961->49945 49971 40178c 49962->49971 49965 401f29 49965->49958 49968 401e02 49967->49968 49969 401dd2 49967->49969 49968->49969 49994 401d1c 49968->49994 49969->49960 49975 4017a8 49971->49975 49972 4017b2 49990 401678 VirtualAlloc 49972->49990 49975->49972 49976 40180f 49975->49976 49978 401803 49975->49978 49982 4014e4 49975->49982 49991 4013e0 LocalAlloc 49975->49991 49976->49965 49981 401e80 9 API calls 49976->49981 49992 4015c0 VirtualFree 49978->49992 49979 4017be 49979->49976 49981->49965 49983 4014f3 VirtualAlloc 49982->49983 49985 401520 49983->49985 49986 401543 49983->49986 49993 401398 LocalAlloc 49985->49993 49986->49975 49988 40152c 49988->49986 49989 401530 VirtualFree 49988->49989 49989->49986 49990->49979 49991->49975 49992->49976 49993->49988 49995 401d2e 49994->49995 49996 401d51 49995->49996 49997 401d63 49995->49997 50007 401940 49996->50007 49999 401940 3 API calls 49997->49999 50000 401d61 49999->50000 50001 401d79 50000->50001 50017 401bf8 9 API calls 50000->50017 50001->49969 50003 401d88 50004 401da2 50003->50004 50018 401c4c 9 API calls 50003->50018 50019 401454 LocalAlloc 50004->50019 50008 401966 50007->50008 50009 4019bf 50007->50009 50020 40170c 50008->50020 50009->50000 50013 401983 50014 40199a 50013->50014 50025 4015c0 VirtualFree 50013->50025 50014->50009 50026 401454 LocalAlloc 50014->50026 50017->50003 50018->50004 50019->50001 50022 401743 50020->50022 50021 401783 50024 4013e0 LocalAlloc 50021->50024 50022->50021 50023 40175d VirtualFree 50022->50023 50023->50022 50024->50013 50025->50014 50026->50009 55822 48042c 55827 450ff0 55822->55827 55824 480440 55837 47f518 55824->55837 55826 480464 55828 450ffd 55827->55828 55830 451051 55828->55830 55843 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55828->55843 55831 450e74 InterlockedExchange 55830->55831 55832 451063 55831->55832 55834 451079 55832->55834 55844 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55832->55844 55836 4510bc 55834->55836 55845 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55834->55845 55836->55824 55846 40b5c8 55837->55846 55839 47f585 55839->55826 55840 4069e4 4 API calls 55842 47f53a 55840->55842 55842->55839 55842->55840 55850 4768b0 55842->55850 55843->55830 55844->55834 55845->55836 55847 40b5d3 55846->55847 55848 40b5f3 55847->55848 55866 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55847->55866 55848->55842 55860 47692a 55850->55860 55864 4768e1 55850->55864 55851 476975 55867 451280 55851->55867 55852 451280 21 API calls 55852->55864 55854 47698c 55856 403420 4 API calls 55854->55856 55855 4038a4 4 API calls 55855->55864 55858 4769a6 55856->55858 55857 4038a4 4 API calls 55857->55860 55858->55842 55859 403450 4 API calls 55859->55864 55860->55851 55860->55857 55862 403744 4 API calls 55860->55862 55863 403450 4 API calls 55860->55863 55865 451280 21 API calls 55860->55865 55861 403744 4 API calls 55861->55864 55862->55860 55863->55860 55864->55852 55864->55855 55864->55859 55864->55860 55864->55861 55865->55860 55866->55848 55868 451290 55867->55868 55869 45129b 55867->55869 55868->55854 55873 451224 21 API calls 55869->55873 55871 4512a6 55871->55868 55874 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55871->55874 55873->55871 55874->55868 55875 41ee64 55876 41ee73 IsWindowVisible 55875->55876 55877 41eea9 55875->55877 55876->55877 55878 41ee7d IsWindowEnabled 55876->55878 55878->55877 55879 41ee87 55878->55879 55880 402648 4 API calls 55879->55880 55881 41ee91 EnableWindow 55880->55881 55881->55877 55882 41fb68 55883 41fb71 55882->55883 55886 41fe0c 55883->55886 55885 41fb7e 55887 41fefe 55886->55887 55888 41fe23 55886->55888 55887->55885 55888->55887 55907 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 55888->55907 55890 41fe59 55891 41fe83 55890->55891 55892 41fe5d 55890->55892 55917 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 55891->55917 55908 41fbac 55892->55908 55896 41fe91 55898 41fe95 55896->55898 55899 41febb 55896->55899 55897 41fbac 10 API calls 55901 41fe81 55897->55901 55902 41fbac 10 API calls 55898->55902 55900 41fbac 10 API calls 55899->55900 55903 41fecd 55900->55903 55901->55885 55904 41fea7 55902->55904 55905 41fbac 10 API calls 55903->55905 55906 41fbac 10 API calls 55904->55906 55905->55901 55906->55901 55907->55890 55909 41fbc7 55908->55909 55910 41f94c 4 API calls 55909->55910 55911 41fbdd 55909->55911 55910->55911 55918 41f94c 55911->55918 55913 41fc25 55914 41fc48 SetScrollInfo 55913->55914 55926 41faac 55914->55926 55917->55896 55919 4181f0 55918->55919 55920 41f969 GetWindowLongA 55919->55920 55921 41f9a6 55920->55921 55922 41f986 55920->55922 55938 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 55921->55938 55937 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 55922->55937 55925 41f992 55925->55913 55927 41faba 55926->55927 55928 41fac2 55926->55928 55927->55897 55929 41fb01 55928->55929 55930 41faf1 55928->55930 55935 41faff 55928->55935 55940 417e58 IsWindowVisible ScrollWindow SetWindowPos 55929->55940 55939 417e58 IsWindowVisible ScrollWindow SetWindowPos 55930->55939 55931 41fb41 GetScrollPos 55931->55927 55934 41fb4c 55931->55934 55936 41fb5b SetScrollPos 55934->55936 55935->55931 55936->55927 55937->55925 55938->55925 55939->55935 55940->55935 55941 4205a8 55942 4205bb 55941->55942 55962 415b40 55942->55962 55944 4205f6 55945 420702 55944->55945 55946 420661 55944->55946 55955 420652 MulDiv 55944->55955 55949 420719 55945->55949 55969 4146e4 KiUserCallbackDispatcher 55945->55969 55967 420858 20 API calls 55946->55967 55948 420730 55952 420752 55948->55952 55971 420070 12 API calls 55948->55971 55949->55948 55970 414728 KiUserCallbackDispatcher 55949->55970 55954 42067a 55954->55945 55968 420070 12 API calls 55954->55968 55966 41a314 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 55955->55966 55958 420697 55959 4206b3 MulDiv 55958->55959 55960 4206d6 55958->55960 55959->55960 55960->55945 55961 4206df MulDiv 55960->55961 55961->55945 55963 415b52 55962->55963 55972 414480 55963->55972 55965 415b6a 55965->55944 55966->55946 55967->55954 55968->55958 55969->55949 55970->55948 55971->55952 55973 41449a 55972->55973 55976 410658 55973->55976 55975 4144b0 55975->55965 55979 40dea4 55976->55979 55978 41065e 55978->55975 55980 40df06 55979->55980 55981 40deb7 55979->55981 55986 40df14 55980->55986 55984 40df14 19 API calls 55981->55984 55985 40dee1 55984->55985 55985->55978 55987 40df24 55986->55987 55989 40df3a 55987->55989 55998 40e29c 55987->55998 56014 40d7e0 55987->56014 56017 40e14c 55989->56017 55992 40d7e0 5 API calls 55993 40df42 55992->55993 55993->55992 55994 40dfae 55993->55994 56020 40dd60 55993->56020 55996 40e14c 5 API calls 55994->55996 55997 40df10 55996->55997 55997->55978 56034 40eb6c 55998->56034 56000 403778 4 API calls 56002 40e2d7 56000->56002 56001 40e38d 56003 40e3b7 56001->56003 56004 40e3a8 56001->56004 56002->56000 56002->56001 56097 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56002->56097 56098 40e280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56002->56098 56094 40bc24 56003->56094 56043 40e5c0 56004->56043 56009 40e3b5 56011 403400 4 API calls 56009->56011 56012 40e45c 56011->56012 56012->55987 56015 40ec08 5 API calls 56014->56015 56016 40d7ea 56015->56016 56016->55987 56131 40d6bc 56017->56131 56140 40e154 56020->56140 56023 40eb6c 5 API calls 56024 40dd9e 56023->56024 56025 40eb6c 5 API calls 56024->56025 56026 40dda9 56025->56026 56027 40ddc4 56026->56027 56028 40ddbb 56026->56028 56033 40ddc1 56026->56033 56147 40dbd8 56027->56147 56150 40dcc8 19 API calls 56028->56150 56031 403420 4 API calls 56032 40de8f 56031->56032 56032->55993 56033->56031 56100 40d980 56034->56100 56037 4034e0 4 API calls 56038 40eb8f 56037->56038 56039 403744 4 API calls 56038->56039 56040 40eb96 56039->56040 56041 40d980 5 API calls 56040->56041 56042 40eba4 56041->56042 56042->56002 56044 40e5f6 56043->56044 56045 40e5ec 56043->56045 56047 40e711 56044->56047 56048 40e695 56044->56048 56049 40e6f6 56044->56049 56050 40e776 56044->56050 56051 40e638 56044->56051 56052 40e6d9 56044->56052 56053 40e67a 56044->56053 56054 40e6bb 56044->56054 56067 40e65c 56044->56067 56105 40d640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56045->56105 56058 40d964 5 API calls 56047->56058 56113 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56048->56113 56118 40ea90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56049->56118 56062 40d964 5 API calls 56050->56062 56106 40d964 56051->56106 56116 40eba8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56052->56116 56112 40da18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56053->56112 56115 40dfe4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56054->56115 56066 40e719 56058->56066 56061 403400 4 API calls 56068 40e7eb 56061->56068 56069 40e77e 56062->56069 56065 40e6a0 56114 40d670 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56065->56114 56077 40e723 56066->56077 56078 40e71d 56066->56078 56067->56061 56068->56009 56071 40e782 56069->56071 56072 40e79b 56069->56072 56070 40e6e4 56117 409f38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56070->56117 56079 40ec08 5 API calls 56071->56079 56125 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56072->56125 56074 40e661 56111 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56074->56111 56075 40e644 56109 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56075->56109 56119 40ec08 56077->56119 56083 40e73c 56078->56083 56087 40e721 56078->56087 56079->56067 56085 40ec08 5 API calls 56083->56085 56088 40e744 56085->56088 56086 40e64f 56110 40e46c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56086->56110 56123 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56087->56123 56122 40daa0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56088->56122 56091 40e766 56124 40e4d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56091->56124 56126 40bbd0 56094->56126 56097->56002 56098->56002 56099 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56099->56009 56103 40d98b 56100->56103 56101 40d9c5 56101->56037 56103->56101 56104 40d9cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56103->56104 56104->56103 56105->56044 56107 40ec08 5 API calls 56106->56107 56108 40d96e 56107->56108 56108->56074 56108->56075 56109->56086 56110->56067 56111->56067 56112->56067 56113->56065 56114->56067 56115->56067 56116->56070 56117->56067 56118->56067 56120 40d980 5 API calls 56119->56120 56121 40ec15 56120->56121 56121->56067 56122->56067 56123->56091 56124->56067 56125->56067 56127 40bbe2 56126->56127 56128 40bc07 56126->56128 56127->56128 56130 40bc84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56127->56130 56128->56009 56128->56099 56130->56128 56132 40ec08 5 API calls 56131->56132 56133 40d6c9 56132->56133 56134 40d6dc 56133->56134 56138 40ed0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56133->56138 56134->55993 56136 40d6d7 56139 40d658 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56136->56139 56138->56136 56139->56134 56141 40d964 5 API calls 56140->56141 56142 40e16b 56141->56142 56143 40ec08 5 API calls 56142->56143 56146 40dd93 56142->56146 56144 40e178 56143->56144 56144->56146 56151 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56144->56151 56146->56023 56152 40ad7c 19 API calls 56147->56152 56149 40dc00 56149->56033 56150->56033 56151->56146 56152->56149 50027 491444 50028 49147e 50027->50028 50029 49148a 50028->50029 50030 491480 50028->50030 50032 491499 50029->50032 50033 4914c2 50029->50033 50223 4090a0 MessageBeep 50030->50223 50035 447008 18 API calls 50032->50035 50039 4914fa 50033->50039 50040 4914d1 50033->50040 50034 403420 4 API calls 50037 491ad6 50034->50037 50036 4914a6 50035->50036 50224 406bb8 50036->50224 50041 403400 4 API calls 50037->50041 50047 491509 50039->50047 50048 491532 50039->50048 50044 447008 18 API calls 50040->50044 50042 491ade 50041->50042 50046 4914de 50044->50046 50232 406c08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50046->50232 50050 447008 18 API calls 50047->50050 50055 49155a 50048->50055 50056 491541 50048->50056 50052 491516 50050->50052 50051 4914e9 50233 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50051->50233 50234 406c3c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50052->50234 50061 491569 50055->50061 50062 49158e 50055->50062 50236 407288 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 50056->50236 50057 491521 50235 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50057->50235 50060 491549 50237 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50060->50237 50064 447008 18 API calls 50061->50064 50067 49159d 50062->50067 50068 4915c6 50062->50068 50065 491576 50064->50065 50238 4072b0 50065->50238 50070 447008 18 API calls 50067->50070 50074 4915fe 50068->50074 50075 4915d5 50068->50075 50069 49157e 50241 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50069->50241 50071 4915aa 50070->50071 50242 42c814 50071->50242 50080 49164a 50074->50080 50081 49160d 50074->50081 50077 447008 18 API calls 50075->50077 50079 4915e2 50077->50079 50252 407200 8 API calls 50079->50252 50088 491659 50080->50088 50089 491682 50080->50089 50083 447008 18 API calls 50081->50083 50085 49161c 50083->50085 50084 4915ed 50253 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50084->50253 50087 447008 18 API calls 50085->50087 50091 49162d 50087->50091 50092 447008 18 API calls 50088->50092 50097 4916ba 50089->50097 50098 491691 50089->50098 50090 491485 50090->50034 50254 491148 8 API calls 50091->50254 50093 491666 50092->50093 50256 42c8b4 50093->50256 50096 491639 50255 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50096->50255 50104 4916c9 50097->50104 50105 4916f2 50097->50105 50101 447008 18 API calls 50098->50101 50103 49169e 50101->50103 50262 42c8dc 50103->50262 50107 447008 18 API calls 50104->50107 50112 49172a 50105->50112 50113 491701 50105->50113 50109 4916d6 50107->50109 50271 42c90c LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50109->50271 50118 491739 50112->50118 50119 491762 50112->50119 50115 447008 18 API calls 50113->50115 50114 4916e1 50272 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50114->50272 50117 49170e 50115->50117 50273 42c93c 50117->50273 50122 447008 18 API calls 50118->50122 50125 4917ae 50119->50125 50126 491771 50119->50126 50124 491746 50122->50124 50279 42c964 50124->50279 50133 4917bd 50125->50133 50134 491800 50125->50134 50128 447008 18 API calls 50126->50128 50130 491780 50128->50130 50132 447008 18 API calls 50130->50132 50135 491791 50132->50135 50136 447008 18 API calls 50133->50136 50140 49180f 50134->50140 50141 491873 50134->50141 50285 42c508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50135->50285 50138 4917d0 50136->50138 50142 447008 18 API calls 50138->50142 50139 49179d 50286 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50139->50286 50145 447008 18 API calls 50140->50145 50149 4918b2 50141->50149 50150 491882 50141->50150 50143 4917e1 50142->50143 50287 491340 12 API calls 50143->50287 50147 49181c 50145->50147 50215 42c618 7 API calls 50147->50215 50148 4917ef 50288 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50148->50288 50158 4918f1 50149->50158 50159 4918c1 50149->50159 50153 447008 18 API calls 50150->50153 50155 49188f 50153->50155 50154 49182a 50156 49182e 50154->50156 50157 491863 50154->50157 50291 4528f4 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 50155->50291 50162 447008 18 API calls 50156->50162 50290 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50157->50290 50172 491930 50158->50172 50173 491900 50158->50173 50163 447008 18 API calls 50159->50163 50165 49183d 50162->50165 50167 4918ce 50163->50167 50164 49189c 50292 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50164->50292 50216 452c6c 50165->50216 50293 45275c 50167->50293 50169 4918ad 50169->50090 50170 49184d 50289 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50170->50289 50180 491978 50172->50180 50181 49193f 50172->50181 50176 447008 18 API calls 50173->50176 50175 4918db 50300 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50175->50300 50177 49190d 50176->50177 50301 452dfc Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 50177->50301 50186 4919c0 50180->50186 50187 491987 50180->50187 50183 447008 18 API calls 50181->50183 50182 49191a 50302 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50182->50302 50185 49194e 50183->50185 50188 447008 18 API calls 50185->50188 50192 4919d3 50186->50192 50199 491a89 50186->50199 50189 447008 18 API calls 50187->50189 50190 49195f 50188->50190 50191 491996 50189->50191 50196 447288 5 API calls 50190->50196 50193 447008 18 API calls 50191->50193 50194 447008 18 API calls 50192->50194 50195 4919a7 50193->50195 50197 491a00 50194->50197 50202 447288 5 API calls 50195->50202 50196->50090 50198 447008 18 API calls 50197->50198 50200 491a17 50198->50200 50199->50090 50306 446fac 18 API calls 50199->50306 50303 407de4 7 API calls 50200->50303 50202->50090 50203 491aa2 50307 42e8d8 FormatMessageA 50203->50307 50208 491a39 50209 447008 18 API calls 50208->50209 50210 491a4d 50209->50210 50304 408510 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50210->50304 50212 491a58 50305 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50212->50305 50214 491a64 50215->50154 50312 452710 50216->50312 50218 452c89 50218->50170 50219 452c85 50219->50218 50220 452cad MoveFileA GetLastError 50219->50220 50318 45274c 50220->50318 50223->50090 50225 406bc7 50224->50225 50226 406be0 50225->50226 50227 406be9 50225->50227 50228 403400 4 API calls 50226->50228 50321 403778 50227->50321 50229 406be7 50228->50229 50231 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50229->50231 50231->50090 50232->50051 50233->50090 50234->50057 50235->50090 50236->50060 50237->50090 50239 403738 50238->50239 50240 4072ba SetCurrentDirectoryA 50239->50240 50240->50069 50241->50090 50243 403738 50242->50243 50244 42c837 GetFullPathNameA 50243->50244 50245 42c843 50244->50245 50246 42c85a 50244->50246 50245->50246 50247 42c84b 50245->50247 50248 403494 4 API calls 50246->50248 50249 4034e0 4 API calls 50247->50249 50250 42c858 50248->50250 50249->50250 50251 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50250->50251 50251->50090 50252->50084 50253->50090 50254->50096 50255->50090 50328 42c7ac 50256->50328 50259 403778 4 API calls 50260 42c8d5 50259->50260 50261 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50260->50261 50261->50090 50343 42c684 50262->50343 50265 42c8f0 50267 403400 4 API calls 50265->50267 50266 42c8f9 50268 403778 4 API calls 50266->50268 50269 42c8f7 50267->50269 50268->50269 50270 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50269->50270 50270->50090 50271->50114 50272->50090 50274 42c7ac IsDBCSLeadByte 50273->50274 50275 42c94c 50274->50275 50276 403778 4 API calls 50275->50276 50277 42c95e 50276->50277 50278 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50277->50278 50278->50090 50280 42c7ac IsDBCSLeadByte 50279->50280 50281 42c974 50280->50281 50282 403778 4 API calls 50281->50282 50283 42c985 50282->50283 50284 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50283->50284 50284->50090 50285->50139 50286->50090 50287->50148 50288->50090 50289->50090 50290->50090 50291->50164 50292->50169 50294 452710 2 API calls 50293->50294 50295 452772 50294->50295 50296 452776 50295->50296 50297 452794 CreateDirectoryA GetLastError 50295->50297 50296->50175 50298 45274c Wow64RevertWow64FsRedirection 50297->50298 50299 4527ba 50298->50299 50299->50175 50300->50090 50301->50182 50302->50090 50303->50208 50304->50212 50305->50214 50306->50203 50308 42e8fe 50307->50308 50309 4034e0 4 API calls 50308->50309 50310 42e91b 50309->50310 50311 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50310->50311 50311->50090 50313 45271e 50312->50313 50314 45271a 50312->50314 50315 452727 Wow64DisableWow64FsRedirection 50313->50315 50316 452740 SetLastError 50313->50316 50314->50219 50317 45273b 50315->50317 50316->50317 50317->50219 50319 452751 Wow64RevertWow64FsRedirection 50318->50319 50320 45275b 50318->50320 50319->50320 50320->50170 50322 4037aa 50321->50322 50324 40377d 50321->50324 50323 403400 4 API calls 50322->50323 50325 4037a0 50323->50325 50324->50322 50326 403791 50324->50326 50325->50229 50327 4034e0 4 API calls 50326->50327 50327->50325 50333 42c68c 50328->50333 50330 42c80b 50330->50259 50332 42c7c1 50332->50330 50340 42c454 IsDBCSLeadByte 50332->50340 50336 42c69d 50333->50336 50334 42c701 50337 42c6fc 50334->50337 50342 42c454 IsDBCSLeadByte 50334->50342 50336->50334 50338 42c6bb 50336->50338 50337->50332 50338->50337 50341 42c454 IsDBCSLeadByte 50338->50341 50340->50332 50341->50338 50342->50337 50344 42c68c IsDBCSLeadByte 50343->50344 50345 42c68b 50344->50345 50345->50265 50345->50266 50346 41364c SetWindowLongA GetWindowLongA 50347 4136a9 SetPropA SetPropA 50346->50347 50348 41368b GetWindowLongA 50346->50348 50352 41f3ac 50347->50352 50348->50347 50349 41369a SetWindowLongA 50348->50349 50349->50347 50357 415280 50352->50357 50364 423c1c 50352->50364 50458 423a94 50352->50458 50353 4136f9 50358 41528d 50357->50358 50359 4152f3 50358->50359 50360 4152e8 50358->50360 50363 4152f1 50358->50363 50465 424b9c 13 API calls 50359->50465 50360->50363 50466 41506c 46 API calls 50360->50466 50363->50353 50367 423c52 50364->50367 50398 423c73 50367->50398 50467 423b78 50367->50467 50368 423cfc 50370 423d03 50368->50370 50371 423d37 50368->50371 50369 423c9d 50372 423ca3 50369->50372 50373 423d60 50369->50373 50378 423d09 50370->50378 50425 423fc1 50370->50425 50374 423d42 50371->50374 50375 4240aa IsIconic 50371->50375 50379 423ca8 50372->50379 50396 423cd5 50372->50396 50376 423d72 50373->50376 50377 423d7b 50373->50377 50382 4240e6 50374->50382 50383 423d4b 50374->50383 50387 4240be GetFocus 50375->50387 50375->50398 50384 423d88 50376->50384 50385 423d79 50376->50385 50476 4241a4 11 API calls 50377->50476 50388 423f23 SendMessageA 50378->50388 50397 423d17 50378->50397 50380 423e06 50379->50380 50381 423cae 50379->50381 50489 423b94 NtdllDefWindowProc_A 50380->50489 50393 423cb7 50381->50393 50394 423e2e PostMessageA 50381->50394 50511 424860 WinHelpA PostMessageA 50382->50511 50390 4240fd 50383->50390 50399 423cd0 50383->50399 50477 4241ec IsIconic 50384->50477 50485 423b94 NtdllDefWindowProc_A 50385->50485 50392 4240cf 50387->50392 50387->50398 50388->50398 50406 424106 50390->50406 50407 42411b 50390->50407 50510 41f004 GetCurrentThreadId 73A25940 50392->50510 50403 423cc0 50393->50403 50404 423eb5 50393->50404 50495 423b94 NtdllDefWindowProc_A 50394->50495 50396->50398 50408 423cee 50396->50408 50409 423e4f 50396->50409 50397->50398 50397->50399 50437 423f66 50397->50437 50398->50353 50399->50398 50475 423b94 NtdllDefWindowProc_A 50399->50475 50412 423cc9 50403->50412 50413 423dde IsIconic 50403->50413 50414 423ebe 50404->50414 50415 423eef 50404->50415 50405 423e49 50405->50398 50512 4244e4 50406->50512 50518 42453c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 50407->50518 50408->50399 50417 423e1b 50408->50417 50471 423b94 NtdllDefWindowProc_A 50409->50471 50411 4240d6 50411->50398 50422 4240de SetFocus 50411->50422 50412->50399 50423 423da1 50412->50423 50426 423dfa 50413->50426 50427 423dee 50413->50427 50497 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50414->50497 50472 423b94 NtdllDefWindowProc_A 50415->50472 50490 424188 50417->50490 50421 423e55 50431 423e93 50421->50431 50432 423e71 50421->50432 50422->50398 50423->50398 50486 422c5c ShowWindow PostMessageA PostQuitMessage 50423->50486 50425->50398 50434 423fe7 IsWindowEnabled 50425->50434 50488 423b94 NtdllDefWindowProc_A 50426->50488 50487 423bd0 15 API calls 50427->50487 50430 423ef5 50436 423f0d 50430->50436 50473 41eeb4 GetCurrentThreadId 73A25940 50430->50473 50439 423a94 6 API calls 50431->50439 50496 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50432->50496 50433 423ec6 50441 423ed8 50433->50441 50498 41ef68 50433->50498 50434->50398 50442 423ff5 50434->50442 50444 423a94 6 API calls 50436->50444 50437->50398 50445 423f88 IsWindowEnabled 50437->50445 50447 423e9b PostMessageA 50439->50447 50504 423b94 NtdllDefWindowProc_A 50441->50504 50451 423ffc IsWindowVisible 50442->50451 50444->50398 50445->50398 50450 423f96 50445->50450 50446 423e79 PostMessageA 50446->50398 50447->50398 50505 412320 7 API calls 50450->50505 50451->50398 50453 42400a GetFocus 50451->50453 50506 4181f0 50453->50506 50455 42401f SetFocus 50508 415250 50455->50508 50459 423b1d 50458->50459 50460 423aa4 50458->50460 50459->50353 50460->50459 50461 423aaa EnumWindows 50460->50461 50461->50459 50462 423ac6 GetWindow GetWindowLongA 50461->50462 50622 423a2c GetWindow 50461->50622 50463 423ae5 50462->50463 50463->50459 50464 423b11 SetWindowPos 50463->50464 50464->50459 50464->50463 50465->50363 50466->50363 50468 423b8d 50467->50468 50469 423b82 50467->50469 50468->50368 50468->50369 50469->50468 50519 408728 GetSystemDefaultLCID 50469->50519 50471->50421 50472->50430 50474 41ef39 50473->50474 50474->50436 50475->50398 50476->50398 50478 424233 50477->50478 50479 4241fd SetActiveWindow 50477->50479 50478->50398 50594 42365c 50479->50594 50483 42421a 50483->50478 50484 42422d SetFocus 50483->50484 50484->50478 50485->50398 50486->50398 50487->50398 50488->50398 50489->50398 50607 41db40 50490->50607 50493 4241a0 50493->50398 50494 424194 LoadIconA 50494->50493 50495->50405 50496->50446 50497->50433 50499 41ef70 IsWindow 50498->50499 50500 41ef9c 50498->50500 50501 41ef8a 50499->50501 50502 41ef7f EnableWindow 50499->50502 50500->50441 50501->50499 50501->50500 50503 402660 4 API calls 50501->50503 50502->50501 50503->50501 50504->50398 50505->50398 50507 4181fa 50506->50507 50507->50455 50509 41526b SetFocus 50508->50509 50509->50398 50510->50411 50511->50405 50513 4244f0 50512->50513 50514 42450a 50512->50514 50515 4244f7 SendMessageA 50513->50515 50517 42451f 50513->50517 50516 402648 4 API calls 50514->50516 50515->50517 50516->50517 50517->50398 50518->50405 50574 408570 GetLocaleInfoA 50519->50574 50524 408570 5 API calls 50525 40877d 50524->50525 50526 408570 5 API calls 50525->50526 50527 4087a1 50526->50527 50586 4085bc GetLocaleInfoA 50527->50586 50530 4085bc GetLocaleInfoA 50531 4087d1 50530->50531 50532 408570 5 API calls 50531->50532 50533 4087eb 50532->50533 50534 4085bc GetLocaleInfoA 50533->50534 50535 408808 50534->50535 50536 408570 5 API calls 50535->50536 50537 408822 50536->50537 50538 403450 4 API calls 50537->50538 50539 40882f 50538->50539 50540 408570 5 API calls 50539->50540 50541 408844 50540->50541 50542 403450 4 API calls 50541->50542 50543 408851 50542->50543 50544 4085bc GetLocaleInfoA 50543->50544 50545 40885f 50544->50545 50546 408570 5 API calls 50545->50546 50547 408879 50546->50547 50548 403450 4 API calls 50547->50548 50549 408886 50548->50549 50550 408570 5 API calls 50549->50550 50551 40889b 50550->50551 50552 403450 4 API calls 50551->50552 50553 4088a8 50552->50553 50554 408570 5 API calls 50553->50554 50555 4088bd 50554->50555 50556 4088da 50555->50556 50557 4088cb 50555->50557 50558 403494 4 API calls 50556->50558 50559 403494 4 API calls 50557->50559 50560 4088d8 50558->50560 50559->50560 50575 408597 50574->50575 50576 4085a9 50574->50576 50577 4034e0 4 API calls 50575->50577 50578 403494 4 API calls 50576->50578 50579 4085a7 50577->50579 50578->50579 50580 403450 50579->50580 50581 403454 50580->50581 50584 403464 50580->50584 50583 4034bc 4 API calls 50581->50583 50581->50584 50582 403490 50582->50524 50583->50584 50584->50582 50585 402660 4 API calls 50584->50585 50585->50582 50587 4085d8 50586->50587 50587->50530 50603 423608 SystemParametersInfoA 50594->50603 50596 423675 ShowWindow 50599 423680 50596->50599 50600 423687 50596->50600 50606 423638 SystemParametersInfoA 50599->50606 50602 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50600->50602 50602->50483 50604 423626 50603->50604 50604->50596 50605 423638 SystemParametersInfoA 50604->50605 50605->50596 50606->50600 50610 41db64 50607->50610 50611 41db4a 50610->50611 50612 41db71 50610->50612 50611->50493 50611->50494 50612->50611 50619 40cc80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50612->50619 50614 41db8e 50614->50611 50615 41dba8 50614->50615 50616 41db9b 50614->50616 50620 41bd9c 11 API calls 50615->50620 50621 41b398 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50616->50621 50619->50614 50620->50611 50621->50611 50623 423a4d GetWindowLongA 50622->50623 50624 423a59 50622->50624 50623->50624 50625 4804c6 50626 4804cf 50625->50626 50628 4804fa 50625->50628 50627 4804ec 50626->50627 50626->50628 51037 476b6c 188 API calls 50627->51037 50630 480539 50628->50630 51039 47efb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50628->51039 50631 48055d 50630->50631 50634 480550 50630->50634 50635 480552 50630->50635 50637 480599 50631->50637 50638 48057b 50631->50638 50633 48052c 51040 47f018 42 API calls 50633->51040 50644 47eff4 42 API calls 50634->50644 51041 47f088 42 API calls 50635->51041 50636 4804f1 50636->50628 51038 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50636->51038 51044 47ee48 24 API calls 50637->51044 50641 480590 50638->50641 51042 47f018 42 API calls 50638->51042 51043 47ee48 24 API calls 50641->51043 50644->50631 50647 480597 50648 4805a9 50647->50648 50649 4805af 50647->50649 50650 4805ad 50648->50650 50751 47eff4 50648->50751 50649->50650 50652 47eff4 42 API calls 50649->50652 50756 47c3a4 50650->50756 50652->50650 51113 47eadc 42 API calls 50751->51113 50753 47f00f 51114 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50753->51114 51115 42d8a8 GetWindowsDirectoryA 50756->51115 50758 47c3c2 50759 403450 4 API calls 50758->50759 50760 47c3cf 50759->50760 51117 42d8d4 GetSystemDirectoryA 50760->51117 50762 47c3d7 50763 403450 4 API calls 50762->50763 50764 47c3e4 50763->50764 51119 42d900 50764->51119 50766 47c3ec 50767 403450 4 API calls 50766->50767 50768 47c3f9 50767->50768 50769 47c402 50768->50769 50770 47c41e 50768->50770 51175 42d218 50769->51175 50772 403400 4 API calls 50770->50772 50776 47c41c 50772->50776 50774 403450 4 API calls 50774->50776 50775 47c463 51123 47c22c 50775->51123 50776->50775 50778 42c8dc 5 API calls 50776->50778 50780 47c43e 50778->50780 50782 403450 4 API calls 50780->50782 50781 403450 4 API calls 50783 47c47f 50781->50783 50784 47c44b 50782->50784 50785 47c49d 50783->50785 50787 4035c0 4 API calls 50783->50787 50784->50775 50786 403450 4 API calls 50784->50786 50788 47c22c 8 API calls 50785->50788 50786->50775 50787->50785 50789 47c4ac 50788->50789 50790 403450 4 API calls 50789->50790 50791 47c4b9 50790->50791 50792 47c4e1 50791->50792 50794 42c40c 5 API calls 50791->50794 50793 47c548 50792->50793 50798 47c22c 8 API calls 50792->50798 50796 47c572 50793->50796 50797 47c551 50793->50797 50795 47c4cf 50794->50795 50799 4035c0 4 API calls 50795->50799 51134 42c40c 50796->51134 50800 42c40c 5 API calls 50797->50800 50801 47c4f9 50798->50801 50799->50792 50803 47c55e 50800->50803 50804 403450 4 API calls 50801->50804 50807 47c506 50804->50807 51037->50636 51039->50633 51040->50630 51041->50631 51042->50641 51043->50647 51044->50647 51113->50753 51116 42d8c9 51115->51116 51116->50758 51118 42d8f5 51117->51118 51118->50762 51120 403400 4 API calls 51119->51120 51121 42d910 GetModuleHandleA GetProcAddress 51120->51121 51122 42d929 51121->51122 51122->50766 51185 42de2c 51123->51185 51125 47c252 51126 47c256 51125->51126 51127 47c278 51125->51127 51188 42dd5c 51126->51188 51128 403400 4 API calls 51127->51128 51130 47c27f 51128->51130 51130->50781 51132 47c26d RegCloseKey 51132->51130 51133 403400 4 API calls 51133->51132 51176 4038a4 4 API calls 51175->51176 51177 42d22b 51176->51177 51178 42d242 GetEnvironmentVariableA 51177->51178 51182 42d255 51177->51182 51223 42dbe0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51177->51223 51178->51177 51179 42d24e 51178->51179 51180 403400 4 API calls 51179->51180 51180->51182 51182->50774 51186 42de37 51185->51186 51187 42de3d RegOpenKeyExA 51185->51187 51186->51187 51187->51125 51191 42dc10 51188->51191 51192 42dc36 RegQueryValueExA 51191->51192 51193 42dc7b 51192->51193 51198 42dc59 51192->51198 51194 403400 4 API calls 51193->51194 51196 42dd47 51194->51196 51195 42dc73 51197 403400 4 API calls 51195->51197 51196->51132 51196->51133 51197->51193 51198->51193 51198->51195 51199 4034e0 4 API calls 51198->51199 51208 403744 51198->51208 51199->51198 51201 42dcb0 RegQueryValueExA 51201->51192 51203 42dccc 51201->51203 51203->51193 51212 4038a4 51203->51212 51205 42dd20 51207 403744 4 API calls 51207->51205 51209 40374a 51208->51209 51211 40375b 51208->51211 51210 4034bc 4 API calls 51209->51210 51209->51211 51210->51211 51211->51201 51213 4038b1 51212->51213 51220 4038e1 51212->51220 51214 4038da 51213->51214 51217 4038bd 51213->51217 51218 4034bc 4 API calls 51214->51218 51215 403400 4 API calls 51216 4038cb 51215->51216 51216->51205 51216->51207 51221 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51217->51221 51218->51220 51220->51215 51221->51216 51223->51177 53279 46be48 53280 46be7c 53279->53280 53313 46c254 53279->53313 53282 46bf14 53280->53282 53283 46bef2 53280->53283 53284 46bf03 53280->53284 53285 46bed0 53280->53285 53286 46bee1 53280->53286 53295 46beb8 53280->53295 53281 403400 4 API calls 53288 46c293 53281->53288 53597 46bdd8 45 API calls 53282->53597 53330 46ba08 53283->53330 53596 46bbc8 67 API calls 53284->53596 53594 46b758 47 API calls 53285->53594 53595 46b8c0 42 API calls 53286->53595 53293 403400 4 API calls 53288->53293 53297 46c29b 53293->53297 53295->53313 53365 468fe0 53295->53365 53296 46bed6 53296->53295 53296->53313 53298 46bf50 53299 494770 18 API calls 53298->53299 53312 46bf93 53298->53312 53298->53313 53299->53312 53301 46c0b6 53598 48300c 123 API calls 53301->53598 53302 414af8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53302->53312 53305 46c0d1 53305->53313 53306 42cbd0 6 API calls 53306->53312 53308 46b2a0 23 API calls 53308->53312 53311 46c136 53314 457d58 24 API calls 53311->53314 53312->53301 53312->53302 53312->53306 53312->53308 53312->53311 53312->53313 53316 46c18e 53312->53316 53317 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53312->53317 53326 46c17c 53312->53326 53368 468f1c 53312->53368 53376 46b00c 53312->53376 53383 46a26c 53312->53383 53521 482b0c 53312->53521 53607 46b514 19 API calls 53312->53607 53313->53281 53318 46c155 53314->53318 53315 46b2a0 23 API calls 53315->53313 53444 46b2a0 53316->53444 53317->53312 53320 457d58 24 API calls 53318->53320 53320->53326 53321 46c19b 53322 46c1c4 SetActiveWindow 53321->53322 53323 46c1dc 53321->53323 53322->53323 53479 46a60c 53323->53479 53325 46c1ff 53325->53326 53327 46c21a 53325->53327 53326->53315 53599 46b11c 53327->53599 53608 46c6cc 53330->53608 53333 46bb8a 53335 403420 4 API calls 53333->53335 53337 46bba4 53335->53337 53336 46ba56 53363 46bb76 53336->53363 53615 455f70 13 API calls 53336->53615 53338 403400 4 API calls 53337->53338 53339 46bbac 53338->53339 53342 403400 4 API calls 53339->53342 53341 403450 4 API calls 53341->53333 53344 46bbb4 53342->53344 53343 46ba74 53364 46bad9 53343->53364 53616 46696c 53343->53616 53344->53295 53345 42cd58 7 API calls 53347 46bb12 53345->53347 53346 46bb39 53346->53333 53348 42cd58 7 API calls 53346->53348 53346->53363 53347->53346 53351 451444 4 API calls 53347->53351 53350 46bb4f 53348->53350 53357 451444 4 API calls 53350->53357 53350->53363 53353 46bb29 53351->53353 53621 47eadc 42 API calls 53353->53621 53354 46696c 19 API calls 53356 46bab4 53354->53356 53358 451414 4 API calls 53356->53358 53359 46bb66 53357->53359 53360 46bac9 53358->53360 53622 47eadc 42 API calls 53359->53622 53620 47eadc 42 API calls 53360->53620 53363->53333 53363->53341 53364->53333 53364->53345 53364->53346 53366 468f1c 19 API calls 53365->53366 53367 468fef 53366->53367 53367->53298 53370 468f4b 53368->53370 53369 4078fc 19 API calls 53371 468f84 53369->53371 53370->53369 53373 468f8c 53370->53373 53743 453330 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53371->53743 53374 403400 4 API calls 53373->53374 53375 468fa4 53374->53375 53375->53312 53377 46b01d 53376->53377 53378 46b018 53376->53378 53829 469dec 46 API calls 53377->53829 53381 46b01b 53378->53381 53744 46aa78 53378->53744 53381->53312 53382 46b025 53382->53312 53384 403400 4 API calls 53383->53384 53385 46a299 53384->53385 53852 47d9bc 53385->53852 53387 46a2f8 53388 46a315 53387->53388 53389 46a2fc 53387->53389 53390 46a306 53388->53390 53862 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53388->53862 53859 466b6c 53389->53859 53394 46a434 53390->53394 53395 46a49f 53390->53395 53443 46a5a9 53390->53443 53393 46a331 53393->53390 53397 46a339 53393->53397 53398 403494 4 API calls 53394->53398 53399 403494 4 API calls 53395->53399 53396 403420 4 API calls 53400 46a5d3 53396->53400 53401 46b2a0 23 API calls 53397->53401 53402 46a441 53398->53402 53403 46a4ac 53399->53403 53400->53312 53411 46a346 53401->53411 53404 40357c 4 API calls 53402->53404 53405 40357c 4 API calls 53403->53405 53406 46a44e 53404->53406 53407 46a4b9 53405->53407 53408 40357c 4 API calls 53406->53408 53409 40357c 4 API calls 53407->53409 53412 46a45b 53408->53412 53410 46a4c6 53409->53410 53414 40357c 4 API calls 53410->53414 53417 46a387 53411->53417 53418 46a36f SetActiveWindow 53411->53418 53413 40357c 4 API calls 53412->53413 53415 46a468 53413->53415 53416 46a4d3 53414->53416 53419 466b6c 20 API calls 53415->53419 53420 40357c 4 API calls 53416->53420 53863 42f570 53417->53863 53418->53417 53421 46a476 53419->53421 53422 46a4e1 53420->53422 53423 40357c 4 API calls 53421->53423 53424 414b28 4 API calls 53422->53424 53427 46a47f 53423->53427 53434 46a49d 53424->53434 53429 40357c 4 API calls 53427->53429 53432 46a48c 53429->53432 53431 46a3d8 53435 46b11c 21 API calls 53431->53435 53433 414b28 4 API calls 53432->53433 53433->53434 53880 466ea4 53434->53880 53436 46a40a 53435->53436 53436->53312 53437 46a503 53438 414b28 4 API calls 53437->53438 53437->53443 53443->53396 53445 468fe0 19 API calls 53444->53445 53446 46b2b8 53445->53446 53447 46b2da 53446->53447 53448 465638 7 API calls 53446->53448 53999 465638 53447->53999 53448->53447 53452 46b2f2 53453 46b11c 21 API calls 53452->53453 53454 46b32a 53453->53454 53455 414b28 4 API calls 53454->53455 53456 46b33e 53455->53456 53457 46b374 53456->53457 53458 46b34a 53456->53458 53460 46b393 53457->53460 53461 46b3bd 53457->53461 53459 414b28 4 API calls 53458->53459 53462 46b35e 53459->53462 53463 414b28 4 API calls 53460->53463 53464 414b28 4 API calls 53461->53464 53465 414b28 4 API calls 53462->53465 53466 46b3a7 53463->53466 53467 46b3d1 53464->53467 53468 46b372 53465->53468 53469 414b28 4 API calls 53466->53469 53470 414b28 4 API calls 53467->53470 54016 46b034 53468->54016 53469->53468 53470->53468 53474 468fe0 19 API calls 53477 46b46f 53474->53477 53475 46b40f 53475->53474 53476 46b4d2 53476->53321 53477->53476 54021 4946bc 18 API calls 53477->54021 53481 46a637 53479->53481 53480 46a66e 53483 46a7e3 53480->53483 53494 46a682 53480->53494 53481->53480 54041 47dc30 53481->54041 53484 46a95a 53483->53484 53485 46a817 53483->53485 53490 46a801 53483->53490 53486 403400 4 API calls 53484->53486 53491 414b28 4 API calls 53485->53491 53492 46a97f 53486->53492 53487 46a7c0 53493 46a7db 53487->53493 53497 402660 4 API calls 53487->53497 53488 402660 4 API calls 53488->53494 53489 402648 4 API calls 53489->53494 53495 414b28 4 API calls 53490->53495 53496 46a815 53491->53496 53492->53325 53493->53325 53494->53488 53494->53489 53505 46a6f5 53494->53505 53495->53496 54053 495520 MulDiv 53496->54053 53497->53493 53498 46a78c 53500 457d58 24 API calls 53498->53500 53500->53487 53502 46a838 53504 466ea4 11 API calls 53502->53504 53503 457d58 24 API calls 53503->53505 53506 46a86c 53504->53506 53505->53487 53505->53498 53505->53503 53509 40357c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53505->53509 54052 403ba4 7 API calls 53505->54052 53509->53505 53522 46c6cc 48 API calls 53521->53522 53523 482b4f 53522->53523 53524 482b58 53523->53524 54269 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53523->54269 53526 414af8 4 API calls 53524->53526 53527 482b68 53526->53527 53528 403450 4 API calls 53527->53528 53529 482b75 53528->53529 54079 46ca24 53529->54079 53532 482b85 53534 414af8 4 API calls 53532->53534 53535 482b95 53534->53535 53536 403450 4 API calls 53535->53536 53537 482ba2 53536->53537 53538 469bd4 SendMessageA 53537->53538 53539 482bbb 53538->53539 53540 482c0c 53539->53540 54271 479c64 23 API calls 53539->54271 53542 4241ec 11 API calls 53540->53542 53543 482c16 53542->53543 53544 482c3c 53543->53544 53545 482c27 SetActiveWindow 53543->53545 54108 481f3c 53544->54108 53545->53544 53594->53296 53595->53295 53596->53295 53597->53295 53598->53305 53600 468f1c 19 API calls 53599->53600 53607->53312 53623 46c764 53608->53623 53611 414af8 53612 414b06 53611->53612 53613 4034e0 4 API calls 53612->53613 53614 414b13 53613->53614 53614->53336 53615->53343 53617 466986 53616->53617 53618 4078fc 19 API calls 53617->53618 53619 4669c1 53618->53619 53619->53354 53620->53364 53621->53346 53622->53363 53624 414af8 4 API calls 53623->53624 53625 46c798 53624->53625 53684 466c04 53625->53684 53629 46c7aa 53630 46c7b9 53629->53630 53633 46c7d2 53629->53633 53719 47eadc 42 API calls 53630->53719 53632 46c7cd 53634 403420 4 API calls 53632->53634 53636 46c819 53633->53636 53637 46c800 53633->53637 53635 46ba3a 53634->53635 53635->53333 53635->53611 53638 46c87e 53636->53638 53651 46c81d 53636->53651 53720 47eadc 42 API calls 53637->53720 53722 42cb5c CharNextA 53638->53722 53641 46c88d 53642 46c891 53641->53642 53645 46c8aa 53641->53645 53723 47eadc 42 API calls 53642->53723 53644 46c865 53721 47eadc 42 API calls 53644->53721 53646 46c8ce 53645->53646 53698 466d74 53645->53698 53724 47eadc 42 API calls 53646->53724 53650 46c8be 53650->53646 53703 466da4 53650->53703 53651->53644 53651->53645 53654 46c8e7 53655 403778 4 API calls 53654->53655 53656 46c8fd 53655->53656 53707 42c9ac 53656->53707 53659 46c90e 53725 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53659->53725 53660 46c93f 53662 42c8dc 5 API calls 53660->53662 53664 46c94a 53662->53664 53663 46c921 53665 451444 4 API calls 53663->53665 53666 42c40c 5 API calls 53664->53666 53667 46c92e 53665->53667 53668 46c955 53666->53668 53726 47eadc 42 API calls 53667->53726 53670 42cbd0 6 API calls 53668->53670 53671 46c960 53670->53671 53711 46c6f8 53671->53711 53673 46c968 53674 42cd58 7 API calls 53673->53674 53675 46c970 53674->53675 53676 46c974 53675->53676 53677 46c98a 53675->53677 53727 47eadc 42 API calls 53676->53727 53677->53632 53679 46c994 53677->53679 53688 466c1e 53684->53688 53685 406bb8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53685->53688 53687 42cbd0 6 API calls 53687->53688 53688->53685 53688->53687 53689 403450 4 API calls 53688->53689 53690 466c67 53688->53690 53729 42cabc 53688->53729 53689->53688 53691 403420 4 API calls 53690->53691 53692 466c81 53691->53692 53693 414b28 53692->53693 53694 414af8 4 API calls 53693->53694 53695 414b4c 53694->53695 53696 403400 4 API calls 53695->53696 53697 414b7d 53696->53697 53697->53629 53701 466d7e 53698->53701 53699 466d9f 53699->53650 53700 466d91 53700->53650 53701->53699 53701->53700 53740 42cb4c CharNextA 53701->53740 53704 466dae 53703->53704 53705 466ddb 53704->53705 53741 42cb4c CharNextA 53704->53741 53705->53646 53705->53654 53708 42ca05 53707->53708 53709 42c9c2 53707->53709 53708->53659 53708->53660 53709->53708 53742 42cb4c CharNextA 53709->53742 53712 46c75d 53711->53712 53713 46c70b 53711->53713 53712->53673 53713->53712 53714 41eeb4 2 API calls 53713->53714 53715 46c71b 53714->53715 53716 46c735 SHPathPrepareForWriteA 53715->53716 53717 41ef68 6 API calls 53716->53717 53718 46c755 53717->53718 53718->53673 53719->53632 53720->53632 53721->53632 53722->53641 53723->53632 53724->53632 53725->53663 53726->53632 53727->53632 53730 403494 4 API calls 53729->53730 53731 42cacc 53730->53731 53732 403744 4 API calls 53731->53732 53735 42cb02 53731->53735 53738 42c454 IsDBCSLeadByte 53731->53738 53732->53731 53734 42cb46 53734->53688 53735->53734 53737 4037b8 4 API calls 53735->53737 53739 42c454 IsDBCSLeadByte 53735->53739 53737->53735 53738->53731 53739->53735 53740->53701 53741->53704 53742->53709 53743->53373 53746 46aabf 53744->53746 53745 46af37 53747 46af52 53745->53747 53748 46af83 53745->53748 53746->53745 53749 46ab7a 53746->53749 53752 403494 4 API calls 53746->53752 53751 403494 4 API calls 53747->53751 53753 403494 4 API calls 53748->53753 53750 46ab9b 53749->53750 53754 46abdc 53749->53754 53755 403494 4 API calls 53750->53755 53756 46af60 53751->53756 53757 46aafe 53752->53757 53758 46af91 53753->53758 53762 403400 4 API calls 53754->53762 53759 46aba9 53755->53759 53847 4694c8 12 API calls 53756->53847 53761 414af8 4 API calls 53757->53761 53848 4694c8 12 API calls 53758->53848 53764 414af8 4 API calls 53759->53764 53766 46ab1f 53761->53766 53767 46abda 53762->53767 53769 46abca 53764->53769 53765 46af6e 53768 403400 4 API calls 53765->53768 53770 403634 4 API calls 53766->53770 53787 46acc0 53767->53787 53830 469bd4 53767->53830 53772 46afb4 53768->53772 53774 403634 4 API calls 53769->53774 53775 46ab2f 53770->53775 53778 403400 4 API calls 53772->53778 53773 46ad48 53776 403400 4 API calls 53773->53776 53774->53767 53779 414af8 4 API calls 53775->53779 53780 46ad46 53776->53780 53777 46abfc 53781 46ac02 53777->53781 53782 46ac3a 53777->53782 53783 46afbc 53778->53783 53784 46ab43 53779->53784 53842 46a010 43 API calls 53780->53842 53785 403494 4 API calls 53781->53785 53788 403400 4 API calls 53782->53788 53786 403420 4 API calls 53783->53786 53784->53749 53793 414af8 4 API calls 53784->53793 53789 46ac10 53785->53789 53790 46afc9 53786->53790 53787->53773 53791 46ad07 53787->53791 53792 46ac38 53788->53792 53796 47bfd8 43 API calls 53789->53796 53790->53381 53797 403494 4 API calls 53791->53797 53836 469ec8 53792->53836 53794 46ab6a 53793->53794 53798 403634 4 API calls 53794->53798 53800 46ac28 53796->53800 53801 46ad15 53797->53801 53798->53749 53799 46ad71 53807 46add2 53799->53807 53808 46ad7c 53799->53808 53802 403634 4 API calls 53800->53802 53803 414af8 4 API calls 53801->53803 53802->53792 53805 46ad36 53803->53805 53809 403634 4 API calls 53805->53809 53806 46ac61 53812 46acc2 53806->53812 53813 46ac6c 53806->53813 53810 403400 4 API calls 53807->53810 53811 403494 4 API calls 53808->53811 53809->53780 53814 46adda 53810->53814 53819 46ad8a 53811->53819 53816 403400 4 API calls 53812->53816 53815 403494 4 API calls 53813->53815 53817 46add0 53814->53817 53828 46ae83 53814->53828 53821 46ac7a 53815->53821 53816->53787 53817->53814 53843 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53817->53843 53819->53814 53819->53817 53822 403634 4 API calls 53819->53822 53820 46adfd 53820->53828 53844 49490c 18 API calls 53820->53844 53821->53787 53824 403634 4 API calls 53821->53824 53822->53819 53824->53821 53826 46af24 53846 429154 SendMessageA SendMessageA 53826->53846 53845 429104 SendMessageA 53828->53845 53829->53382 53849 42a050 SendMessageA 53830->53849 53832 469be3 53833 469c03 53832->53833 53850 42a050 SendMessageA 53832->53850 53833->53777 53835 469bf3 53835->53777 53840 469ef5 53836->53840 53837 469f57 53838 403400 4 API calls 53837->53838 53839 469f6c 53838->53839 53839->53806 53840->53837 53851 469e4c 43 API calls 53840->53851 53842->53799 53843->53820 53844->53828 53845->53826 53846->53745 53847->53765 53848->53765 53849->53832 53850->53835 53851->53840 53853 47d9cf 53852->53853 53856 47da0c 53852->53856 53884 455cf8 53853->53884 53856->53387 53858 47da1f 53858->53387 53939 466a80 53859->53939 53862->53393 53864 42f57c 53863->53864 53865 42f59f GetActiveWindow GetFocus 53864->53865 53866 41eeb4 2 API calls 53865->53866 53867 42f5b6 53866->53867 53868 42f5d3 53867->53868 53869 42f5c3 RegisterClassA 53867->53869 53870 42f662 SetFocus 53868->53870 53871 42f5e1 CreateWindowExA 53868->53871 53869->53868 53873 403400 4 API calls 53870->53873 53871->53870 53872 42f614 53871->53872 53960 42428c 53872->53960 53875 42f67e 53873->53875 53879 49490c 18 API calls 53875->53879 53876 42f63c 53877 42f644 CreateWindowExA 53876->53877 53877->53870 53878 42f65a ShowWindow 53877->53878 53878->53870 53879->53431 53966 44b524 53880->53966 53882 466eab 53882->53437 53885 455d09 53884->53885 53886 455d16 53885->53886 53887 455d0d 53885->53887 53918 455adc 29 API calls 53886->53918 53910 4559fc 53887->53910 53890 455d13 53890->53856 53891 47d628 53890->53891 53894 47d726 53891->53894 53895 47d665 53891->53895 53892 403420 4 API calls 53893 47d80e 53892->53893 53893->53858 53897 47954c 19 API calls 53894->53897 53904 47d77c 53894->53904 53906 47d6c9 53894->53906 53895->53894 53898 4797f0 4 API calls 53895->53898 53901 47bfd8 43 API calls 53895->53901 53895->53906 53908 47d6d2 53895->53908 53927 47968c 53895->53927 53897->53894 53898->53895 53899 47bfd8 43 API calls 53899->53904 53900 4540ec 20 API calls 53900->53904 53901->53895 53902 47bfd8 43 API calls 53902->53908 53903 47d713 53903->53906 53904->53894 53904->53899 53904->53900 53904->53903 53905 42c93c 5 API calls 53905->53908 53906->53892 53907 42c964 5 API calls 53907->53908 53908->53895 53908->53902 53908->53903 53908->53905 53908->53907 53938 47d334 52 API calls 53908->53938 53911 42de2c RegOpenKeyExA 53910->53911 53912 455a19 53911->53912 53913 455a67 53912->53913 53919 455930 53912->53919 53913->53890 53916 455930 6 API calls 53917 455a48 RegCloseKey 53916->53917 53917->53890 53918->53890 53924 42dd68 53919->53924 53921 403420 4 API calls 53922 4559e2 53921->53922 53922->53916 53923 455958 53923->53921 53925 42dc10 6 API calls 53924->53925 53926 42dd71 53925->53926 53926->53923 53928 4796a2 53927->53928 53929 47969e 53927->53929 53930 403450 4 API calls 53928->53930 53929->53895 53931 4796af 53930->53931 53932 4796b5 53931->53932 53933 4796cf 53931->53933 53934 47954c 19 API calls 53932->53934 53935 47954c 19 API calls 53933->53935 53936 4796cb 53934->53936 53935->53936 53937 403400 4 API calls 53936->53937 53937->53929 53938->53908 53940 403494 4 API calls 53939->53940 53941 466aae 53940->53941 53942 42dbd8 5 API calls 53941->53942 53943 466ac0 53942->53943 53944 42dbd8 5 API calls 53943->53944 53945 466ad2 53944->53945 53946 46696c 19 API calls 53945->53946 53947 466adc 53946->53947 53948 42dbd8 5 API calls 53947->53948 53949 466aeb 53948->53949 53956 4669e4 53949->53956 53952 42dbd8 5 API calls 53953 466b04 53952->53953 53954 403400 4 API calls 53953->53954 53955 466b19 53954->53955 53955->53390 53957 466a04 53956->53957 53958 4078fc 19 API calls 53957->53958 53959 466a4e 53958->53959 53959->53952 53961 4242be 53960->53961 53962 42429e GetWindowTextA 53960->53962 53964 403494 4 API calls 53961->53964 53963 4034e0 4 API calls 53962->53963 53965 4242bc 53963->53965 53964->53965 53965->53876 53969 44b39c 53966->53969 53968 44b537 53968->53882 53970 44b3cf 53969->53970 53971 414af8 4 API calls 53970->53971 53972 44b3e2 53971->53972 53973 44b40f 73A1A570 53972->53973 53974 40357c 4 API calls 53972->53974 53980 41a1f8 53973->53980 53974->53973 53977 44b440 53988 44b0d0 53977->53988 53979 44b454 73A1A480 53979->53968 53981 41a223 53980->53981 53982 41a2bf 53980->53982 53985 403520 4 API calls 53981->53985 53983 403400 4 API calls 53982->53983 53984 41a2d7 SelectObject 53983->53984 53984->53977 53986 41a27b 53985->53986 53987 41a2b3 CreateFontIndirectA 53986->53987 53987->53982 53989 44b0e7 53988->53989 53990 44b17a 53989->53990 53991 44b163 53989->53991 53992 44b0fa 53989->53992 53990->53979 53994 44b173 DrawTextA 53991->53994 53992->53990 53993 402648 4 API calls 53992->53993 53995 44b10b 53993->53995 53994->53990 53996 44b129 MultiByteToWideChar DrawTextW 53995->53996 53997 402660 4 API calls 53996->53997 53998 44b15b 53997->53998 53998->53979 54001 465643 53999->54001 54000 46571e 54010 4673f8 54000->54010 54001->54000 54005 465693 54001->54005 54022 421a2c 54001->54022 54002 4656d6 54002->54000 54028 4185c8 7 API calls 54002->54028 54005->54002 54006 4656cd 54005->54006 54007 4656d8 54005->54007 54008 421a2c 7 API calls 54006->54008 54009 421a2c 7 API calls 54007->54009 54008->54002 54009->54002 54011 467428 54010->54011 54012 467409 54010->54012 54011->53452 54013 414b28 4 API calls 54012->54013 54014 467417 54013->54014 54015 414b28 4 API calls 54014->54015 54015->54011 54018 46b041 54016->54018 54017 421a2c 7 API calls 54019 46b0cc 54017->54019 54018->54017 54019->53475 54020 466ecc 18 API calls 54019->54020 54020->53475 54021->53476 54023 421a84 54022->54023 54025 421a3a 54022->54025 54023->54005 54024 421a69 54024->54023 54037 421d38 SetFocus GetFocus 54024->54037 54025->54024 54029 408cc4 54025->54029 54028->54000 54030 408cd0 54029->54030 54038 406df4 LoadStringA 54030->54038 54033 403450 4 API calls 54034 408d01 54033->54034 54035 403400 4 API calls 54034->54035 54036 408d16 54035->54036 54036->54024 54037->54023 54039 4034e0 4 API calls 54038->54039 54040 406e21 54039->54040 54040->54033 54042 402648 4 API calls 54041->54042 54043 47dc4c 54042->54043 54044 47d628 61 API calls 54043->54044 54045 47dc6b 54044->54045 54049 47dc7f 54045->54049 54057 47da48 54045->54057 54047 47dcab 54048 402660 4 API calls 54047->54048 54051 47dcb5 54048->54051 54049->54047 54050 402660 4 API calls 54049->54050 54050->54049 54051->53480 54052->53505 54053->53502 54058 403494 4 API calls 54057->54058 54060 47da75 54058->54060 54059 47dac8 54060->54059 54073 42c93c 5 API calls 54060->54073 54077 42e8b0 CharNextA 54060->54077 54073->54060 54077->54060 54080 46ca4d 54079->54080 54081 414af8 4 API calls 54080->54081 54091 46ca9a 54080->54091 54082 46ca63 54081->54082 54278 466c90 6 API calls 54082->54278 54083 403420 4 API calls 54084 46cb44 54083->54084 54084->53532 54270 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54084->54270 54086 46ca6b 54087 414b28 4 API calls 54086->54087 54088 46ca79 54087->54088 54089 46ca86 54088->54089 54093 46ca9f 54088->54093 54279 47eadc 42 API calls 54089->54279 54091->54083 54092 46cab7 54280 47eadc 42 API calls 54092->54280 54093->54092 54094 466d74 CharNextA 54093->54094 54096 46cab3 54094->54096 54096->54092 54097 46cacd 54096->54097 54098 46cad3 54097->54098 54099 46cae9 54097->54099 54281 47eadc 42 API calls 54098->54281 54101 42c9ac CharNextA 54099->54101 54102 46caf6 54101->54102 54102->54091 54282 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54102->54282 54104 46cb0d 54105 451444 4 API calls 54104->54105 54106 46cb1a 54105->54106 54283 47eadc 42 API calls 54106->54283 54109 481f8d 54108->54109 54110 481f5f 54108->54110 54112 475dbc 54109->54112 54284 4946bc 18 API calls 54110->54284 54113 457b4c 24 API calls 54112->54113 54114 475e08 54113->54114 54115 4072b0 SetCurrentDirectoryA 54114->54115 54116 475e12 54115->54116 54285 46e5b0 54116->54285 54120 475e22 54271->53540 54278->54086 54279->54091 54280->54091 54281->54091 54282->54104 54283->54091 54284->54109 54286 46e623 54285->54286 54288 46e5cd 54285->54288 54289 46e628 54286->54289 54287 47968c 19 API calls 54287->54288 54288->54286 54288->54287 54290 46e64e 54289->54290 54733 44fb08 54290->54733 54292 46e6aa 54292->54120 54736 44fb1c 54733->54736 54737 44fb2d 54736->54737 54738 44fb19 54737->54738 54739 44fb57 MulDiv 54737->54739 54738->54292 54740 4181f0 54739->54740 54741 44fb82 SendMessageA 54740->54741 54741->54738 56153 498578 56211 403344 56153->56211 56155 498586 56214 4056a0 56155->56214 56157 49858b 56217 406334 GetModuleHandleA GetProcAddress 56157->56217 56163 49859a 56234 410964 56163->56234 56165 49859f 56238 412938 56165->56238 56167 4985a9 56243 419050 GetVersion 56167->56243 56484 4032fc 56211->56484 56213 403349 GetModuleHandleA GetCommandLineA 56213->56155 56216 4056db 56214->56216 56485 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56214->56485 56216->56157 56218 406350 56217->56218 56219 406357 GetProcAddress 56217->56219 56218->56219 56220 406366 56219->56220 56221 40636d GetProcAddress 56219->56221 56220->56221 56222 406380 56221->56222 56223 40637c SetProcessDEPPolicy 56221->56223 56224 409954 56222->56224 56223->56222 56486 40902c 56224->56486 56229 408728 7 API calls 56230 409977 56229->56230 56501 409078 GetVersionExA 56230->56501 56233 409b88 6F551CD0 56233->56163 56235 41096e 56234->56235 56236 4109ad GetCurrentThreadId 56235->56236 56237 4109c8 56236->56237 56237->56165 56503 40af0c 56238->56503 56242 412964 56242->56167 56515 41de34 8 API calls 56243->56515 56245 419069 56517 418f48 GetCurrentProcessId 56245->56517 56484->56213 56485->56216 56487 408cc4 5 API calls 56486->56487 56488 40903d 56487->56488 56489 4085e4 GetSystemDefaultLCID 56488->56489 56492 40861a 56489->56492 56490 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56490->56492 56491 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56491->56492 56492->56490 56492->56491 56493 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56492->56493 56497 40867c 56492->56497 56493->56492 56494 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56494->56497 56495 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56495->56497 56496 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56496->56497 56497->56494 56497->56495 56497->56496 56498 4086ff 56497->56498 56499 403420 4 API calls 56498->56499 56500 408719 56499->56500 56500->56229 56502 40908f 56501->56502 56502->56233 56505 40af13 56503->56505 56504 40af32 56507 41101c 56504->56507 56505->56504 56514 40ae44 19 API calls 56505->56514 56508 41103e 56507->56508 56509 406df4 5 API calls 56508->56509 56510 403450 4 API calls 56508->56510 56511 41105d 56508->56511 56509->56508 56510->56508 56512 403400 4 API calls 56511->56512 56513 411072 56512->56513 56513->56242 56514->56505 56516 41deae 56515->56516 56516->56245 56533 4078c8 56517->56533 57792 42f530 57793 42f53f NtdllDefWindowProc_A 57792->57793 57794 42f53b 57792->57794 57793->57794 55785 416b52 55786 416bfa 55785->55786 55787 416b6a 55785->55787 55804 41532c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55786->55804 55789 416b84 SendMessageA 55787->55789 55790 416b78 55787->55790 55800 416bd8 55789->55800 55791 416b82 CallWindowProcA 55790->55791 55792 416b9e 55790->55792 55791->55800 55801 41a068 GetSysColor 55792->55801 55795 416ba9 SetTextColor 55796 416bbe 55795->55796 55802 41a068 GetSysColor 55796->55802 55798 416bc3 SetBkColor 55803 41a6f0 GetSysColor CreateBrushIndirect 55798->55803 55801->55795 55802->55798 55803->55800 55804->55800 57795 4358f0 57796 435905 57795->57796 57800 43591f 57796->57800 57801 4352d8 57796->57801 57805 435322 57801->57805 57807 435308 57801->57807 57802 403400 4 API calls 57803 435727 57802->57803 57803->57800 57814 435738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57803->57814 57804 446db4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57804->57807 57805->57802 57806 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57806->57807 57807->57804 57807->57805 57807->57806 57808 402648 4 API calls 57807->57808 57809 431cb0 4 API calls 57807->57809 57811 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57807->57811 57812 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57807->57812 57815 4343c0 57807->57815 57827 434b84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57807->57827 57808->57807 57809->57807 57811->57807 57812->57807 57814->57800 57816 43447d 57815->57816 57817 4343ed 57815->57817 57846 434320 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57816->57846 57818 403494 4 API calls 57817->57818 57820 4343fb 57818->57820 57821 403778 4 API calls 57820->57821 57825 43441c 57821->57825 57822 403400 4 API calls 57823 4344cd 57822->57823 57823->57807 57824 43446f 57824->57822 57825->57824 57828 494314 57825->57828 57827->57807 57829 49434c 57828->57829 57830 4943e4 57828->57830 57831 403494 4 API calls 57829->57831 57847 448940 57830->57847 57836 494357 57831->57836 57833 494367 57834 403400 4 API calls 57833->57834 57835 494408 57834->57835 57837 403400 4 API calls 57835->57837 57836->57833 57838 4037b8 4 API calls 57836->57838 57839 494410 57837->57839 57840 494380 57838->57840 57839->57825 57840->57833 57841 4037b8 4 API calls 57840->57841 57842 4943a3 57841->57842 57843 403778 4 API calls 57842->57843 57844 4943d4 57843->57844 57845 403634 4 API calls 57844->57845 57845->57830 57846->57824 57848 448965 57847->57848 57849 4489a8 57847->57849 57850 403494 4 API calls 57848->57850 57851 4489bc 57849->57851 57859 44853c 57849->57859 57852 448970 57850->57852 57854 403400 4 API calls 57851->57854 57856 4037b8 4 API calls 57852->57856 57855 4489ef 57854->57855 57855->57833 57857 44898c 57856->57857 57858 4037b8 4 API calls 57857->57858 57858->57849 57860 403494 4 API calls 57859->57860 57861 448572 57860->57861 57862 4037b8 4 API calls 57861->57862 57863 448584 57862->57863 57864 403778 4 API calls 57863->57864 57865 4485a5 57864->57865 57866 4037b8 4 API calls 57865->57866 57867 4485bd 57866->57867 57868 403778 4 API calls 57867->57868 57869 4485e8 57868->57869 57870 4037b8 4 API calls 57869->57870 57881 448600 57870->57881 57871 448638 57873 403420 4 API calls 57871->57873 57872 4486d3 57877 4486db GetProcAddress 57872->57877 57874 448718 57873->57874 57874->57851 57875 44865b LoadLibraryExA 57875->57881 57876 44866d LoadLibraryA 57876->57881 57878 4486ee 57877->57878 57878->57871 57879 403b80 4 API calls 57879->57881 57880 403450 4 API calls 57880->57881 57881->57871 57881->57872 57881->57875 57881->57876 57881->57879 57881->57880 57883 43da98 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57881->57883 57883->57881 57884 40ce34 57887 406f18 WriteFile 57884->57887 57888 406f35 57887->57888 55805 416654 55806 416661 55805->55806 55807 4166bb 55805->55807 55813 416560 CreateWindowExA 55806->55813 55814 4162da 55806->55814 55808 416668 SetPropA SetPropA 55808->55807 55809 41669b 55808->55809 55810 4166ae SetWindowPos 55809->55810 55810->55807 55813->55808 55815 416306 55814->55815 55816 4162e6 GetClassInfoA 55814->55816 55815->55808 55816->55815 55817 4162fa GetClassInfoA 55816->55817 55817->55815 57889 4222f4 57890 422303 57889->57890 57895 421284 57890->57895 57893 422323 57896 4212f3 57895->57896 57897 421293 57895->57897 57898 421304 57896->57898 57920 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 57896->57920 57897->57896 57919 408d34 19 API calls 57897->57919 57900 421332 57898->57900 57903 4213ca 57898->57903 57902 4213a5 57900->57902 57908 42134d 57900->57908 57901 4213a3 57904 4213f6 57901->57904 57922 421e3c 11 API calls 57901->57922 57902->57901 57910 4213b9 57902->57910 57903->57901 57905 4213de SetMenu 57903->57905 57923 4211cc 10 API calls 57904->57923 57905->57901 57908->57901 57913 421370 GetMenu 57908->57913 57909 4213fd 57909->57893 57918 4221f8 10 API calls 57909->57918 57912 4213c2 SetMenu 57910->57912 57912->57901 57914 421393 57913->57914 57915 42137a 57913->57915 57921 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 57914->57921 57917 42138d SetMenu 57915->57917 57917->57914 57918->57893 57919->57897 57920->57898 57921->57901 57922->57904 57923->57909 57924 44b4b8 57925 44b4c6 57924->57925 57927 44b4e5 57924->57927 57926 44b39c 11 API calls 57925->57926 57925->57927 57926->57927 57928 448738 57929 448766 57928->57929 57930 44876d 57928->57930 57934 403400 4 API calls 57929->57934 57931 448781 57930->57931 57932 44853c 7 API calls 57930->57932 57931->57929 57933 403494 4 API calls 57931->57933 57932->57931 57935 44879a 57933->57935 57936 448917 57934->57936 57937 4037b8 4 API calls 57935->57937 57938 4487b6 57937->57938 57939 4037b8 4 API calls 57938->57939 57940 4487d2 57939->57940 57940->57929 57941 4487e6 57940->57941 57942 4037b8 4 API calls 57941->57942 57943 448800 57942->57943 57944 431be0 4 API calls 57943->57944 57945 448822 57944->57945 57946 431cb0 4 API calls 57945->57946 57953 448842 57945->57953 57946->57945 57947 448898 57960 442344 57947->57960 57948 448880 57948->57947 57972 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57948->57972 57952 4488cc GetLastError 57973 4484d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57952->57973 57953->57948 57971 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57953->57971 57955 4488db 57974 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57955->57974 57957 4488f0 57975 443630 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57957->57975 57959 4488f8 57961 443322 57960->57961 57962 44237d 57960->57962 57964 403400 4 API calls 57961->57964 57963 403400 4 API calls 57962->57963 57965 442385 57963->57965 57966 443337 57964->57966 57967 431be0 4 API calls 57965->57967 57966->57952 57968 442391 57967->57968 57969 443312 57968->57969 57976 441a1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57968->57976 57969->57952 57971->57953 57972->57947 57973->57955 57974->57957 57975->57959 57976->57968 57977 4165fc 73A25CF0 57978 42e3ff SetErrorMode
                                                                          Strings
                                                                          • Installing into GAC, xrefs: 004719A2
                                                                          • Dest filename: %s, xrefs: 00470B3C
                                                                          • Incrementing shared file count (64-bit)., xrefs: 0047181A
                                                                          • Time stamp of existing file: %s, xrefs: 00470CD3
                                                                          • , xrefs: 00470E77, 00471048, 004710C6
                                                                          • Same time stamp. Skipping., xrefs: 00470FFD
                                                                          • Non-default bitness: 32-bit, xrefs: 00470B63
                                                                          • Stripped read-only attribute., xrefs: 0047116F
                                                                          • .tmp, xrefs: 0047125F
                                                                          • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0047113E
                                                                          • Version of existing file: %u.%u.%u.%u, xrefs: 00470E24
                                                                          • Will register the file (a DLL/OCX) later., xrefs: 004717AD
                                                                          • Existing file has a later time stamp. Skipping., xrefs: 00471077
                                                                          • Version of our file: %u.%u.%u.%u, xrefs: 00470D98
                                                                          • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470F5D
                                                                          • @, xrefs: 00470A58
                                                                          • Skipping due to "onlyifdestfileexists" flag., xrefs: 004711A2
                                                                          • Time stamp of our file: %s, xrefs: 00470C43
                                                                          • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470F78
                                                                          • Dest file is protected by Windows File Protection., xrefs: 00470B95
                                                                          • -- File entry --, xrefs: 004709A3
                                                                          • Dest file exists., xrefs: 00470C63
                                                                          • Existing file is a newer version. Skipping., xrefs: 00470EAA
                                                                          • Uninstaller requires administrator: %s, xrefs: 0047141D
                                                                          • Time stamp of existing file: (failed to read), xrefs: 00470CDF
                                                                          • Time stamp of our file: (failed to read), xrefs: 00470C4F
                                                                          • Existing file is protected by Windows File Protection. Skipping., xrefs: 00471094
                                                                          • Non-default bitness: 64-bit, xrefs: 00470B57
                                                                          • User opted not to overwrite the existing file. Skipping., xrefs: 004710F5
                                                                          • Will register the file (a type library) later., xrefs: 004717A1
                                                                          • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470F6C
                                                                          • Version of our file: (none), xrefs: 00470DA4
                                                                          • Couldn't read time stamp. Skipping., xrefs: 00470FDD
                                                                          • Installing the file., xrefs: 004711B1
                                                                          • Incrementing shared file count (32-bit)., xrefs: 00471833
                                                                          • Same version. Skipping., xrefs: 00470F8D
                                                                          • InUn, xrefs: 004713ED
                                                                          • Version of existing file: (none), xrefs: 00470FA2
                                                                          • Skipping due to "onlyifdoesntexist" flag., xrefs: 00470C76
                                                                          • Failed to strip read-only attribute., xrefs: 0047117B
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                          • API String ID: 0-4021121268
                                                                          • Opcode ID: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                                          • Instruction ID: 00dcbbebc37e67597ddb11db3b00c056d98a3663d13b65a1c96947d1bb872b77
                                                                          • Opcode Fuzzy Hash: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                                          • Instruction Fuzzy Hash: 2C927534A04288DFDB11DFA9C845BDDBBB5AF05304F5480ABE848AB392C7789E45CB59

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1546 42e0ac-42e0bd 1547 42e0c8-42e0ed AllocateAndInitializeSid 1546->1547 1548 42e0bf-42e0c3 1546->1548 1549 42e297-42e29f 1547->1549 1550 42e0f3-42e110 GetVersion 1547->1550 1548->1549 1551 42e112-42e127 GetModuleHandleA GetProcAddress 1550->1551 1552 42e129-42e12b 1550->1552 1551->1552 1553 42e152-42e16c GetCurrentThread OpenThreadToken 1552->1553 1554 42e12d-42e13b CheckTokenMembership 1552->1554 1557 42e1a3-42e1cb GetTokenInformation 1553->1557 1558 42e16e-42e178 GetLastError 1553->1558 1555 42e141-42e14d 1554->1555 1556 42e279-42e28f FreeSid 1554->1556 1555->1556 1559 42e1e6-42e20a call 402648 GetTokenInformation 1557->1559 1560 42e1cd-42e1d5 GetLastError 1557->1560 1561 42e184-42e197 GetCurrentProcess OpenProcessToken 1558->1561 1562 42e17a-42e17f call 4031bc 1558->1562 1573 42e218-42e220 1559->1573 1574 42e20c-42e216 call 4031bc * 2 1559->1574 1560->1559 1564 42e1d7-42e1e1 call 4031bc * 2 1560->1564 1561->1557 1563 42e199-42e19e call 4031bc 1561->1563 1562->1549 1563->1549 1564->1549 1576 42e222-42e223 1573->1576 1577 42e253-42e271 call 402660 CloseHandle 1573->1577 1574->1549 1580 42e225-42e238 EqualSid 1576->1580 1584 42e23a-42e247 1580->1584 1585 42e24f-42e251 1580->1585 1584->1585 1588 42e249-42e24d 1584->1588 1585->1577 1585->1580 1588->1577
                                                                          APIs
                                                                          • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0E6
                                                                          • GetVersion.KERNEL32(00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E103
                                                                          • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E11C
                                                                          • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E122
                                                                          • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E137
                                                                          • FreeSid.ADVAPI32(00000000,0042E297,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E28A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                          • String ID: CheckTokenMembership$advapi32.dll
                                                                          • API String ID: 2252812187-1888249752
                                                                          • Opcode ID: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                                          • Instruction ID: 1c76bb1748f4203a7925b196b2d5623075850b54fd141b793a49aa5c8bf5bf77
                                                                          • Opcode Fuzzy Hash: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                                          • Instruction Fuzzy Hash: 22517571B44615EEEB10EAE6A842BBF7BACDB09304F9404BBB501F7282D57C9904867D

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1610 4502ac-4502b9 1611 4502bf-4502cc GetVersion 1610->1611 1612 450368-450372 1610->1612 1611->1612 1613 4502d2-4502e8 LoadLibraryA 1611->1613 1613->1612 1614 4502ea-450363 GetProcAddress * 6 1613->1614 1614->1612
                                                                          APIs
                                                                          • GetVersion.KERNEL32(00480618), ref: 004502BF
                                                                          • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480618), ref: 004502D7
                                                                          • GetProcAddress.KERNEL32(6E380000,RmStartSession), ref: 004502F5
                                                                          • GetProcAddress.KERNEL32(6E380000,RmRegisterResources), ref: 0045030A
                                                                          • GetProcAddress.KERNEL32(6E380000,RmGetList), ref: 0045031F
                                                                          • GetProcAddress.KERNEL32(6E380000,RmShutdown), ref: 00450334
                                                                          • GetProcAddress.KERNEL32(6E380000,RmRestart), ref: 00450349
                                                                          • GetProcAddress.KERNEL32(6E380000,RmEndSession), ref: 0045035E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$LibraryLoadVersion
                                                                          • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                          • API String ID: 1968650500-3419246398
                                                                          • Opcode ID: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                                          • Instruction ID: 1cbd638475316f18669290cc5db137bdc69b0bbe350ace6e5bf0246856dda450
                                                                          • Opcode Fuzzy Hash: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                                          • Instruction Fuzzy Hash: CC11A5B4541740DBDA10FBA5BB85A2A32E9E72C715B08563BEC44AA1A2DB7C4448CF9C

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1674 423c1c-423c50 1675 423c52-423c53 1674->1675 1676 423c84-423c9b call 423b78 1674->1676 1677 423c55-423c71 call 40b44c 1675->1677 1682 423cfc-423d01 1676->1682 1683 423c9d 1676->1683 1705 423c73-423c7b 1677->1705 1706 423c80-423c82 1677->1706 1684 423d03 1682->1684 1685 423d37-423d3c 1682->1685 1686 423ca3-423ca6 1683->1686 1687 423d60-423d70 1683->1687 1693 423fc1-423fc9 1684->1693 1694 423d09-423d11 1684->1694 1688 423d42-423d45 1685->1688 1689 4240aa-4240b8 IsIconic 1685->1689 1695 423cd5-423cd8 1686->1695 1696 423ca8 1686->1696 1691 423d72-423d77 1687->1691 1692 423d7b-423d83 call 4241a4 1687->1692 1699 4240e6-4240fb call 424860 1688->1699 1700 423d4b-423d4c 1688->1700 1701 424162-42416a 1689->1701 1710 4240be-4240c9 GetFocus 1689->1710 1707 423d88-423d90 call 4241ec 1691->1707 1708 423d79-423d9c call 423b94 1691->1708 1692->1701 1693->1701 1702 423fcf-423fda call 4181f0 1693->1702 1711 423f23-423f4a SendMessageA 1694->1711 1712 423d17-423d1c 1694->1712 1703 423db9-423dc0 1695->1703 1704 423cde-423cdf 1695->1704 1697 423e06-423e16 call 423b94 1696->1697 1698 423cae-423cb1 1696->1698 1697->1701 1721 423cb7-423cba 1698->1721 1722 423e2e-423e4a PostMessageA call 423b94 1698->1722 1699->1701 1715 423d52-423d55 1700->1715 1716 4240fd-424104 1700->1716 1714 424181-424187 1701->1714 1702->1701 1764 423fe0-423fef call 4181f0 IsWindowEnabled 1702->1764 1703->1701 1725 423dc6-423dcd 1703->1725 1726 423ce5-423ce8 1704->1726 1727 423f4f-423f56 1704->1727 1705->1714 1706->1676 1706->1677 1707->1701 1708->1701 1710->1701 1720 4240cf-4240d8 call 41f004 1710->1720 1711->1701 1728 423d22-423d23 1712->1728 1729 42405a-424065 1712->1729 1731 424130-424137 1715->1731 1732 423d5b 1715->1732 1742 424106-424119 call 4244e4 1716->1742 1743 42411b-42412e call 42453c 1716->1743 1720->1701 1776 4240de-4240e4 SetFocus 1720->1776 1739 423cc0-423cc3 1721->1739 1740 423eb5-423ebc 1721->1740 1722->1701 1725->1701 1745 423dd3-423dd9 1725->1745 1746 423cee-423cf1 1726->1746 1747 423e4f-423e6f call 423b94 1726->1747 1727->1701 1735 423f5c-423f61 call 404e54 1727->1735 1748 424082-42408d 1728->1748 1749 423d29-423d2c 1728->1749 1729->1701 1733 42406b-42407d 1729->1733 1768 42414a-424159 1731->1768 1769 424139-424148 1731->1769 1752 42415b-42415c call 423b94 1732->1752 1733->1701 1735->1701 1759 423cc9-423cca 1739->1759 1760 423dde-423dec IsIconic 1739->1760 1761 423ebe-423ed1 call 423b24 1740->1761 1762 423eef-423f00 call 423b94 1740->1762 1742->1701 1743->1701 1745->1701 1765 423cf7 1746->1765 1766 423e1b-423e29 call 424188 1746->1766 1793 423e93-423eb0 call 423a94 PostMessageA 1747->1793 1794 423e71-423e8e call 423b24 PostMessageA 1747->1794 1748->1701 1753 424093-4240a5 1748->1753 1750 423d32 1749->1750 1751 423f66-423f6e 1749->1751 1750->1752 1751->1701 1774 423f74-423f7b 1751->1774 1789 424161 1752->1789 1753->1701 1777 423cd0 1759->1777 1778 423da1-423da9 1759->1778 1784 423dfa-423e01 call 423b94 1760->1784 1785 423dee-423df5 call 423bd0 1760->1785 1806 423ee3-423eea call 423b94 1761->1806 1807 423ed3-423edd call 41ef68 1761->1807 1800 423f02-423f08 call 41eeb4 1762->1800 1801 423f16-423f1e call 423a94 1762->1801 1764->1701 1808 423ff5-424004 call 4181f0 IsWindowVisible 1764->1808 1765->1752 1766->1701 1768->1701 1769->1701 1774->1701 1792 423f81-423f90 call 4181f0 IsWindowEnabled 1774->1792 1776->1701 1777->1752 1778->1701 1795 423daf-423db4 call 422c5c 1778->1795 1784->1701 1785->1701 1789->1701 1792->1701 1821 423f96-423fac call 412320 1792->1821 1793->1701 1794->1701 1795->1701 1819 423f0d-423f10 1800->1819 1801->1701 1806->1701 1807->1806 1808->1701 1826 42400a-424055 GetFocus call 4181f0 SetFocus call 415250 SetFocus 1808->1826 1819->1801 1821->1701 1830 423fb2-423fbc 1821->1830 1826->1701 1830->1701
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                                          • Instruction ID: adb1057a9d0d7329e5210459a6b6756db00cf693e958207d3a560887342e2c6b
                                                                          • Opcode Fuzzy Hash: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                                          • Instruction Fuzzy Hash: EBE1A230700125EFD704EF69E989A6EB7B5EF94304F9480A6E545AB352C73CEE81DB08

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1989 467710-467726 1990 467730-4677e7 call 49514c call 402b30 * 6 1989->1990 1991 467728-46772b call 402d30 1989->1991 2008 467824-46783d 1990->2008 2009 4677e9-467810 call 41464c 1990->2009 1991->1990 2015 46783f-467866 call 41462c 2008->2015 2016 46787a-467888 call 495454 2008->2016 2013 467815-46781f call 41460c 2009->2013 2014 467812 2009->2014 2013->2008 2014->2013 2022 46786b-467875 call 4145ec 2015->2022 2023 467868 2015->2023 2024 46788a-467899 call 49529c 2016->2024 2025 46789b-46789d call 4953c0 2016->2025 2022->2016 2023->2022 2030 4678a2-4678f5 call 494db0 call 41a3e0 * 2 2024->2030 2025->2030 2037 467906-46791b call 451444 call 414b28 2030->2037 2038 4678f7-467904 call 414b28 2030->2038 2044 467920-467927 2037->2044 2038->2044 2045 46796f-467df5 call 4951ec call 495510 call 41462c * 3 call 4146cc call 4145ec * 3 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f80 call 460fd4 LoadBitmapA call 41d6c0 call 460fa4 call 460fbc call 4674ec call 469000 call 466b6c call 40357c call 414b28 call 466ea4 call 466eac call 466b6c call 40357c * 2 call 414b28 call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 414b28 * 2 call 469000 call 414b28 * 2 call 466ea4 call 41460c call 466ea4 call 41460c call 469000 call 414b28 call 466ea4 call 466eac call 469000 call 414b28 call 466ea4 call 41460c * 2 call 414b28 call 466ea4 call 41460c 2044->2045 2046 467929-46796a call 4146cc call 414710 call 420fa8 call 420fd4 call 420b78 call 420ba4 2044->2046 2176 467df7-467e4f call 41460c call 414b28 call 466ea4 call 41460c 2045->2176 2177 467e51-467e6a call 414a54 * 2 2045->2177 2046->2045 2184 467e6f-467f20 call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2176->2184 2177->2184 2203 467f22-467f3d 2184->2203 2204 467f5a-468190 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 4181f0 call 42ed48 call 414b28 call 4951ec call 495510 call 41462c call 466b6c call 414b28 call 466ea4 call 41460c call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 41460c call 466eac call 466b6c call 414b28 call 466ea4 2184->2204 2205 467f42-467f55 call 41460c 2203->2205 2206 467f3f 2203->2206 2265 468192-46819b 2204->2265 2266 4681d1-46828a call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2204->2266 2205->2204 2206->2205 2265->2266 2267 46819d-4681cc call 414a54 call 466eac 2265->2267 2284 4682c4-4686e5 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 414b28 call 4951ec call 495510 call 41462c call 414b28 call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 42bbe0 call 495520 call 44e8c0 call 466b6c call 469000 call 466b6c call 469000 call 466b6c call 469000 * 2 call 414b28 call 466ea4 call 466eac call 469000 call 494db0 call 41a3e0 call 466b6c call 40357c call 414b28 call 466ea4 call 41460c call 414b28 * 2 call 495520 call 403494 call 40357c * 2 call 414b28 2266->2284 2285 46828c-4682a7 2266->2285 2267->2266 2384 4686e7-468704 call 44ffc8 call 450124 2284->2384 2385 468709-468710 2284->2385 2286 4682ac-4682bf call 41460c 2285->2286 2287 4682a9 2285->2287 2286->2284 2287->2286 2384->2385 2387 468734-46873b 2385->2387 2388 468712-46872f call 44ffc8 call 450124 2385->2388 2390 46875f-4687a5 call 4181f0 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 4690f4 2387->2390 2391 46873d-46875a call 44ffc8 call 450124 2387->2391 2388->2387 2405 4687a7-4687ae 2390->2405 2406 4687bf 2390->2406 2391->2390 2407 4687b0-4687b9 2405->2407 2408 4687bb-4687bd 2405->2408 2409 4687c1-4687d0 2406->2409 2407->2406 2407->2408 2408->2409 2410 4687d2-4687d9 2409->2410 2411 4687ea 2409->2411 2412 4687e6-4687e8 2410->2412 2413 4687db-4687e4 2410->2413 2414 4687ec-468806 2411->2414 2412->2414 2413->2411 2413->2412 2415 4688af-4688b6 2414->2415 2416 46880c-468815 2414->2416 2419 4688bc-4688df call 47bfd8 call 403450 2415->2419 2420 468949-468957 call 414b28 2415->2420 2417 468817-46886e call 47bfd8 call 414b28 call 47bfd8 call 414b28 call 47bfd8 call 414b28 2416->2417 2418 468870-4688aa call 414b28 * 3 2416->2418 2417->2415 2418->2415 2439 4688f0-468904 call 403494 2419->2439 2440 4688e1-4688ee call 47c178 2419->2440 2426 46895c-468965 2420->2426 2430 468a75-468aa4 call 42b97c call 44e84c 2426->2430 2431 46896b-468983 call 429fe8 2426->2431 2465 468b52-468b56 2430->2465 2466 468aaa-468aae 2430->2466 2448 468985-468989 2431->2448 2449 4689fa-4689fe 2431->2449 2461 468916-468947 call 42c814 call 42cbd0 call 403494 call 414b28 2439->2461 2462 468906-468911 call 403494 2439->2462 2440->2461 2456 46898b-4689c5 call 40b44c call 47bfd8 2448->2456 2454 468a00-468a09 2449->2454 2455 468a4e-468a52 2449->2455 2454->2455 2463 468a0b-468a16 2454->2463 2459 468a66-468a70 call 42a06c 2455->2459 2460 468a54-468a64 call 42a06c 2455->2460 2516 4689c7-4689ce 2456->2516 2517 4689f4-4689f8 2456->2517 2459->2430 2460->2430 2461->2426 2462->2461 2463->2455 2475 468a18-468a1c 2463->2475 2468 468bd5-468bd9 2465->2468 2469 468b58-468b5f 2465->2469 2467 468ab0-468ac2 call 40b44c 2466->2467 2495 468af4-468b2b call 47bfd8 call 44cb1c 2467->2495 2496 468ac4-468af2 call 47bfd8 call 44cbec 2467->2496 2478 468c42-468c4b 2468->2478 2479 468bdb-468bf2 call 40b44c 2468->2479 2469->2468 2480 468b61-468b68 2469->2480 2484 468a1e-468a41 call 40b44c call 406acc 2475->2484 2487 468c4d-468c65 call 40b44c call 469d68 2478->2487 2488 468c6a-468c7f call 46724c call 466fc8 2478->2488 2509 468bf4-468c30 call 40b44c call 469d68 * 2 call 469c08 2479->2509 2510 468c32-468c40 call 469d68 2479->2510 2480->2468 2490 468b6a-468b75 2480->2490 2527 468a43-468a46 2484->2527 2528 468a48-468a4c 2484->2528 2487->2488 2541 468cd1-468cdb call 414a54 2488->2541 2542 468c81-468ca4 call 42a050 call 40b44c 2488->2542 2490->2488 2499 468b7b-468b7f 2490->2499 2543 468b30-468b34 2495->2543 2496->2543 2511 468b81-468b97 call 40b44c 2499->2511 2509->2488 2510->2488 2539 468bca-468bce 2511->2539 2540 468b99-468bc5 call 42a06c call 469d68 call 469c08 2511->2540 2516->2517 2529 4689d0-4689e2 call 406acc 2516->2529 2517->2449 2517->2456 2527->2455 2528->2455 2528->2484 2529->2517 2552 4689e4-4689ee 2529->2552 2539->2511 2544 468bd0 2539->2544 2540->2488 2553 468ce0-468cff call 414a54 2541->2553 2567 468ca6-468cad 2542->2567 2568 468caf-468cbe call 414a54 2542->2568 2550 468b36-468b3d 2543->2550 2551 468b3f-468b41 2543->2551 2544->2488 2550->2551 2557 468b48-468b4c 2550->2557 2551->2557 2552->2517 2558 4689f0 2552->2558 2569 468d01-468d24 call 42a050 call 469ec8 2553->2569 2570 468d29-468d4c call 47bfd8 call 403450 2553->2570 2557->2465 2557->2467 2558->2517 2567->2568 2573 468cc0-468ccf call 414a54 2567->2573 2568->2553 2569->2570 2586 468d4e-468d57 2570->2586 2587 468d68-468d71 2570->2587 2573->2553 2586->2587 2588 468d59-468d66 call 47c178 2586->2588 2589 468d87-468d97 call 403494 2587->2589 2590 468d73-468d85 call 403684 2587->2590 2597 468da9-468dc0 call 414b28 2588->2597 2589->2597 2590->2589 2598 468d99-468da4 call 403494 2590->2598 2602 468df6-468e00 call 414a54 2597->2602 2603 468dc2-468dc9 2597->2603 2598->2597 2609 468e05-468e2a call 403400 * 3 2602->2609 2604 468dd6-468de0 call 42b0f4 2603->2604 2605 468dcb-468dd4 2603->2605 2607 468de5-468df4 call 414a54 2604->2607 2605->2604 2605->2607 2607->2609
                                                                          APIs
                                                                            • Part of subcall function 0049529C: GetWindowRect.USER32(00000000), ref: 004952B2
                                                                          • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467ADF
                                                                            • Part of subcall function 0041D6C0: GetObjectA.GDI32(?,00000018,00467AF9), ref: 0041D6EB
                                                                            • Part of subcall function 004674EC: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                                            • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                                            • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                                            • Part of subcall function 00466EAC: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                                            • Part of subcall function 00495520: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 0049552A
                                                                            • Part of subcall function 0042ED48: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                            • Part of subcall function 0042ED48: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                            • Part of subcall function 004951EC: 73A1A570.USER32(00000000,?,?,?), ref: 0049520E
                                                                            • Part of subcall function 004951EC: SelectObject.GDI32(?,00000000), ref: 00495234
                                                                            • Part of subcall function 004951EC: 73A1A480.USER32(00000000,?,00495292,0049528B,?,00000000,?,?,?), ref: 00495285
                                                                            • Part of subcall function 00495510: MulDiv.KERNEL32(0000004B,?,00000006), ref: 0049551A
                                                                          • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,02259D90,0225B97C,?,?,0225B9AC,?,?,0225B9FC,?), ref: 00468769
                                                                          • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046877A
                                                                          • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468792
                                                                            • Part of subcall function 0042A06C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A082
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Menu$AppendExtractIconObject$A480A570AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectSelectSendSystemUserWindow
                                                                          • String ID: $(Default)$STOPIMAGE$k H
                                                                          • API String ID: 3271511185-4041106330
                                                                          • Opcode ID: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                                          • Instruction ID: 2b4e5e33b1fbe28ecfb2af168a793b611adbc31a6fcb8730d9662ddd01b2079a
                                                                          • Opcode Fuzzy Hash: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                                          • Instruction Fuzzy Hash: 6CF2C7386005208FCB00EB59D9D9F9973F5BF49304F1582BAF5049B36ADB74AC46CB9A
                                                                          APIs
                                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 00475251
                                                                          • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047532E
                                                                          • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047533C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Find$File$CloseFirstNext
                                                                          • String ID: unins$unins???.*
                                                                          • API String ID: 3541575487-1009660736
                                                                          • Opcode ID: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                                          • Instruction ID: 9ba6e551af2be01ae54f2bf6d4feb37662207b66b60327addd096aea054bc42d
                                                                          • Opcode Fuzzy Hash: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                                          • Instruction Fuzzy Hash: 333153706005489FDB10EB65D981ADE77B9EF44344F5080F6A80CAB3B2DBB89F418B58
                                                                          APIs
                                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A89
                                                                          • GetLastError.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A91
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorFileFindFirstLast
                                                                          • String ID:
                                                                          • API String ID: 873889042-0
                                                                          • Opcode ID: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                                          • Instruction ID: 2517da8cadb6fb7e7a3bde91136fc32a544ec95f0d2c756002249f4fd287b9db
                                                                          • Opcode Fuzzy Hash: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                                          • Instruction Fuzzy Hash: B9F0F971A04604AB8B20DBA69D0149EB7ACEB46725710467BFC14E3292EAB94E048558
                                                                          APIs
                                                                          • GetVersion.KERNEL32(00000552,0046E422), ref: 0046E396
                                                                          • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,00000552,0046E422), ref: 0046E3B2
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateInstanceVersion
                                                                          • String ID:
                                                                          • API String ID: 1462612201-0
                                                                          • Opcode ID: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                                          • Instruction ID: ca204bcfc643a6eeda20b237376823326e775e7ff9cf44b6f5c5a065e078b710
                                                                          • Opcode Fuzzy Hash: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                                          • Instruction Fuzzy Hash: 80F0A035282200DEEB1097AADC45B4A37C1BB20718F40007BF440D7391E3FDD8908A5F
                                                                          APIs
                                                                          • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: InfoLocale
                                                                          • String ID:
                                                                          • API String ID: 2299586839-0
                                                                          • Opcode ID: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                                          • Instruction ID: d3b8e551ebd18b966166ca098383beb9494d3946d3c482517005b7019d2e894c
                                                                          • Opcode Fuzzy Hash: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                                          • Instruction Fuzzy Hash: EEE0D87170021467D711A95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE8046ED
                                                                          APIs
                                                                          • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424161,?,00000000,0042416C), ref: 00423BBE
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: NtdllProc_Window
                                                                          • String ID:
                                                                          • API String ID: 4255912815-0
                                                                          • Opcode ID: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                                          • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                                          • Opcode Fuzzy Hash: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                                          • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: NameUser
                                                                          • String ID:
                                                                          • API String ID: 2645101109-0
                                                                          • Opcode ID: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                                          • Instruction ID: 445fb77b721d6e8bc33303137c5d79e403f1e24c04085a252f4bbff9531eb306
                                                                          • Opcode Fuzzy Hash: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                                          • Instruction Fuzzy Hash: 6AD0C271304704A3C700AAA99C825AA35DD8B84315F00483F3CC6DA3C3FABDDA481696
                                                                          APIs
                                                                          • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F54C
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: NtdllProc_Window
                                                                          • String ID:
                                                                          • API String ID: 4255912815-0
                                                                          • Opcode ID: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                                          • Instruction ID: 55aff4e3ab0814f5b97a0c0db1ec4da333d3f7c11773d115dc143ade784a7ab4
                                                                          • Opcode Fuzzy Hash: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                                          • Instruction Fuzzy Hash: BAD05E7120010C7B9B00DE9CE840C6B33BC9B88700BA08825F918C7202C634ED5187A8

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 406 46f300-46f332 407 46f334-46f33b 406->407 408 46f34f 406->408 409 46f346-46f34d 407->409 410 46f33d-46f344 407->410 411 46f356-46f38e call 403634 call 403738 call 42ded0 408->411 409->411 410->408 410->409 418 46f390-46f3a4 call 403738 call 42ded0 411->418 419 46f3a9-46f3d2 call 403738 call 42ddf4 411->419 418->419 427 46f3d4-46f3dd call 46efd0 419->427 428 46f3e2-46f40b call 46f0ec 419->428 427->428 432 46f41d-46f420 call 403400 428->432 433 46f40d-46f41b call 403494 428->433 437 46f425-46f470 call 46f0ec call 42c40c call 46f134 call 46f0ec 432->437 433->437 446 46f486-46f4a7 call 455588 call 46f0ec 437->446 447 46f472-46f485 call 46f15c 437->447 454 46f4fd-46f504 446->454 455 46f4a9-46f4fc call 46f0ec call 431414 call 46f0ec call 431414 call 46f0ec 446->455 447->446 456 46f506-46f543 call 431414 call 46f0ec call 431414 call 46f0ec 454->456 457 46f544-46f54b 454->457 455->454 456->457 461 46f58c-46f5b1 call 40b44c call 46f0ec 457->461 462 46f54d-46f58b call 46f0ec * 3 457->462 481 46f5b3-46f5be call 47bfd8 461->481 482 46f5c0-46f5c9 call 403494 461->482 462->461 491 46f5ce-46f5d9 call 478d20 481->491 482->491 496 46f5e2 491->496 497 46f5db-46f5e0 491->497 498 46f5e7-46f7b1 call 403778 call 46f0ec call 47bfd8 call 46f134 call 403494 call 40357c * 2 call 46f0ec call 403494 call 40357c * 2 call 46f0ec call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 496->498 497->498 561 46f7c7-46f7d5 call 46f15c 498->561 562 46f7b3-46f7c5 call 46f0ec 498->562 566 46f7da 561->566 567 46f7db-46f824 call 46f15c call 46f190 call 46f0ec call 47bfd8 call 46f1f4 562->567 566->567 578 46f826-46f849 call 46f15c * 2 567->578 579 46f84a-46f857 567->579 578->579 581 46f926-46f92d 579->581 582 46f85d-46f864 579->582 583 46f987-46f99d RegCloseKey 581->583 584 46f92f-46f965 call 4946bc 581->584 586 46f866-46f86d 582->586 587 46f8d1-46f8e0 582->587 584->583 586->587 591 46f86f-46f893 call 430bdc 586->591 590 46f8e3-46f8f0 587->590 594 46f907-46f920 call 430c18 call 46f15c 590->594 595 46f8f2-46f8ff 590->595 591->590 601 46f895-46f896 591->601 604 46f925 594->604 595->594 597 46f901-46f905 595->597 597->581 597->594 603 46f898-46f8be call 40b44c call 47954c 601->603 609 46f8c0-46f8c6 call 430bdc 603->609 610 46f8cb-46f8cd 603->610 604->581 609->610 610->603 612 46f8cf 610->612 612->590
                                                                          APIs
                                                                            • Part of subcall function 0046F0EC: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                                            • Part of subcall function 0046F15C: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                                          • RegCloseKey.ADVAPI32(?,0046F9A5,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F9F0,?,?,0049C1D0,00000000), ref: 0046F998
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Value$Close
                                                                          • String ID: " /SILENT$5.5.0 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                          • API String ID: 3391052094-1769338133
                                                                          • Opcode ID: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                                          • Instruction ID: 138fe2a8aa43a8f2517aa1aee13eacc10811dc4b0cf032f1bf39601b5d09dcc5
                                                                          • Opcode Fuzzy Hash: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                                          • Instruction Fuzzy Hash: 96126331A001089BCB04EB55F891ADE77F5FB49304F60807BE841AB396EB79BD49CB59

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1027 492208-49223c call 403684 1030 49223e-49224d call 446fac Sleep 1027->1030 1031 492252-49225f call 403684 1027->1031 1036 4926e2-4926fc call 403420 1030->1036 1037 49228e-49229b call 403684 1031->1037 1038 492261-492284 call 447008 call 403738 FindWindowA call 447288 1031->1038 1046 4922ca-4922d7 call 403684 1037->1046 1047 49229d-4922c5 call 447008 call 403738 FindWindowA call 447288 1037->1047 1056 492289 1038->1056 1054 4922d9-49231b call 446fac * 4 SendMessageA call 447288 1046->1054 1055 492320-49232d call 403684 1046->1055 1047->1036 1054->1036 1064 49237c-492389 call 403684 1055->1064 1065 49232f-492377 call 446fac * 4 PostMessageA call 4470e0 1055->1065 1056->1036 1076 4923d8-4923e5 call 403684 1064->1076 1077 49238b-4923d3 call 446fac * 4 SendNotifyMessageA call 4470e0 1064->1077 1065->1036 1089 492412-49241f call 403684 1076->1089 1090 4923e7-49240d call 447008 call 403738 RegisterClipboardFormatA call 447288 1076->1090 1077->1036 1102 492421-49245b call 446fac * 3 SendMessageA call 447288 1089->1102 1103 492460-49246d call 403684 1089->1103 1090->1036 1102->1036 1115 49246f-4924af call 446fac * 3 PostMessageA call 4470e0 1103->1115 1116 4924b4-4924c1 call 403684 1103->1116 1115->1036 1128 492508-492515 call 403684 1116->1128 1129 4924c3-492503 call 446fac * 3 SendNotifyMessageA call 4470e0 1116->1129 1140 49256a-492577 call 403684 1128->1140 1141 492517-492535 call 447008 call 42e3a4 1128->1141 1129->1036 1151 492579-4925a5 call 447008 call 403738 call 446fac GetProcAddress 1140->1151 1152 4925f1-4925fe call 403684 1140->1152 1158 492547-492555 GetLastError call 447288 1141->1158 1159 492537-492545 call 447288 1141->1159 1183 4925e1-4925ec call 4470e0 1151->1183 1184 4925a7-4925dc call 446fac * 2 call 447288 call 4470e0 1151->1184 1164 492600-492621 call 446fac FreeLibrary call 4470e0 1152->1164 1165 492626-492633 call 403684 1152->1165 1170 49255a-492565 call 447288 1158->1170 1159->1170 1164->1036 1180 492658-492665 call 403684 1165->1180 1181 492635-492653 call 447008 call 403738 CreateMutexA 1165->1181 1170->1036 1191 49269b-4926a8 call 403684 1180->1191 1192 492667-492699 call 48c638 call 403574 call 403738 OemToCharBuffA call 48c650 1180->1192 1181->1036 1183->1036 1184->1036 1204 4926aa-4926dc call 48c638 call 403574 call 403738 CharToOemBuffA call 48c650 1191->1204 1205 4926de 1191->1205 1192->1036 1204->1036 1205->1036
                                                                          APIs
                                                                          • Sleep.KERNEL32(00000000,00000000,004926FD,?,?,?,?,00000000,00000000,00000000), ref: 00492248
                                                                          • FindWindowA.USER32(00000000,00000000), ref: 00492279
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FindSleepWindow
                                                                          • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                          • API String ID: 3078808852-3310373309
                                                                          • Opcode ID: c1ec15085ba63eb54c7011cdac0519612329d97296155b19e28ce0d5a23e6700
                                                                          • Instruction ID: d4b9d66e752ac066ee841e8e0b6dcdad2790022369f15f3c2d7e05b7c0e56f01
                                                                          • Opcode Fuzzy Hash: c1ec15085ba63eb54c7011cdac0519612329d97296155b19e28ce0d5a23e6700
                                                                          • Instruction Fuzzy Hash: 7BC18360B042003BDB14BE3E8D4651F599AAF98704B21DA3FB446EB78BDE7DDC0A4359

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1589 4834fc-483521 GetModuleHandleA GetProcAddress 1590 483588-48358d GetSystemInfo 1589->1590 1591 483523-483539 GetNativeSystemInfo GetProcAddress 1589->1591 1592 483592-48359b 1590->1592 1591->1592 1593 48353b-483546 GetCurrentProcess 1591->1593 1594 4835ab-4835b2 1592->1594 1595 48359d-4835a1 1592->1595 1593->1592 1600 483548-48354c 1593->1600 1599 4835cd-4835d2 1594->1599 1597 4835a3-4835a7 1595->1597 1598 4835b4-4835bb 1595->1598 1601 4835a9-4835c6 1597->1601 1602 4835bd-4835c4 1597->1602 1598->1599 1600->1592 1603 48354e-483555 call 452708 1600->1603 1601->1599 1602->1599 1603->1592 1607 483557-483564 GetProcAddress 1603->1607 1607->1592 1608 483566-48357d GetModuleHandleA GetProcAddress 1607->1608 1608->1592 1609 48357f-483586 1608->1609 1609->1592
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0048350D
                                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0048351A
                                                                          • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483528
                                                                          • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483530
                                                                          • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 0048353C
                                                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 0048355D
                                                                          • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483570
                                                                          • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483576
                                                                          • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0048358D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                          • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                          • API String ID: 2230631259-2623177817
                                                                          • Opcode ID: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                                          • Instruction ID: aef9cc714e700b71c16e3c25fef244724f393c0ebf8792b51c17ae6c670cb8ad
                                                                          • Opcode Fuzzy Hash: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                                          • Instruction Fuzzy Hash: 3C11B181104341B4DA22BB799C4AB7FA5C88B14F1EF084C3B6C41662C2DBBCCF45972E

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1615 4690f4-46912c call 47bfd8 1618 469132-469142 call 478d40 1615->1618 1619 46930e-469328 call 403420 1615->1619 1624 469147-46918c call 4078fc call 403738 call 42de2c 1618->1624 1630 469191-469193 1624->1630 1631 469304-469308 1630->1631 1632 469199-4691ae 1630->1632 1631->1619 1631->1624 1633 4691c3-4691ca 1632->1633 1634 4691b0-4691be call 42dd5c 1632->1634 1636 4691f7-4691fe 1633->1636 1637 4691cc-4691ee call 42dd5c call 42dd74 1633->1637 1634->1633 1639 469257-46925e 1636->1639 1640 469200-469225 call 42dd5c * 2 1636->1640 1637->1636 1656 4691f0 1637->1656 1643 4692a4-4692ab 1639->1643 1644 469260-469272 call 42dd5c 1639->1644 1661 469227-469230 call 431508 1640->1661 1662 469235-469247 call 42dd5c 1640->1662 1646 4692e6-4692fc RegCloseKey 1643->1646 1647 4692ad-4692e1 call 42dd5c * 3 1643->1647 1657 469274-46927d call 431508 1644->1657 1658 469282-469294 call 42dd5c 1644->1658 1647->1646 1656->1636 1657->1658 1658->1643 1668 469296-46929f call 431508 1658->1668 1661->1662 1662->1639 1672 469249-469252 call 431508 1662->1672 1668->1643 1672->1639
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegCloseKey.ADVAPI32(?,0046930E,?,?,00000001,00000000,00000000,00469329,?,00000000,00000000,?), ref: 004692F7
                                                                          Strings
                                                                          • Inno Setup: User Info: Organization, xrefs: 004692C6
                                                                          • Inno Setup: Selected Tasks, xrefs: 00469263
                                                                          • Inno Setup: User Info: Serial, xrefs: 004692D9
                                                                          • Inno Setup: User Info: Name, xrefs: 004692B3
                                                                          • Inno Setup: Deselected Components, xrefs: 00469238
                                                                          • Inno Setup: Icon Group, xrefs: 004691D2
                                                                          • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00469153
                                                                          • Inno Setup: App Path, xrefs: 004691B6
                                                                          • Inno Setup: No Icons, xrefs: 004691DF
                                                                          • Inno Setup: Setup Type, xrefs: 00469206
                                                                          • Inno Setup: Selected Components, xrefs: 00469216
                                                                          • Inno Setup: Deselected Tasks, xrefs: 00469285
                                                                          • %s\%s_is1, xrefs: 00469171
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpen
                                                                          • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                          • API String ID: 47109696-1093091907
                                                                          • Opcode ID: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                                          • Instruction ID: 061cd232f3236ea8aa9d1be5d6e88d15b117e94232a8cb9589ebe07a9024ca8b
                                                                          • Opcode Fuzzy Hash: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                                          • Instruction Fuzzy Hash: 2451A530A007049BCB11DB65D991BDEB7F9EF49304F5084BAE841A7391E778AE05CB59

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1944 47cb30-47cb86 call 42c40c call 4035c0 call 47c7a8 call 4525c4 1953 47cb92-47cba1 call 4525c4 1944->1953 1954 47cb88-47cb8d call 453330 1944->1954 1958 47cba3-47cba9 1953->1958 1959 47cbbb-47cbc1 1953->1959 1954->1953 1960 47cbcb-47cbd3 call 403494 1958->1960 1961 47cbab-47cbb1 1958->1961 1962 47cbc3-47cbc9 1959->1962 1963 47cbd8-47cc00 call 42e3a4 * 2 1959->1963 1960->1963 1961->1959 1964 47cbb3-47cbb9 1961->1964 1962->1960 1962->1963 1970 47cc27-47cc41 GetProcAddress 1963->1970 1971 47cc02-47cc22 call 4078fc call 453330 1963->1971 1964->1959 1964->1960 1972 47cc43-47cc48 call 453330 1970->1972 1973 47cc4d-47cc6a call 403400 * 2 1970->1973 1971->1970 1972->1973
                                                                          APIs
                                                                          • GetProcAddress.KERNEL32(6FBE0000,SHGetFolderPathA), ref: 0047CC32
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc
                                                                          • String ID: -rI$Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                          • API String ID: 190572456-1821436788
                                                                          • Opcode ID: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                                          • Instruction ID: 6634b889f1a60bd4549a24dd6789ad2f54a0d6468ac2a8038bb9781f42ef23c6
                                                                          • Opcode Fuzzy Hash: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                                          • Instruction Fuzzy Hash: 8531E970A00109DFCF11EFA9D9D29EEB7B5EB44304B60847BE808E7241D738AE458B6D

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1982 406334-40634e GetModuleHandleA GetProcAddress 1983 406350 1982->1983 1984 406357-406364 GetProcAddress 1982->1984 1983->1984 1985 406366 1984->1985 1986 40636d-40637a GetProcAddress 1984->1986 1985->1986 1987 406380-406381 1986->1987 1988 40637c-40637e SetProcessDEPPolicy 1986->1988 1988->1987
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                                          • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                          • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                          • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                          • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleModulePolicyProcess
                                                                          • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                          • API String ID: 3256987805-3653653586
                                                                          • Opcode ID: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                                          • Instruction ID: d0a9e1fb4642b92a4408cab99680119fc9d423cfedcded744397bec81fc197df
                                                                          • Opcode Fuzzy Hash: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                                          • Instruction Fuzzy Hash: C6E026A1380701ACEA1436F20D82F7B10488B40B64B2A14373D5AB91C3D9BDD92459BD

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 2618 423884-42388e 2619 4239b7-4239bb 2618->2619 2620 423894-4238b6 call 41f3d4 GetClassInfoA 2618->2620 2623 4238e7-4238f0 GetSystemMetrics 2620->2623 2624 4238b8-4238cf RegisterClassA 2620->2624 2626 4238f2 2623->2626 2627 4238f5-4238ff GetSystemMetrics 2623->2627 2624->2623 2625 4238d1-4238e2 call 408cc4 call 40311c 2624->2625 2625->2623 2626->2627 2629 423901 2627->2629 2630 423904-423960 call 403738 call 406300 call 403400 call 42365c SetWindowLongA 2627->2630 2629->2630 2641 423962-423975 call 424188 SendMessageA 2630->2641 2642 42397a-4239a8 GetSystemMenu DeleteMenu * 2 2630->2642 2641->2642 2642->2619 2644 4239aa-4239b2 DeleteMenu 2642->2644 2644->2619
                                                                          APIs
                                                                            • Part of subcall function 0041F3D4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                          • GetClassInfoA.USER32(00400000,0042368C), ref: 004238AF
                                                                          • RegisterClassA.USER32(00499630), ref: 004238C7
                                                                          • GetSystemMetrics.USER32(00000000), ref: 004238E9
                                                                          • GetSystemMetrics.USER32(00000001), ref: 004238F8
                                                                          • SetWindowLongA.USER32(00410660,000000FC,0042369C), ref: 00423954
                                                                          • SendMessageA.USER32(00410660,00000080,00000001,00000000), ref: 00423975
                                                                          • GetSystemMenu.USER32(00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 00423980
                                                                          • DeleteMenu.USER32(00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 0042398F
                                                                          • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042399C
                                                                          • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239B2
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                          • String ID:
                                                                          • API String ID: 183575631-0
                                                                          • Opcode ID: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                                          • Instruction ID: c8b20579a229f032ee7a03b4d787949f367ffe63dd75f0d430c9c3a529dbdbac
                                                                          • Opcode Fuzzy Hash: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                                          • Instruction Fuzzy Hash: 813172B17402006AEB10AF65AC82F6B36989B14308F10017BFA40AE2D3C6BDDD40876D

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 2646 4674ec-467596 call 41462c call 41464c call 41462c call 41464c SHGetFileInfo 2655 4675cb-4675d6 call 478d20 2646->2655 2656 467598-46759f 2646->2656 2661 467627-46763a call 47cff4 2655->2661 2662 4675d8-46761d call 42c40c call 40357c call 403738 ExtractIconA call 46742c 2655->2662 2656->2655 2657 4675a1-4675c6 ExtractIconA call 46742c 2656->2657 2657->2655 2667 46763c-467646 call 47cff4 2661->2667 2668 46764b-46764f 2661->2668 2683 467622 2662->2683 2667->2668 2671 467651-467674 call 403738 SHGetFileInfo 2668->2671 2672 4676a9-4676dd call 403400 * 2 2668->2672 2671->2672 2682 467676-46767d 2671->2682 2682->2672 2685 46767f-4676a4 ExtractIconA call 46742c 2682->2685 2683->2672 2685->2672
                                                                          APIs
                                                                          • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                                          • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                                            • Part of subcall function 0046742C: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 004674C4
                                                                            • Part of subcall function 0046742C: DestroyCursor.USER32(00000000), ref: 004674DA
                                                                          • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                                          • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 0046766D
                                                                          • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467693
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                          • String ID: c:\directory$k H$shell32.dll
                                                                          • API String ID: 3376378930-433663191
                                                                          • Opcode ID: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                                          • Instruction ID: 265839c963417482dd86c951db209f81288bb0a388fd09f062db7983cc26d63d
                                                                          • Opcode Fuzzy Hash: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                                          • Instruction Fuzzy Hash: B2516070604604AFDB10EF69CD89FDFB7E8EB48318F1081A6F9049B391D6399E81CA59

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 2688 42f570-42f57a 2689 42f584-42f5c1 call 402b30 GetActiveWindow GetFocus call 41eeb4 2688->2689 2690 42f57c-42f57f call 402d30 2688->2690 2696 42f5d3-42f5db 2689->2696 2697 42f5c3-42f5cd RegisterClassA 2689->2697 2690->2689 2698 42f662-42f67e SetFocus call 403400 2696->2698 2699 42f5e1-42f612 CreateWindowExA 2696->2699 2697->2696 2699->2698 2700 42f614-42f658 call 42428c call 403738 CreateWindowExA 2699->2700 2700->2698 2707 42f65a-42f65d ShowWindow 2700->2707 2707->2698
                                                                          APIs
                                                                          • GetActiveWindow.USER32 ref: 0042F59F
                                                                          • GetFocus.USER32 ref: 0042F5A7
                                                                          • RegisterClassA.USER32(004997AC), ref: 0042F5C8
                                                                          • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F69C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F606
                                                                          • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F64C
                                                                          • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F65D
                                                                          • SetFocus.USER32(00000000,00000000,0042F67F,?,?,?,00000001,00000000,?,00458696,00000000,0049B628), ref: 0042F664
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                          • String ID: TWindowDisabler-Window
                                                                          • API String ID: 3167913817-1824977358
                                                                          • Opcode ID: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                                          • Instruction ID: 092f1afd63313efa57bcf667ad1f00c9caddf595d34af2871f870ebe591ae418
                                                                          • Opcode Fuzzy Hash: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                                          • Instruction Fuzzy Hash: 20219F70740710BAE710EF62AD03F1A76A8EB04B04FA1413AF504AB2D1D7B96D5586ED
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                          • API String ID: 1646373207-2130885113
                                                                          • Opcode ID: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                                          • Instruction ID: 5e931287d6eebe3694b70f0ad3549e6df422da746536320e83a51589c54bb73f
                                                                          • Opcode Fuzzy Hash: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                                          • Instruction Fuzzy Hash: 5B017570240B45AFD711AF73AD02F167658E705B57F6044BBFC0096286D77C8A088EAD
                                                                          APIs
                                                                          • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C893
                                                                          • GetLastError.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C89C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateDirectoryErrorLast
                                                                          • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup
                                                                          • API String ID: 1375471231-1421604804
                                                                          • Opcode ID: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                                          • Instruction ID: 2e7cf1fa8793a22cdcb7cccf6aa375e82942df810c5d1ff78a46bc34c798803d
                                                                          • Opcode Fuzzy Hash: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                                          • Instruction Fuzzy Hash: 65411474A001099BDB00EFA5D8C2ADEB7B9EB44309F50857BE91477392DB389E058B69
                                                                          APIs
                                                                          • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430958
                                                                          • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430967
                                                                          • GetCurrentThreadId.KERNEL32 ref: 00430981
                                                                          • GlobalAddAtomA.KERNEL32(00000000), ref: 004309A2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                          • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                          • API String ID: 4130936913-2943970505
                                                                          • Opcode ID: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                                          • Instruction ID: fe08fc0df2a0eca0a869f0df0621173a2940aa0bc2523ddfe777e35bb070d714
                                                                          • Opcode Fuzzy Hash: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                                          • Instruction Fuzzy Hash: 30F082B0958340CEE300EB25994271A7BE0EF58318F00467FF498A63E2D7399900CB5F
                                                                          APIs
                                                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,0000001D,00000000,?,00472951), ref: 00472591
                                                                          • FindClose.KERNEL32(000000FF,004725BC,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,0000001D,00000000,?,00472951,?), ref: 004725AF
                                                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,0000001D,00000000,?,00472951), ref: 004726B3
                                                                          • FindClose.KERNEL32(000000FF,004726DE,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,0000001D,00000000,?,00472951,?), ref: 004726D1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Find$CloseFileNext
                                                                          • String ID: "*G$"*G
                                                                          • API String ID: 2066263336-450946878
                                                                          • Opcode ID: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                                          • Instruction ID: 3872decae14ce2498a692a517acaa1cf84d86a609609514027ee2c14d85ef847
                                                                          • Opcode Fuzzy Hash: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                                          • Instruction Fuzzy Hash: 6CB13E7490424DAFCF11DFA5C981ADEBBB9FF49304F5081AAE808B3251D7789A46CF58
                                                                          APIs
                                                                          • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218,00000000), ref: 004551A6
                                                                          • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218), ref: 004551B3
                                                                            • Part of subcall function 00454F68: WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                                            • Part of subcall function 00454F68: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                                            • Part of subcall function 00454F68: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                                            • Part of subcall function 00454F68: CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                          • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                          • API String ID: 854858120-615399546
                                                                          • Opcode ID: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                                          • Instruction ID: 314af404618b4f06b129018ed763823481dfe4f790e250d6c958622b2bfe97d6
                                                                          • Opcode Fuzzy Hash: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                                          • Instruction Fuzzy Hash: 12515A30A0074DABDB11EF95C892BEEBBB9AF44705F50407BB804B7282D7785A49CB59
                                                                          APIs
                                                                          • LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                          • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                          • OemToCharA.USER32(?,?), ref: 0042376C
                                                                          • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Char$FileIconLoadLowerModuleName
                                                                          • String ID: 2$MAINICON
                                                                          • API String ID: 3935243913-3181700818
                                                                          • Opcode ID: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                                          • Instruction ID: fd9f9c5161a85cdd37c149357dc6ae372d2e201a3957992c444bec056041847b
                                                                          • Opcode Fuzzy Hash: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                                          • Instruction Fuzzy Hash: 89319270A042549ADF14EF2998857C67BE8AF14308F4441BAE844DB393D7BED988CB99
                                                                          APIs
                                                                          • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F4D
                                                                          • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F6E
                                                                          • GetCurrentThreadId.KERNEL32 ref: 00418F89
                                                                          • GlobalAddAtomA.KERNEL32(00000000), ref: 00418FAA
                                                                            • Part of subcall function 004230D8: 73A1A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                            • Part of subcall function 004230D8: EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                            • Part of subcall function 004230D8: 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                            • Part of subcall function 004230D8: 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                            • Part of subcall function 0042369C: LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                            • Part of subcall function 0042369C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                            • Part of subcall function 0042369C: OemToCharA.USER32(?,?), ref: 0042376C
                                                                            • Part of subcall function 0042369C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                            • Part of subcall function 0041F128: GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                            • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                            • Part of subcall function 0041F128: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                            • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                            • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                            • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                            • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                            • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                            • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                            • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                            • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                            • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                            • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                            • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A24620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                                          • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                          • API String ID: 3864787166-2767913252
                                                                          • Opcode ID: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                                          • Instruction ID: 147b0fd3ac44816fa50e213e98ef70cab9cb63b371fef283777c7ccc396f8742
                                                                          • Opcode Fuzzy Hash: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                                          • Instruction Fuzzy Hash: BB112EB06142409AC740FF76A94265A7BE1DB64318F40843FF448EB2D1DB7D99448B5F
                                                                          APIs
                                                                          • SetWindowLongA.USER32(?,000000FC,?), ref: 00413674
                                                                          • GetWindowLongA.USER32(?,000000F0), ref: 0041367F
                                                                          • GetWindowLongA.USER32(?,000000F4), ref: 00413691
                                                                          • SetWindowLongA.USER32(?,000000F4,?), ref: 004136A4
                                                                          • SetPropA.USER32(?,00000000,00000000), ref: 004136BB
                                                                          • SetPropA.USER32(?,00000000,00000000), ref: 004136D2
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: LongWindow$Prop
                                                                          • String ID:
                                                                          • API String ID: 3887896539-0
                                                                          • Opcode ID: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                                          • Instruction ID: 955d73ee8c9e489f8eb805393a0cdbf9fe7b6d9765079e051d97cf620cdedb95
                                                                          • Opcode Fuzzy Hash: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                                          • Instruction Fuzzy Hash: D811C975500248BFDB00DF9DDC84EDA3BE8EB19364F144666B918DB2A1D738DD908BA8
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045585B,?,00000000,0045589B), ref: 004557A1
                                                                          Strings
                                                                          • WININIT.INI, xrefs: 004557D0
                                                                          • PendingFileRenameOperations, xrefs: 00455740
                                                                          • PendingFileRenameOperations2, xrefs: 00455770
                                                                          • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455724
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpen
                                                                          • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                          • API String ID: 47109696-2199428270
                                                                          • Opcode ID: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                                          • Instruction ID: 5ff55985f0d79b0cf99ef6a0ef0ae12f56fe6c83aec1de8438bfb9543cdeefde
                                                                          • Opcode Fuzzy Hash: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                                          • Instruction Fuzzy Hash: BB519670E006089FDB10FF61DC51AEEB7B9EF45305F50857BE804A7292DB7CAA49CA58
                                                                          APIs
                                                                          • EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                          • GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                          • GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                          • SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$EnumLongWindows
                                                                          • String ID: lAB
                                                                          • API String ID: 4191631535-3476862382
                                                                          • Opcode ID: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                                          • Instruction ID: 20c146af1fa2ebf8fe73d6cd857ce812a249192cdefe4c29475ac4fba41381ea
                                                                          • Opcode Fuzzy Hash: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                                          • Instruction Fuzzy Hash: 4E115E70700610ABDB109F28DD85F6A77E8EB04725F50026AF9A49B2E7C378ED40CB59
                                                                          APIs
                                                                          • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE60
                                                                          • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFFB,00000000,0042E013,?,?,?,?,00000006,?,00000000,0049722D), ref: 0042DE7B
                                                                          • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE81
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressDeleteHandleModuleProc
                                                                          • String ID: RegDeleteKeyExA$advapi32.dll
                                                                          • API String ID: 588496660-1846899949
                                                                          • Opcode ID: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                                          • Instruction ID: 51feda2b41882886fdb541a0ee71ee95ad591444612597d61ea777cd3c773b46
                                                                          • Opcode Fuzzy Hash: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                                          • Instruction Fuzzy Hash: 3EE06DB1B41B30AAD72032A57C8AB932629DB75326F658537F005AE1D183FC2C50CE9D
                                                                          Strings
                                                                          • NextButtonClick, xrefs: 0046BF84
                                                                          • Need to restart Windows? %s, xrefs: 0046C172
                                                                          • PrepareToInstall failed: %s, xrefs: 0046C14B
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                          • API String ID: 0-2329492092
                                                                          • Opcode ID: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                                          • Instruction ID: 1202268df95ceb0eead913a0caf14b6b564ec17a2e6689a58d7256d675820d07
                                                                          • Opcode Fuzzy Hash: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                                          • Instruction Fuzzy Hash: 64C16D34A04208DFCB00DB98C9D5AEE77B5EF05304F1444B7E840AB362D778AE41DBAA
                                                                          APIs
                                                                          • SetActiveWindow.USER32(?,?,00000000,00482E54), ref: 00482C30
                                                                          • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00482CC5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ActiveChangeNotifyWindow
                                                                          • String ID: $Need to restart Windows? %s
                                                                          • API String ID: 1160245247-4200181552
                                                                          • Opcode ID: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                                          • Instruction ID: 8ca071c16d970d9f92bb59f1fa37784b4b8a51c549d6f2244aaf7164950ab745
                                                                          • Opcode Fuzzy Hash: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                                          • Instruction Fuzzy Hash: 2191B4346042458FDB10EB69D9C5BAD77F4AF59308F0084BBE8009B3A2CBB8AD05CB5D
                                                                          APIs
                                                                            • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                          • GetLastError.KERNEL32(00000000,0046FF81,?,?,0049C1D0,00000000), ref: 0046FE5E
                                                                          • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FED8
                                                                          • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FEFD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                          • String ID: Creating directory: %s
                                                                          • API String ID: 2451617938-483064649
                                                                          • Opcode ID: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                                          • Instruction ID: bdf8a9d00633064e3922ce557b3b2562df44373322d6b4000fae74d311730630
                                                                          • Opcode Fuzzy Hash: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                                          • Instruction Fuzzy Hash: AE513F74A00248ABDB04DFA5D582BDEB7F5AF09304F50817BE850B7382D7786E08CB69
                                                                          APIs
                                                                          • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E6E
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F34), ref: 00454ED8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressByteCharMultiProcWide
                                                                          • String ID: SfcIsFileProtected$sfc.dll
                                                                          • API String ID: 2508298434-591603554
                                                                          • Opcode ID: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                                          • Instruction ID: 1a17c74f1ac94ad93f17d87dc1e08c5ddb540f3824a5df31749c88666692504e
                                                                          • Opcode Fuzzy Hash: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                                          • Instruction Fuzzy Hash: 6A41A630A042189BEB10DB69DC85B9D77B8AB4430DF5081B7E908A7293D7785F88CF59
                                                                          APIs
                                                                          • 73A1A570.USER32(00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B411
                                                                          • SelectObject.GDI32(?,00000000), ref: 0044B434
                                                                          • 73A1A480.USER32(00000000,?,0044B474,00000000,0044B46D,?,00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B467
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A480A570ObjectSelect
                                                                          • String ID: k H
                                                                          • API String ID: 1230475511-1447039187
                                                                          • Opcode ID: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                                          • Instruction ID: b5872ed9d16ca79c431bae9e7544c15e8f802733be01f045b529408bc148fe47
                                                                          • Opcode Fuzzy Hash: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                                          • Instruction Fuzzy Hash: 6D217470A04248AFEB15DFA5C851B9EBBB9EB49304F51807AF504E7282D77CD940CB69
                                                                          APIs
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B15C,?,k H,?,?), ref: 0044B12E
                                                                          • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B141
                                                                          • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B175
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: DrawText$ByteCharMultiWide
                                                                          • String ID: k H
                                                                          • API String ID: 65125430-1447039187
                                                                          • Opcode ID: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                                          • Instruction ID: 2dd5a1fcad8022b5ecdd36c3e8438632fadfe976456551c737a9f8dd3ea145e1
                                                                          • Opcode Fuzzy Hash: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                                          • Instruction Fuzzy Hash: A3110BB6700604BFE700DB5A9C91D6F77ECD749750F10413BF504D72D0C6389E018668
                                                                          APIs
                                                                          • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                            • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                            • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                            • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                          • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                          • String ID: SHAutoComplete$shlwapi.dll
                                                                          • API String ID: 395431579-1506664499
                                                                          • Opcode ID: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                                          • Instruction ID: a33720f3aac7210c00664dabe11b621525643aa7ae94b1405928deeb439ddd4e
                                                                          • Opcode Fuzzy Hash: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                                          • Instruction Fuzzy Hash: 1611A331B00318BBDB11EB62ED81B8E7BA8DB55704F90407BF400A6691DBB8AE05C65D
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegCloseKey.ADVAPI32(?,00455A67,?,00000001,00000000), ref: 00455A5A
                                                                          Strings
                                                                          • PendingFileRenameOperations2, xrefs: 00455A3B
                                                                          • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A08
                                                                          • PendingFileRenameOperations, xrefs: 00455A2C
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpen
                                                                          • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                          • API String ID: 47109696-2115312317
                                                                          • Opcode ID: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                                          • Instruction ID: a84b10804161a04e9b7828e63518c67389a2277fb2d5ef6d9c2d81c30e1ce2e0
                                                                          • Opcode Fuzzy Hash: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                                          • Instruction Fuzzy Hash: 49F09671714A04BFEB05D665DC72E3A739CD744B15FA1446BF800C6682DA7DBE04951C
                                                                          APIs
                                                                          • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?,00000000), ref: 0047F8AA
                                                                          • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?), ref: 0047F8B7
                                                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D), ref: 0047F9AC
                                                                          • FindClose.KERNEL32(000000FF,0047F9D7,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?), ref: 0047F9CA
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Find$CloseFileNext
                                                                          • String ID:
                                                                          • API String ID: 2066263336-0
                                                                          • Opcode ID: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                                          • Instruction ID: d4c1b09f85a1e3ce5f066f5119f691750f955bf6e0a6470712ab8dbd39f482a6
                                                                          • Opcode Fuzzy Hash: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                                          • Instruction Fuzzy Hash: 80513E71A00648AFCB10EF65CC45ADEB7B8AB88315F1085BAA818E7351D7389F49CF59
                                                                          APIs
                                                                          • GetMenu.USER32(00000000), ref: 00421371
                                                                          • SetMenu.USER32(00000000,00000000), ref: 0042138E
                                                                          • SetMenu.USER32(00000000,00000000), ref: 004213C3
                                                                          • SetMenu.USER32(00000000,00000000), ref: 004213DF
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Menu
                                                                          • String ID:
                                                                          • API String ID: 3711407533-0
                                                                          • Opcode ID: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                                          • Instruction ID: 7918b5ac66a49b7c70f092078a7f06842b1ce09055eaa5e04548cec6233339c2
                                                                          • Opcode Fuzzy Hash: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                                          • Instruction Fuzzy Hash: 7D41A13070025447EB20EA79A9857AB26969F69318F4805BFFC44DF3A3CA7DDC45839D
                                                                          APIs
                                                                          • SendMessageA.USER32(?,?,?,?), ref: 00416B94
                                                                          • SetTextColor.GDI32(?,00000000), ref: 00416BAE
                                                                          • SetBkColor.GDI32(?,00000000), ref: 00416BC8
                                                                          • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BF0
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Color$CallMessageProcSendTextWindow
                                                                          • String ID:
                                                                          • API String ID: 601730667-0
                                                                          • Opcode ID: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                                          • Instruction ID: 7a78515b3e46194db8101330e18da160614de8b80347fcfd5663145ee8fb6c7e
                                                                          • Opcode Fuzzy Hash: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                                          • Instruction Fuzzy Hash: 27115EB6600A04AFC710EE6ECC84E8773ECDF48314715883EB59ADB612D638F8418B69
                                                                          APIs
                                                                          • 73A1A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                          • EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                          • 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                          • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A24620A480A570EnumFonts
                                                                          • String ID:
                                                                          • API String ID: 2630238358-0
                                                                          • Opcode ID: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                                          • Instruction ID: 16e9332b6476af0d686f12fa818e5571f82757a24bc5219822a197079b30e1ec
                                                                          • Opcode Fuzzy Hash: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                                          • Instruction Fuzzy Hash: D80192717447106AE710BF7A5C86B9B36649F04719F40427BF804AF2C7D6BE9C05476E
                                                                          APIs
                                                                            • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                          • FlushFileBuffers.KERNEL32(?), ref: 0045C7FD
                                                                          Strings
                                                                          • EndOffset range exceeded, xrefs: 0045C731
                                                                          • NumRecs range exceeded, xrefs: 0045C6FA
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: File$BuffersFlush
                                                                          • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                          • API String ID: 3593489403-659731555
                                                                          • Opcode ID: 794c48d8177613dd3f63bd91f05815d926f9d199b7ec90082a892dce85f7227f
                                                                          • Instruction ID: 42c6ccb15965a4bc01c0ab80d29458e35b3cecf9486565f2d0e9c4cbdba5a9bf
                                                                          • Opcode Fuzzy Hash: 794c48d8177613dd3f63bd91f05815d926f9d199b7ec90082a892dce85f7227f
                                                                          • Instruction Fuzzy Hash: A5617134A002988FDB24DF25C891AD9B7B5EF49305F0084DAED89AB352D774AEC9CF54
                                                                          APIs
                                                                            • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498586), ref: 0040334B
                                                                            • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498586), ref: 00403356
                                                                            • Part of subcall function 00406334: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                                            • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                            • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                            • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                            • Part of subcall function 00406334: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                                            • Part of subcall function 00409B88: 6F551CD0.COMCTL32(0049859A), ref: 00409B88
                                                                            • Part of subcall function 00410964: GetCurrentThreadId.KERNEL32 ref: 004109B2
                                                                            • Part of subcall function 00419050: GetVersion.KERNEL32(004985AE), ref: 00419050
                                                                            • Part of subcall function 0044F754: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                                            • Part of subcall function 0044F754: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                                            • Part of subcall function 0044FBFC: GetVersionExA.KERNEL32(0049B790,004985C7), ref: 0044FC0B
                                                                            • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                                            • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                                            • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                                            • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                                            • Part of subcall function 00456EEC: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                                            • Part of subcall function 00464960: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                                            • Part of subcall function 00464960: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                                            • Part of subcall function 0046D098: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                                            • Part of subcall function 00478B3C: GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                                            • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                                            • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                                            • Part of subcall function 00495584: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 0049559D
                                                                          • SetErrorMode.KERNEL32(00000001,00000000,0049863C), ref: 0049860E
                                                                            • Part of subcall function 00498338: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                                            • Part of subcall function 00498338: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                                            • Part of subcall function 004244E4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424503
                                                                            • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                          • ShowWindow.USER32(?,00000005,00000000,0049863C), ref: 0049866F
                                                                            • Part of subcall function 00482050: SetActiveWindow.USER32(?), ref: 004820FE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF551FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                          • String ID: Setup
                                                                          • API String ID: 3870281231-3839654196
                                                                          • Opcode ID: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                                          • Instruction ID: d131c851e578025af209eb9e9c2d0e6aaf1cfb04eb4cc82699b843ce611002a7
                                                                          • Opcode Fuzzy Hash: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                                          • Instruction Fuzzy Hash: 5C31D4702046409ED601BBBBED5352E3B98EB8A718B61487FF804D6553CE3D6C148A3E
                                                                          APIs
                                                                          • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A56
                                                                          • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A5F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateDirectoryErrorLast
                                                                          • String ID: .tmp
                                                                          • API String ID: 1375471231-2986845003
                                                                          • Opcode ID: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                                          • Instruction ID: fcbeb811eea92760dd82faa40bdacdd366465f8a5342b7af386d3ee3900427bd
                                                                          • Opcode Fuzzy Hash: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                                          • Instruction Fuzzy Hash: 5A213375A00208ABDB01EFA1C8429DEB7B9EB48305F50457BE801B7342DA789F058AA5
                                                                          APIs
                                                                          • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C596,00000000,0047C5AC,?,?,?,?,00000000), ref: 0047C372
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Close
                                                                          • String ID: RegisteredOrganization$RegisteredOwner
                                                                          • API String ID: 3535843008-1113070880
                                                                          • Opcode ID: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                                          • Instruction ID: cd6b81515cbcb541a42d20c803a6709c30f964b406f28b15d8fe69fce277d2ff
                                                                          • Opcode Fuzzy Hash: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                                          • Instruction Fuzzy Hash: 41F09030704204ABEB00D669ECD2BAA33A99746304F60C03FA9088B392D6799E01CB5C
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754E1
                                                                          • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754F8
                                                                            • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseCreateErrorFileHandleLast
                                                                          • String ID: CreateFile
                                                                          • API String ID: 2528220319-823142352
                                                                          • Opcode ID: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                                          • Instruction ID: 40e201e46ebb19b1d9bf90fbf766f72b309683208074062896c4944ddf319cda
                                                                          • Opcode Fuzzy Hash: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                                          • Instruction Fuzzy Hash: CDE065702403447FDA10F769CCC6F4577889B14729F10C155B5446F3D2C5B9EC408628
                                                                          APIs
                                                                          • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Open
                                                                          • String ID: System\CurrentControlSet\Control\Windows$c6H
                                                                          • API String ID: 71445658-1548894351
                                                                          • Opcode ID: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                                          • Instruction ID: b14c86e398362f8621ba381b59967aff518ca924b2daa5b46ce173f8349262a2
                                                                          • Opcode Fuzzy Hash: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                                          • Instruction Fuzzy Hash: BFD0C772950128BBDB00DA89DC41DFB775DDB15760F45441BFD049B141C1B4EC5197F8
                                                                          APIs
                                                                            • Part of subcall function 00456E7C: CoInitialize.OLE32(00000000), ref: 00456E82
                                                                            • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                            • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                          • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                          • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                          • API String ID: 2906209438-2320870614
                                                                          • Opcode ID: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                                          • Instruction ID: 6d1f0b9ea2f83cf17b9d56af39d37ffc4890966232cc80b75afa5f9be50b51f8
                                                                          • Opcode Fuzzy Hash: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                                          • Instruction Fuzzy Hash: 97C04CA1B4169096CB00B7FAA54361F2414DB5075FB96C07FBD40BB687CE7D8848AA2E
                                                                          APIs
                                                                            • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                            • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                          • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressErrorLibraryLoadModeProc
                                                                          • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                          • API String ID: 2492108670-2683653824
                                                                          • Opcode ID: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                                          • Instruction ID: 608de25eae135e4754017d8cf95b07e3007941af04aa8fd5541e4ba3120ba520
                                                                          • Opcode Fuzzy Hash: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                                          • Instruction Fuzzy Hash: 69B092E0F056008ACF00A7F6984260A10059B8071DF90807B7440BB395EA3E840AAB6F
                                                                          APIs
                                                                          • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448719), ref: 0044865C
                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486DD
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID:
                                                                          • API String ID: 2574300362-0
                                                                          • Opcode ID: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                                          • Instruction ID: bcb50df029510264ac3c8269deb9aca16d778d72fab4f9fb4f479d94b6d7f3fe
                                                                          • Opcode Fuzzy Hash: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                                          • Instruction Fuzzy Hash: 09514170A00105AFDB40EFA5C491A9EBBF9EB54315F11817EA414BB392DA389E05CB99
                                                                          APIs
                                                                          • GetSystemMenu.USER32(00000000,00000000,00000000,0048183C), ref: 004817D4
                                                                          • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004817E5
                                                                          • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004817FD
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Menu$Append$System
                                                                          • String ID:
                                                                          • API String ID: 1489644407-0
                                                                          • Opcode ID: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                                          • Instruction ID: b36482c1273671328963914ac1a7ecaae55131090c894365c145815d0470a156
                                                                          • Opcode Fuzzy Hash: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                                          • Instruction Fuzzy Hash: 02318E307043445AD721FB359D82BAE3A989B15318F54593FB900AA3E3CA7C9C4A87AD
                                                                          APIs
                                                                          • 74D41520.VERSION(00000000,?,?,?,004972D0), ref: 0045251C
                                                                          • 74D41500.VERSION(00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452549
                                                                          • 74D41540.VERSION(?,004525C0,?,?,00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452563
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: D41500D41520D41540
                                                                          • String ID:
                                                                          • API String ID: 2153611984-0
                                                                          • Opcode ID: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                                          • Instruction ID: b47a7e64509d5cca070909842564d4f4e78a1d1ae8fea26b0cdd83eea50adb12
                                                                          • Opcode Fuzzy Hash: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                                          • Instruction Fuzzy Hash: 6B218371A00148AFDB01DAA989519AFB7FCEB4A300F55447BFC00E3342E6B99E04CB65
                                                                          APIs
                                                                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424422
                                                                          • TranslateMessage.USER32(?), ref: 0042449F
                                                                          • DispatchMessageA.USER32(?), ref: 004244A9
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Message$DispatchPeekTranslate
                                                                          • String ID:
                                                                          • API String ID: 4217535847-0
                                                                          • Opcode ID: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                                          • Instruction ID: 520fb342982be2dd3794930026bb259c1cd38a4fe19eb968f01b3c53081bdda3
                                                                          • Opcode Fuzzy Hash: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                                          • Instruction Fuzzy Hash: 781191307043205AEE20FA64AD41B9B73D4DFD1708F80481EF9D997382D77D9E49879A
                                                                          APIs
                                                                          • SetPropA.USER32(00000000,00000000), ref: 0041667A
                                                                          • SetPropA.USER32(00000000,00000000), ref: 0041668F
                                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166B6
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Prop$Window
                                                                          • String ID:
                                                                          • API String ID: 3363284559-0
                                                                          • Opcode ID: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                                          • Instruction ID: 2262f6f032fbfc8c948eb6af5e1566575da4c35a9ecfa624f63ddadf83d7b404
                                                                          • Opcode Fuzzy Hash: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                                          • Instruction Fuzzy Hash: E3F0B271701210ABD710AB599C85FA632DCAB09719F160176BD09EF286C778DC40C7A8
                                                                          APIs
                                                                          • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Virtual$AllocFree
                                                                          • String ID: )a
                                                                          • API String ID: 2087232378-2596428473
                                                                          • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                          • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                                          • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                          • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                                          APIs
                                                                          • IsWindowVisible.USER32(?), ref: 0041EE74
                                                                          • IsWindowEnabled.USER32(?), ref: 0041EE7E
                                                                          • EnableWindow.USER32(?,00000000), ref: 0041EEA4
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$EnableEnabledVisible
                                                                          • String ID:
                                                                          • API String ID: 3234591441-0
                                                                          • Opcode ID: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                                          • Instruction ID: eab114e884733e02e348d5fb54c1eeaedaab2d2a8f53f62e6f3f1b5b82b3488b
                                                                          • Opcode Fuzzy Hash: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                                          • Instruction Fuzzy Hash: 90E0EDB9100300AAE711AB2BEC81A57769CBB94314F45843BAC099B293DA3EDC409B78
                                                                          APIs
                                                                          • SetActiveWindow.USER32(?), ref: 0046A378
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ActiveWindow
                                                                          • String ID: PrepareToInstall
                                                                          • API String ID: 2558294473-1101760603
                                                                          • Opcode ID: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                                          • Instruction ID: 163d609461ff3b9580316b21a780dec1cd9204125e937a74b025edb926540d27
                                                                          • Opcode Fuzzy Hash: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                                          • Instruction Fuzzy Hash: 90A10A34A00109DFCB00EB99D985EEEB7F5AF88304F1580B6E404AB362D738AE45DF59
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: /:*?"<>|
                                                                          • API String ID: 0-4078764451
                                                                          • Opcode ID: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                                          • Instruction ID: b706238f5af82f8a54f925a22e06db4ee79b372672e861a4edd763b161806009
                                                                          • Opcode Fuzzy Hash: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                                          • Instruction Fuzzy Hash: 6F7197B0B44244AADB20E766DCC2BEE77A19F41704F108167F5807B392E7B99D45878E
                                                                          APIs
                                                                          • SetActiveWindow.USER32(?), ref: 004820FE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ActiveWindow
                                                                          • String ID: InitializeWizard
                                                                          • API String ID: 2558294473-2356795471
                                                                          • Opcode ID: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                                          • Instruction ID: b8891c381381d1a0014b65a4ce29d1dfbbdf9d421e77ac889de6892087eb3363
                                                                          • Opcode Fuzzy Hash: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                                          • Instruction Fuzzy Hash: BE118234205204DFD711EBA5FE96B2977E4EB55314F20143BE5008B3A1DA796C50CB6D
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C472,00000000,0047C5AC), ref: 0047C271
                                                                          Strings
                                                                          • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C241
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpen
                                                                          • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                          • API String ID: 47109696-1019749484
                                                                          • Opcode ID: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                                          • Instruction ID: 70811ca8e083c9a3dbfae153db117623eb743e792d78c4ccda021ebaf15ccddc
                                                                          • Opcode Fuzzy Hash: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                                          • Instruction Fuzzy Hash: 8EF08931B0411467DA00A5DA5C82B9E56DD8B55758F20407FF508EB253D9B99D02036C
                                                                          APIs
                                                                          • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                                          Strings
                                                                          • Inno Setup: Setup Version, xrefs: 0046F10D
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Value
                                                                          • String ID: Inno Setup: Setup Version
                                                                          • API String ID: 3702945584-4166306022
                                                                          • Opcode ID: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                                          • Instruction ID: 253732d940e31991125f8b939195b5ca02eb4333684dc2ddbbcc15e62aa31341
                                                                          • Opcode Fuzzy Hash: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                                          • Instruction Fuzzy Hash: 3BE06D713012047FD710AA6B9C85F5BBADDDF993A5F10403AB908DB392D578DD4081A8
                                                                          APIs
                                                                          • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Value
                                                                          • String ID: NoModify
                                                                          • API String ID: 3702945584-1699962838
                                                                          • Opcode ID: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                                          • Instruction ID: dfbc78ba79a393f528aadc4bccb3a1e1d52346a2df28baf9fde3d1272b39f611
                                                                          • Opcode Fuzzy Hash: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                                          • Instruction Fuzzy Hash: D8E04FB4604304BFEB04DB55DD4AF6B77ECDB48750F10415ABA04DB281E674EE00C668
                                                                          APIs
                                                                          • GetACP.KERNEL32(?,?,00000001,00000000,0047E25F,?,-0000001A,004800D8,-00000010,?,00000004,0000001B,00000000,00480425,?,0045DECC), ref: 0047DFF6
                                                                            • Part of subcall function 0042E32C: 73A1A570.USER32(00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0042E33B
                                                                            • Part of subcall function 0042E32C: EnumFontsA.GDI32(?,00000000,0042E318,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E366
                                                                            • Part of subcall function 0042E32C: 73A1A480.USER32(00000000,?,0042E38B,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E37E
                                                                          • SendNotifyMessageA.USER32(0002042C,00000496,00002711,-00000001), ref: 0047E1C6
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A480A570EnumFontsMessageNotifySend
                                                                          • String ID:
                                                                          • API String ID: 2685184028-0
                                                                          • Opcode ID: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                                          • Instruction ID: 0ea8e5e95b90053dcc80dc26f94e29a170662e2b3e10ca2db4d961c35622b213
                                                                          • Opcode Fuzzy Hash: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                                          • Instruction Fuzzy Hash: 2651A6746001508BD710FF27D9C16963799EB88308B90C6BBA8089F367C77CDD068B9D
                                                                          APIs
                                                                          • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DC4C
                                                                          • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DCBC
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue
                                                                          • String ID:
                                                                          • API String ID: 3660427363-0
                                                                          • Opcode ID: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                                          • Instruction ID: 0afc69acb925fd444515a6cbe8b6240f093bd173affdd4b5aabebdcedbe93bcc
                                                                          • Opcode Fuzzy Hash: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                                          • Instruction Fuzzy Hash: E0414F71E00529ABDB11DF95D881BAFB7B8AB00714F90846AE800F7241D778AE00CBA9
                                                                          APIs
                                                                          • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DF7C
                                                                          • RegCloseKey.ADVAPI32(?,0042DFED,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DFE0
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseEnum
                                                                          • String ID:
                                                                          • API String ID: 2818636725-0
                                                                          • Opcode ID: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                                          • Instruction ID: 2fe76ac110d60e281b9c8dcd8425dafac1d5c60e45ccd2ae84570cbaedcb928d
                                                                          • Opcode Fuzzy Hash: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                                          • Instruction Fuzzy Hash: 52319170F04258AEDB11DFA2DD82BAEB7B9EB48304F91407BE501E7281D6785A01CA2D
                                                                          APIs
                                                                          • CreateProcessA.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452828
                                                                          • GetLastError.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452830
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateErrorLastProcess
                                                                          • String ID:
                                                                          • API String ID: 2919029540-0
                                                                          • Opcode ID: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                                          • Instruction ID: 3ad6dec6d32dc5e6ab031f6e5884ad9a987dc2d9ff381773f4694f698bcb58b9
                                                                          • Opcode Fuzzy Hash: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                                          • Instruction Fuzzy Hash: D3117972600208AF8B00DEADDD41DABB7ECEB4E310B10456BFD08E3201D678AE148BA4
                                                                          APIs
                                                                          • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AFF2
                                                                          • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B14F,00000000,0040B167,?,?,?,00000000), ref: 0040B003
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Resource$FindFree
                                                                          • String ID:
                                                                          • API String ID: 4097029671-0
                                                                          • Opcode ID: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                                          • Instruction ID: 22447e907da962d806d3eb032de74b702d5affa043e15eb070a4a3d902aeafed
                                                                          • Opcode Fuzzy Hash: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                                          • Instruction Fuzzy Hash: 0001DF71300604AFD710FF69DC92E1B77A9DB8A718711807AF500AB7D0DA79AC0096AD
                                                                          APIs
                                                                          • GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                          • 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A25940CurrentThread
                                                                          • String ID:
                                                                          • API String ID: 2655091166-0
                                                                          • Opcode ID: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                                          • Instruction ID: 3b2ca51acea6f31c20bceb620234c512699c69eae89bb1383ecfa3b3ac64bed2
                                                                          • Opcode Fuzzy Hash: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                                          • Instruction Fuzzy Hash: FD013976A04604BFDB06CF6BDC1195ABBE9E789720B22887BEC04D36A0E6355810DE18
                                                                          APIs
                                                                          • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CAE
                                                                          • GetLastError.KERNEL32(00000000,00000000,00000000,00452CD4), ref: 00452CB6
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorFileLastMove
                                                                          • String ID:
                                                                          • API String ID: 55378915-0
                                                                          • Opcode ID: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                                          • Instruction ID: 8cb4f6990e07c72a34a39c3d349ee9eec810a974928c7dd1f8c60ebce1e721cc
                                                                          • Opcode Fuzzy Hash: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                                          • Instruction Fuzzy Hash: D5014971B00204BB8B11DF799D414AEB7ECEB4A32531045BBFC08E3243EAB84E048558
                                                                          APIs
                                                                          • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,00401973), ref: 00401766
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FreeVirtual
                                                                          • String ID: )a
                                                                          • API String ID: 1263568516-2596428473
                                                                          • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                          • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                                          • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                          • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                          APIs
                                                                          • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527BB), ref: 00452795
                                                                          • GetLastError.KERNEL32(00000000,00000000,00000000,004527BB), ref: 0045279D
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateDirectoryErrorLast
                                                                          • String ID:
                                                                          • API String ID: 1375471231-0
                                                                          • Opcode ID: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                                          • Instruction ID: 7517b5081c7c6af98826394809c6fe2d976c468da5ddf52a6f68070703836f12
                                                                          • Opcode Fuzzy Hash: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                                          • Instruction Fuzzy Hash: 40F0FC71A04704AFCF00DF759D4199EB7E8DB0E715B5049B7FC14E3242E7B94E1485A8
                                                                          APIs
                                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 00423259
                                                                          • LoadCursorA.USER32(00000000,00000000), ref: 00423283
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CursorLoad
                                                                          • String ID:
                                                                          • API String ID: 3238433803-0
                                                                          • Opcode ID: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                                          • Instruction ID: c8375b04fab070422f53c3d6524130e38f027298e82d6ab835706982cf041ecc
                                                                          • Opcode Fuzzy Hash: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                                          • Instruction Fuzzy Hash: 0FF0A711704114AADA105D7E6CC0E2B7268DB91B36B6103BBFA3AD72D1C62E1D41457D
                                                                          APIs
                                                                          • SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                          • LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLibraryLoadMode
                                                                          • String ID:
                                                                          • API String ID: 2987862817-0
                                                                          • Opcode ID: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                                          • Instruction ID: 98bcbcc3e9aaf4c66058534b39987ccdd7eb12bd14468eaf88ad72af9e5505e3
                                                                          • Opcode Fuzzy Hash: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                                          • Instruction Fuzzy Hash: D5F05E70A14744BEDF119F779C6282ABAACE749B1179248B6F810A3691E67D48108928
                                                                          APIs
                                                                          • GetClassInfoA.USER32(00400000,?,?), ref: 004162F1
                                                                          • GetClassInfoA.USER32(00000000,?,?), ref: 00416301
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ClassInfo
                                                                          • String ID:
                                                                          • API String ID: 3534257612-0
                                                                          • Opcode ID: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                                          • Instruction ID: dc9e2acc6f173dd0cc3aa24d84b637cb0067f0ccc6b7cec6a0fcec59befe77f5
                                                                          • Opcode Fuzzy Hash: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                                          • Instruction Fuzzy Hash: 22E012B26015155ADB10DB999D81EE326DCDB09310B110167BE14CA246D764DD005BA4
                                                                          APIs
                                                                          • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,004703F1,0000001D,00000000), ref: 004508FA
                                                                          • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,004703F1,0000001D,00000000), ref: 00450902
                                                                            • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$FilePointer
                                                                          • String ID:
                                                                          • API String ID: 1156039329-0
                                                                          • Opcode ID: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                                          • Instruction ID: a22a311b57bf1dff13f45894218d9c0eaf9de3d8271a2984ee0ce7717fd7efee
                                                                          • Opcode Fuzzy Hash: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                                          • Instruction Fuzzy Hash: E0E012B53042059BFB00FA6599C1F3B63DCDB44315F00447AB984CF187D674CC155B29
                                                                          APIs
                                                                          • GetSystemDefaultLCID.KERNEL32(00000000,0040871A), ref: 00408603
                                                                            • Part of subcall function 00406DF4: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E11
                                                                            • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: DefaultInfoLoadLocaleStringSystem
                                                                          • String ID:
                                                                          • API String ID: 1658689577-0
                                                                          • Opcode ID: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                                          • Instruction ID: ea6634d2ed8774f5e90a5a6f355d63bed973dafba18e0ec7d48b30ffe24ea089
                                                                          • Opcode Fuzzy Hash: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                                          • Instruction Fuzzy Hash: C4314375E001199BCF01DF95C8819EEB7B9FF84314F15857BE815AB286E738AE018B98
                                                                          APIs
                                                                          • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC49
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: InfoScroll
                                                                          • String ID:
                                                                          • API String ID: 629608716-0
                                                                          • Opcode ID: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                                          • Instruction ID: 2c7078d87c5cd90d2d28a279248f0ceb63a34b6d02ec849610dd04de18f9c6e3
                                                                          • Opcode Fuzzy Hash: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                                          • Instruction Fuzzy Hash: AA213EB1608745AFD350DF39D4407AABBE4BB48314F04893EA498C3741E778E99ACBD6
                                                                          APIs
                                                                            • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                            • Part of subcall function 0041EEB4: 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                          • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C756,?,00000000,?,?,0046C968,?,00000000,0046C9DC), ref: 0046C73A
                                                                            • Part of subcall function 0041EF68: IsWindow.USER32(?), ref: 0041EF76
                                                                            • Part of subcall function 0041EF68: EnableWindow.USER32(?,00000001), ref: 0041EF85
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$A25940CurrentEnablePathPrepareThreadWrite
                                                                          • String ID:
                                                                          • API String ID: 390483697-0
                                                                          • Opcode ID: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                                          • Instruction ID: 552ca42e7a4f22222615ff1de8f8c20df724e6475abae56b3c63f202feb1ec23
                                                                          • Opcode Fuzzy Hash: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                                          • Instruction Fuzzy Hash: 28F0E270248300FFEB059BB2EDD6B2577E8E319716F91043BF504866D0EA795D40C96E
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite
                                                                          • String ID:
                                                                          • API String ID: 3934441357-0
                                                                          • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                          • Instruction ID: d0e136ad155d69288fc423feb27b218c22c44688115b59a91c3ffefc647f2292
                                                                          • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                          • Instruction Fuzzy Hash: F0F0FF70509209DBBB1CCF54D0919AF7B71EB59310F20806FE907877A0D6346A80D759
                                                                          APIs
                                                                          • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416595
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateWindow
                                                                          • String ID:
                                                                          • API String ID: 716092398-0
                                                                          • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                          • Instruction ID: 39ad6e161323637dbb8254467e02d50acedd081d31d6b9d15e1adfc5f54150e8
                                                                          • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                          • Instruction Fuzzy Hash: 6EF02BB2200510AFDB84CF9CD9C0F9373ECEB0C210B0481A6FA08CF24AD220EC108BB0
                                                                          APIs
                                                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149FF
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CallbackDispatcherUser
                                                                          • String ID:
                                                                          • API String ID: 2492992576-0
                                                                          • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                          • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                          • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                          • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004507F0
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID:
                                                                          • API String ID: 823142352-0
                                                                          • Opcode ID: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                                          • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                                          • Opcode Fuzzy Hash: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                                          • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                                          APIs
                                                                          • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD24,?,00000001,?,?,00000000,?,0042CD76,00000000,00452A11,00000000,00452A32,?,00000000), ref: 0042CD07
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AttributesFile
                                                                          • String ID:
                                                                          • API String ID: 3188754299-0
                                                                          • Opcode ID: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                                          • Instruction ID: bebe06870d533199fa05ec681e6f815a7bc371a3e359dcca221b2f893a48d47d
                                                                          • Opcode Fuzzy Hash: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                                          • Instruction Fuzzy Hash: 0AE06571304308BFD701EB62EC92A5EBBECD749714B914476B400D7592D5B86E008458
                                                                          APIs
                                                                          • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FormatMessage
                                                                          • String ID:
                                                                          • API String ID: 1306739567-0
                                                                          • Opcode ID: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                                          • Instruction ID: 1e04b5e42f682bd3307758a00633d1e15c64123c11c882a5e2d093d9edca25ee
                                                                          • Opcode Fuzzy Hash: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                                          • Instruction Fuzzy Hash: E7E0D86178432126F23524166C43B7B110E43C0704FD080267A809F3D6D6EE9949425E
                                                                          APIs
                                                                          • CreateWindowExA.USER32(00000000,0042368C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00406329
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateWindow
                                                                          • String ID:
                                                                          • API String ID: 716092398-0
                                                                          • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                          • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                                          • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                          • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                                          APIs
                                                                          • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Create
                                                                          • String ID:
                                                                          • API String ID: 2289755597-0
                                                                          • Opcode ID: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                                          • Instruction ID: 00bf656f3cc58d957e3fc120c7d975a7f6f089e768df8f95d2ce2a55afbcf34e
                                                                          • Opcode Fuzzy Hash: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                                          • Instruction Fuzzy Hash: 69E07EB2600119AF9B40DE8CDC81EEB37ADAB1D350F414016FA08E7200C274EC519BB4
                                                                          APIs
                                                                          • FindClose.KERNEL32(00000000,000000FF,00470C14,00000000,00471A10,?,00000000,00471A59,?,00000000,00471B92,?,00000000,0000001D,00000000), ref: 00454BFA
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseFind
                                                                          • String ID:
                                                                          • API String ID: 1863332320-0
                                                                          • Opcode ID: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                                          • Instruction ID: 3c3cb6916585ff7422749358fc170cdffb6a73b651657da6609ae8be1e4b77d0
                                                                          • Opcode Fuzzy Hash: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                                          • Instruction Fuzzy Hash: A7E065B0A056004BCB15DF3A858021A76D25FC5325F05C96AAC58CF397D63C84955656
                                                                          APIs
                                                                          • KiUserCallbackDispatcher.NTDLL(004953B6,?,004953D8,?,?,00000000,004953B6,?,?), ref: 004146AB
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CallbackDispatcherUser
                                                                          • String ID:
                                                                          • API String ID: 2492992576-0
                                                                          • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                          • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                          • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                          • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                          APIs
                                                                          • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F2C
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite
                                                                          • String ID:
                                                                          • API String ID: 3934441357-0
                                                                          • Opcode ID: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                                          • Instruction ID: 1f586823f232578dbf745533d190da316c23ef772c10fc749b20f2ce5ea51255
                                                                          • Opcode Fuzzy Hash: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                                          • Instruction Fuzzy Hash: E0D05B723091117AD620955F6C44DA76BDCCBC5770F11063EB558D72C1D7309C01C675
                                                                          APIs
                                                                            • Part of subcall function 00423608: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042361D
                                                                          • ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                            • Part of subcall function 00423638: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423654
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: InfoParametersSystem$ShowWindow
                                                                          • String ID:
                                                                          • API String ID: 3202724764-0
                                                                          • Opcode ID: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                                          • Instruction ID: 40ba6511a88705317f68f90b714cf273492cbff5df7e869aa0dea3a735aecdb5
                                                                          • Opcode Fuzzy Hash: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                                          • Instruction Fuzzy Hash: 89D05E123831B03106307BB72805ACB86AC8D966AB389047BB5409B302E91E8A0A61AC
                                                                          APIs
                                                                          • SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: TextWindow
                                                                          • String ID:
                                                                          • API String ID: 530164218-0
                                                                          • Opcode ID: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                                          • Instruction ID: 772c2b490b6417829154bcce5d0a54014a2db275ddfc333997dbbca6f26d49c5
                                                                          • Opcode Fuzzy Hash: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                                          • Instruction Fuzzy Hash: 7ED05EE27011702BCB01BAED54C4AC667CC9B8825AB1940BBF904EF257C678CE4083A8
                                                                          APIs
                                                                          • GetFileAttributesA.KERNEL32(00000000,00000000,004515B7,00000000), ref: 0042CD3F
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AttributesFile
                                                                          • String ID:
                                                                          • API String ID: 3188754299-0
                                                                          • Opcode ID: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                                          • Instruction ID: 866207c2a99293721dc17515f5e31636ca325c5e587501d47fbe5ff4e718b97c
                                                                          • Opcode Fuzzy Hash: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                                          • Instruction Fuzzy Hash: 77C08CE03222001A9A20A6BD2CC950F06CC891437A3A41F77B439E72E2D23DD8162018
                                                                          APIs
                                                                          • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CallbackDispatcherUser
                                                                          • String ID:
                                                                          • API String ID: 2492992576-0
                                                                          • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                          • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                          • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                          • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A8D4,0040CE80,?,00000000,?), ref: 00406EE5
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID:
                                                                          • API String ID: 823142352-0
                                                                          • Opcode ID: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                                          • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                          • Opcode Fuzzy Hash: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                                          • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                          APIs
                                                                          • SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                            • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorFileLast
                                                                          • String ID:
                                                                          • API String ID: 734332943-0
                                                                          • Opcode ID: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                                          • Instruction ID: d892f33e09ba9bc7304af59ed1bd982b4427bde6cd355302a364b0e8927efaaf
                                                                          • Opcode Fuzzy Hash: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                                          • Instruction Fuzzy Hash: 2DC04CA9300101879F00BAAE95D190663D85E583057504066B944CF207D668D8144A18
                                                                          APIs
                                                                          • SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CurrentDirectory
                                                                          • String ID:
                                                                          • API String ID: 1611563598-0
                                                                          • Opcode ID: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                                          • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                                          • Opcode Fuzzy Hash: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                                          • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                                          APIs
                                                                          • SetErrorMode.KERNEL32(?,0042E41D), ref: 0042E410
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorMode
                                                                          • String ID:
                                                                          • API String ID: 2340568224-0
                                                                          • Opcode ID: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                          • Instruction ID: 55140b1eedf56d48a55774d01a07de49d55d18186a895614534630d02c3c9fff
                                                                          • Opcode Fuzzy Hash: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                          • Instruction Fuzzy Hash: D4B09B7671C6105DFB05D695745152D63D4D7C57203E14577F010D7580D53D58004D18
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                                          • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                                          • Opcode Fuzzy Hash: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                                          • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                                          • Instruction ID: 3a42617683b163d9d3e29dc322e321d1f787465d7b697eb1a78dfeb7447b1e7e
                                                                          • Opcode Fuzzy Hash: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                                          • Instruction Fuzzy Hash: CB518574E042099FEB01EFA9C892AAEBBF5EF49314F50417AE500E7351DB389D45CB98
                                                                          APIs
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0047DC20,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DBDA
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 626452242-0
                                                                          • Opcode ID: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                                          • Instruction ID: a4a2cf2857c8d8ea8b604d5a3bb359359cf50968c17c86877c7e7666634e0114
                                                                          • Opcode Fuzzy Hash: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                                          • Instruction Fuzzy Hash: 79519C30A04248AFDB20DF65D8C5BAABBB8EB18304F118077E804A73A1D778AD45CB59
                                                                          APIs
                                                                          • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                                          • Instruction ID: 6bd7adec2090487eae29abc1928bf57af59456791c97a49d6ef8c5917aacc84c
                                                                          • Opcode Fuzzy Hash: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                                          • Instruction Fuzzy Hash: 0E1148742007069BC710DF19D880B86FBE5EB98390B10C53BE9588B385D374E8558BA9
                                                                          APIs
                                                                          • GetLastError.KERNEL32(00000000,00453019), ref: 00452FFB
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID:
                                                                          • API String ID: 1452528299-0
                                                                          • Opcode ID: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                                          • Instruction ID: 3702fe8876d82bde104835ae14f19b545f9b4323f369928b31ff8c7c86e788f0
                                                                          • Opcode Fuzzy Hash: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                                          • Instruction Fuzzy Hash: 32014C356043086A8B10CF69AC004AEFBE8DB4D7217108277FC14D3382DA744E0496E4
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle
                                                                          • String ID:
                                                                          • API String ID: 2962429428-0
                                                                          • Opcode ID: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                                          • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                          • Opcode Fuzzy Hash: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                                          • Instruction Fuzzy Hash:
                                                                          APIs
                                                                          • GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                          • SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                          • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                          • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                          • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                          • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                          • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                          • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                          • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                          • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                          • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                          • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                          • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                          • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                          • FreeLibrary.KERNEL32(00000001,?,00419000,00000000,?,?,?,00000001), ref: 0041F27F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                          • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                          • API String ID: 2323315520-3614243559
                                                                          • Opcode ID: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                                          • Instruction ID: d5058fc073e0ad59750b6b6eed82d26134d8568d962b0a84cfd108907e917b52
                                                                          • Opcode Fuzzy Hash: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                                          • Instruction Fuzzy Hash: 8D310DB2640700EBEB01EBB9AC86A663294F728724745093FB508DB192D77C5C49CB1C
                                                                          APIs
                                                                          • GetTickCount.KERNEL32 ref: 00458993
                                                                          • QueryPerformanceCounter.KERNEL32(02243858,00000000,00458C26,?,?,02243858,00000000,?,00459322,?,02243858,00000000), ref: 0045899C
                                                                          • GetSystemTimeAsFileTime.KERNEL32(02243858,02243858), ref: 004589A6
                                                                          • GetCurrentProcessId.KERNEL32(?,02243858,00000000,00458C26,?,?,02243858,00000000,?,00459322,?,02243858,00000000), ref: 004589AF
                                                                          • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458A25
                                                                          • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02243858,02243858), ref: 00458A33
                                                                          • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458A7B
                                                                          • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00458BD1,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458AB4
                                                                            • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                          • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458B5D
                                                                          • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00458B93
                                                                          • CloseHandle.KERNEL32(000000FF,00458BD8,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458BCB
                                                                            • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                          • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                          • API String ID: 770386003-3271284199
                                                                          • Opcode ID: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                                          • Instruction ID: 46381a2ef6f5f7687f8d932114089cfc0a3b3023078b53c1614b04e084b280c9
                                                                          • Opcode Fuzzy Hash: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                                          • Instruction Fuzzy Hash: 02711370A04348AEDB11DB69CC41B5EBBF8EB15705F1084BAB944FB282DB7859488B69
                                                                          APIs
                                                                            • Part of subcall function 0047828C: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02242BD8,?,?,?,02242BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                                            • Part of subcall function 0047828C: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                                            • Part of subcall function 0047828C: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02242BD8,?,?,?,02242BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                                            • Part of subcall function 0047828C: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02242BD8,?,?,?,02242BD8), ref: 004782E8
                                                                            • Part of subcall function 0047828C: CloseHandle.KERNEL32(00000000,?,?,?,02242BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                                            • Part of subcall function 00478364: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004783F6,?,?,?,02242BD8,?,00478458,00000000,0047856E,?,?,-00000010,?), ref: 00478394
                                                                          • ShellExecuteEx.SHELL32(0000003C), ref: 004784A8
                                                                          • GetLastError.KERNEL32(00000000,0047856E,?,?,-00000010,?), ref: 004784B1
                                                                          • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004784FE
                                                                          • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478522
                                                                          • CloseHandle.KERNEL32(00000000,00478553,00000000,00000000,000000FF,000000FF,00000000,0047854C,?,00000000,0047856E,?,?,-00000010,?), ref: 00478546
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                          • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                          • API String ID: 883996979-221126205
                                                                          • Opcode ID: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                                          • Instruction ID: be90243bdd9c3757315ff9bbcfcad83cd6a8df60a98d136a70e83fac94f3d3e4
                                                                          • Opcode Fuzzy Hash: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                                          • Instruction Fuzzy Hash: E0314670A40609BEDB11EFAAD845ADEB6B8EF05314F50847FF518E7281DB7C89058B19
                                                                          APIs
                                                                          • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422A04
                                                                          • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BCE), ref: 00422A14
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSendShowWindow
                                                                          • String ID:
                                                                          • API String ID: 1631623395-0
                                                                          • Opcode ID: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                                          • Instruction ID: ac1ceeab966790095f9612ce7a7db5e594191b89627cdcc61fab65d1acc55ab9
                                                                          • Opcode Fuzzy Hash: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                                          • Instruction Fuzzy Hash: 79914071B04214BFD711EFA9DA86F9D77F4AB04314F5500BAF504AB3A2CB78AE409B58
                                                                          APIs
                                                                          • IsIconic.USER32(?), ref: 004183A3
                                                                          • GetWindowPlacement.USER32(?,0000002C), ref: 004183C0
                                                                          • GetWindowRect.USER32(?), ref: 004183DC
                                                                          • GetWindowLongA.USER32(?,000000F0), ref: 004183EA
                                                                          • GetWindowLongA.USER32(?,000000F8), ref: 004183FF
                                                                          • ScreenToClient.USER32(00000000), ref: 00418408
                                                                          • ScreenToClient.USER32(00000000,?), ref: 00418413
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                          • String ID: ,
                                                                          • API String ID: 2266315723-3772416878
                                                                          • Opcode ID: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                                          • Instruction ID: f1655e9c1aaa1f9d3e17845697c0dfec8ab0781743990dff6cd0a114faef5a7c
                                                                          • Opcode Fuzzy Hash: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                                          • Instruction Fuzzy Hash: D6112B71505201AFDB00EF69C885F9B77E8AF49314F18067EBD58DB286D738D900CBA9
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                                          • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004555FE
                                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455625
                                                                          • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045562A
                                                                          • ExitWindowsEx.USER32(00000002,00000000), ref: 0045563B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                          • String ID: SeShutdownPrivilege
                                                                          • API String ID: 107509674-3733053543
                                                                          • Opcode ID: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                                          • Instruction ID: f0f78ca649e8ddc1473c2e21848b41e7847a09c75f53dffa28e6f5675cd8c776
                                                                          • Opcode Fuzzy Hash: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                                          • Instruction Fuzzy Hash: 32F0F670284B42B9E610AA758C13F3B21C89B40B49F80083EBD09EA1C3D7BDC80C4A2F
                                                                          APIs
                                                                          • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D4F5
                                                                          • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D505
                                                                          • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D515
                                                                          • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047F47B,00000000,0047F4A4), ref: 0045D53A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$CryptVersion
                                                                          • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                          • API String ID: 1951258720-508647305
                                                                          • Opcode ID: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                                          • Instruction ID: 2c2546d05897d0e560449e180de6b9da44e6f0241588afb6de3da162f6531889
                                                                          • Opcode Fuzzy Hash: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                                          • Instruction Fuzzy Hash: 3AF012F0940704EBEB18DFB6BCC67623695ABD531AF14C137A404A51A2E778044CCE1D
                                                                          APIs
                                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90,?,?,00000000,0049B628), ref: 00497ACB
                                                                          • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00497B4E
                                                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000), ref: 00497B66
                                                                          • FindClose.KERNEL32(000000FF,00497B91,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90), ref: 00497B84
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FileFind$AttributesCloseFirstNext
                                                                          • String ID: isRS-$isRS-???.tmp
                                                                          • API String ID: 134685335-3422211394
                                                                          • Opcode ID: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                                          • Instruction ID: b2847bb1a44685988a55541ee7ac685ebeb66ffb5e30493f66813578f7a68db2
                                                                          • Opcode Fuzzy Hash: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                                          • Instruction Fuzzy Hash: A63165719146186FCF10EF65CC41ADEBBBCDB45318F5084F7A808A32A1E638AE458F58
                                                                          APIs
                                                                          • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457449
                                                                          • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457470
                                                                          • SetForegroundWindow.USER32(?), ref: 00457481
                                                                          • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,0045775B,?,00000000,00457797), ref: 00457746
                                                                          Strings
                                                                          • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004575C6
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                          • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                          • API String ID: 2236967946-3182603685
                                                                          • Opcode ID: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                                          • Instruction ID: 5bc10c0d354cae83c82450a0913647aad13fd3ad71d4eb48676ad76960377df7
                                                                          • Opcode Fuzzy Hash: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                                          • Instruction Fuzzy Hash: D9910034608204EFD715CF54E991F5ABBF9EB89305F2180BAED0897792D638AE04DF58
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F37), ref: 00455E28
                                                                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E2E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                          • API String ID: 1646373207-3712701948
                                                                          • Opcode ID: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                                          • Instruction ID: 12dfdd1b414f9b5fa57bb507e68127e36b1c1a940f154b23c6ee37fdedd7ee09
                                                                          • Opcode Fuzzy Hash: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                                          • Instruction Fuzzy Hash: 66415171A04649AFCF01EFA5C8929EFB7B8EF49304F508566F800F7252D6785E09CB69
                                                                          APIs
                                                                          • IsIconic.USER32(?), ref: 00417D1F
                                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                          • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                          • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Placement$Iconic
                                                                          • String ID: ,
                                                                          • API String ID: 568898626-3772416878
                                                                          • Opcode ID: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                                          • Instruction ID: 117db6d3727d0f94901dea8748b8d47281c3d2add8a8e77c7f929e434730b1f7
                                                                          • Opcode Fuzzy Hash: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                                          • Instruction Fuzzy Hash: 41213171604208ABCF40EF69E8C0EEA77B8AF49314F05456AFD18DF246C678DD84CB68
                                                                          APIs
                                                                          • SetErrorMode.KERNEL32(00000001,00000000,00464205), ref: 00464079
                                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 00464108
                                                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 0046419A
                                                                          • FindClose.KERNEL32(000000FF,004641C1,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 004641B4
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Find$File$CloseErrorFirstModeNext
                                                                          • String ID:
                                                                          • API String ID: 4011626565-0
                                                                          • Opcode ID: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                                          • Instruction ID: 2652c2d8e8669354d55d474f1d59e7b06630ff05c6329d0403030a32038cf055
                                                                          • Opcode Fuzzy Hash: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                                          • Instruction Fuzzy Hash: 1E418770A00618AFCF10EF65DC55ADEB7B8EB89705F5044BAF804E7381E67C9E848E59
                                                                          APIs
                                                                          • SetErrorMode.KERNEL32(00000001,00000000,004646AB), ref: 00464539
                                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 0046457F
                                                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464634
                                                                          • FindClose.KERNEL32(000000FF,0046465F,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464652
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Find$File$CloseErrorFirstModeNext
                                                                          • String ID:
                                                                          • API String ID: 4011626565-0
                                                                          • Opcode ID: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                                          • Instruction ID: 7635123f594c8b6db569002a9bb01bf8fa96c74c2cf80da52efac59b167f1e7c
                                                                          • Opcode Fuzzy Hash: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                                          • Instruction Fuzzy Hash: D8416171A00A18EBCB10EFA5CC959DEB7B9EB88305F4044AAF804A7351E77C9E448E59
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E966
                                                                          • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E991
                                                                          • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E99E
                                                                          • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9A6
                                                                          • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9AC
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                          • String ID:
                                                                          • API String ID: 1177325624-0
                                                                          • Opcode ID: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                                          • Instruction ID: 40e29ed62a0e901db822078ff48c294e58af048427126d47a83bbc7ee0829aa9
                                                                          • Opcode Fuzzy Hash: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                                          • Instruction Fuzzy Hash: 4BF090B23A17207AF620B57A6C86F7F418CC785B68F10823BBB04FF1C1D9A85D05556D
                                                                          APIs
                                                                          • IsIconic.USER32(?), ref: 004833FA
                                                                          • GetWindowLongA.USER32(00000000,000000F0), ref: 00483418
                                                                          • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048343A
                                                                          • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048344E
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Show$IconicLong
                                                                          • String ID:
                                                                          • API String ID: 2754861897-0
                                                                          • Opcode ID: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                                          • Instruction ID: 9902e76ed030cf172564c6423cfc444f456bf65fce7539c2ce1f68efba32f602
                                                                          • Opcode Fuzzy Hash: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                                          • Instruction Fuzzy Hash: 4D017134A452019EEB11BBA5DD8AB5B27C45F10B09F08083BB9029F2A3CB6D9D41D71C
                                                                          APIs
                                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,00462B90), ref: 00462B14
                                                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B50
                                                                          • FindClose.KERNEL32(000000FF,00462B77,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B6A
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Find$File$CloseFirstNext
                                                                          • String ID:
                                                                          • API String ID: 3541575487-0
                                                                          • Opcode ID: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                                          • Instruction ID: 0f193a6fcf1d943c675bf75123405c31ceeb2ecab595186adb6c93933d2a98b0
                                                                          • Opcode Fuzzy Hash: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                                          • Instruction Fuzzy Hash: 7121D871904B087EDB11DF65CC51ADEBBACDB49704F5084F7E808E31A1E6BCAE44CA5A
                                                                          APIs
                                                                          • IsIconic.USER32(?), ref: 004241F4
                                                                          • SetActiveWindow.USER32(?,?,?,0046CFFB), ref: 00424201
                                                                            • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                            • Part of subcall function 00423B24: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,022425AC,0042421A,?,?,?,0046CFFB), ref: 00423B5F
                                                                          • SetFocus.USER32(00000000,?,?,?,0046CFFB), ref: 0042422E
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ActiveFocusIconicShow
                                                                          • String ID:
                                                                          • API String ID: 649377781-0
                                                                          • Opcode ID: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                                          • Instruction ID: 85e094fd83fda52d6ba69bb43f194f943737e29f022f28d5c3d7585fd8a6de7d
                                                                          • Opcode Fuzzy Hash: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                                          • Instruction Fuzzy Hash: ECF03A717001208BDB10EFAAA8C4B9662A8EF48344B5500BBBC09DF34BCA7CDC0187A8
                                                                          APIs
                                                                          • IsIconic.USER32(?), ref: 00417D1F
                                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                          • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                          • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Placement$Iconic
                                                                          • String ID:
                                                                          • API String ID: 568898626-0
                                                                          • Opcode ID: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                                          • Instruction ID: b3485382f52430a3de90e88073d2477855dbbaeb9eeee9907b508ce44eeb6dab
                                                                          • Opcode Fuzzy Hash: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                                          • Instruction Fuzzy Hash: 02017C31204108ABDB10EE69E8C1EEA73A8AF45324F054567FD08CF242D639ECC087A8
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CaptureIconic
                                                                          • String ID:
                                                                          • API String ID: 2277910766-0
                                                                          • Opcode ID: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                                          • Instruction ID: edcb67aebd7cb7e0e4c3241a821d6ac110e093164443c601d5aebb18a23c44a8
                                                                          • Opcode Fuzzy Hash: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                                          • Instruction Fuzzy Hash: A2F04F32304A028BDB21A72EC885AEB62F5DF84368B14443FE415CB765EB7CDCD58758
                                                                          APIs
                                                                          • IsIconic.USER32(?), ref: 004241AB
                                                                            • Part of subcall function 00423A94: EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                            • Part of subcall function 00423A94: GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                            • Part of subcall function 00423A94: GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                            • Part of subcall function 00423A94: SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                          • SetActiveWindow.USER32(?,?,?,00423D83,00000000,0042416C), ref: 004241BF
                                                                            • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                          • String ID:
                                                                          • API String ID: 2671590913-0
                                                                          • Opcode ID: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                                          • Instruction ID: ffd443eaca36288e12b0fd3e34cf0737071334a0f5e631569de285e60205db71
                                                                          • Opcode Fuzzy Hash: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                                          • Instruction Fuzzy Hash: 02E0E5A470010187EF00EFAAD8C9B9662A9AB48304F55057ABC08CF24BDA78C954C724
                                                                          APIs
                                                                          • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127E5), ref: 004127D3
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: NtdllProc_Window
                                                                          • String ID:
                                                                          • API String ID: 4255912815-0
                                                                          • Opcode ID: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                                          • Instruction ID: 2af12fea25256c3ae9471bae8fd4feed52cec15eb5e351c91de8273fd3ce68b3
                                                                          • Opcode Fuzzy Hash: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                                          • Instruction Fuzzy Hash: 055106316082058FD710DB6AD681A9BF3E5FF98304B2482BBD814C7392D7B8EDA1C759
                                                                          APIs
                                                                          • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478B2A
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: NtdllProc_Window
                                                                          • String ID:
                                                                          • API String ID: 4255912815-0
                                                                          • Opcode ID: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                                          • Instruction ID: 518aae51b6d6b411e39a58dd47dc5b2362a2c83c3bfed1ee6c3543fdde473bb3
                                                                          • Opcode Fuzzy Hash: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                                          • Instruction Fuzzy Hash: 04413775644104DFCB10CF99C6898AAB7F5FB48310B74CA9AE848DB705DB38EE41DB54
                                                                          APIs
                                                                          • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045D5AB
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CryptFour
                                                                          • String ID:
                                                                          • API String ID: 2153018856-0
                                                                          • Opcode ID: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                                          • Instruction ID: 2e238a974be0c8424367b3c35ccc205e7f0a308c5ec670be841bb4718b7179ff
                                                                          • Opcode Fuzzy Hash: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                                          • Instruction Fuzzy Hash: 37C09BF200420CBF660057D5ECC9C77B75CF6586547508126F6048210195726C104574
                                                                          APIs
                                                                          • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DDBC,?,0046DF9D), ref: 0045D5BE
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CryptFour
                                                                          • String ID:
                                                                          • API String ID: 2153018856-0
                                                                          • Opcode ID: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                                          • Instruction ID: 227689971defb3a768f182aa15824e3680876923b4d994b81e1676941902ce31
                                                                          • Opcode Fuzzy Hash: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                                          • Instruction Fuzzy Hash: 9DA002B0A80300BAFD2057B05D4EF26352CA7D0F05F708465B202EA0D085A56410852C
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2941055564.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                          • Associated: 00000001.00000002.2941034226.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2941127191.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_10000000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                          • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                          • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                          • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2941055564.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                          • Associated: 00000001.00000002.2941034226.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2941127191.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_10000000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                          • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                          • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                          • Instruction Fuzzy Hash:
                                                                          APIs
                                                                            • Part of subcall function 0044B614: GetVersionExA.KERNEL32(00000094), ref: 0044B631
                                                                          • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                                          • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                                          • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                                          • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                                          • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                                          • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                                          • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                                          • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                                          • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7D9
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7EB
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7FD
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B80F
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B821
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B833
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B845
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B857
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B869
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B87B
                                                                          • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B88D
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B89F
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8B1
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8C3
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8D5
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8E7
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8F9
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B90B
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B91D
                                                                          • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B92F
                                                                          • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B941
                                                                          • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B953
                                                                          • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B965
                                                                          • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B977
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B989
                                                                          • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B99B
                                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B9AD
                                                                          • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9BF
                                                                          • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9D1
                                                                          • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9E3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$LibraryLoadVersion
                                                                          • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                          • API String ID: 1968650500-2910565190
                                                                          • Opcode ID: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                                          • Instruction ID: 346aa6b979044c2d6f95573bc57da9b6801dc261a15d858c7a91061cf3dc2738
                                                                          • Opcode Fuzzy Hash: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                                          • Instruction Fuzzy Hash: CC91E7B0A40B50EBEF00EBF5ADC6A2637A8EB15B14714467BB444EF295D778D800CF99
                                                                          APIs
                                                                          • CreateMutexA.KERNEL32(00499B18,00000001,00000000,00000000,004584B9,?,?,?,00000001,?,004586D3,00000000,004586E9,?,00000000,0049B628), ref: 004581D1
                                                                          • CreateFileMappingA.KERNEL32(000000FF,00499B18,00000004,00000000,00002018,00000000), ref: 00458209
                                                                          • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9,?,?,?), ref: 00458230
                                                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045833D
                                                                          • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9), ref: 00458295
                                                                            • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                          • CloseHandle.KERNEL32(004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458354
                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045838D
                                                                          • GetLastError.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045839F
                                                                          • UnmapViewOfFile.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458471
                                                                          • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458480
                                                                          • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458489
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                                                          • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp
                                                                          • API String ID: 4012871263-351310198
                                                                          • Opcode ID: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                                          • Instruction ID: 29107a7cf73729034b65a1fcaaf08eab05738b19563c620e852bf3134b102344
                                                                          • Opcode Fuzzy Hash: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                                          • Instruction Fuzzy Hash: 46914170A002099BDB10EFA9C845B9EB7B4EB05305F50856FED14FB283DF7899498F69
                                                                          APIs
                                                                          • 73A1A570.USER32(00000000,?,0041A954,?), ref: 0041CA50
                                                                          • 73A24C40.GDI32(?,00000000,?,0041A954,?), ref: 0041CA5C
                                                                          • 73A26180.GDI32(0041A954,?,00000001,00000001,00000000,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA80
                                                                          • 73A24C00.GDI32(?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA90
                                                                          • SelectObject.GDI32(0041CE4C,00000000), ref: 0041CAAB
                                                                          • FillRect.USER32(0041CE4C,?,?), ref: 0041CAE6
                                                                          • SetTextColor.GDI32(0041CE4C,00000000), ref: 0041CAFB
                                                                          • SetBkColor.GDI32(0041CE4C,00000000), ref: 0041CB12
                                                                          • PatBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00FF0062), ref: 0041CB28
                                                                          • 73A24C40.GDI32(?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954), ref: 0041CB3B
                                                                          • SelectObject.GDI32(00000000,00000000), ref: 0041CB6C
                                                                          • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954), ref: 0041CB84
                                                                          • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?), ref: 0041CB8D
                                                                          • 73A18830.GDI32(0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CB9C
                                                                          • 73A122A0.GDI32(0041CE4C,0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CBA5
                                                                          • SetTextColor.GDI32(00000000,00000000), ref: 0041CBBE
                                                                          • SetBkColor.GDI32(00000000,00000000), ref: 0041CBD5
                                                                          • 73A24D40.GDI32(0041CE4C,00000000,00000000,0041A954,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CC1A,?,?,00000000), ref: 0041CBF1
                                                                          • SelectObject.GDI32(00000000,?), ref: 0041CBFE
                                                                          • DeleteDC.GDI32(00000000), ref: 0041CC14
                                                                            • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Color$ObjectSelect$A122A18830Text$A26180A570DeleteFillRect
                                                                          • String ID:
                                                                          • API String ID: 1381628555-0
                                                                          • Opcode ID: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                                          • Instruction ID: 69ed6b4e4825e3c47d53d1ee88e95f0281db4649dcd7e45998b3becab3701dfd
                                                                          • Opcode Fuzzy Hash: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                                          • Instruction Fuzzy Hash: 6261EC71A44609AFDF10EBE9DC86F9FB7B8EF48704F14446AB504E7281D67CA9408B68
                                                                          APIs
                                                                          • ShowWindow.USER32(?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000,004984F9,?,00000000), ref: 00497E23
                                                                          • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000), ref: 00497E36
                                                                          • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000), ref: 00497E46
                                                                          • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00497E67
                                                                          • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000), ref: 00497E77
                                                                            • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                          • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                          • API String ID: 2000705611-3672972446
                                                                          • Opcode ID: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                                          • Instruction ID: d71e95358f961f9c8085103628ed7ebfe7aaf39cab9d6a0a027eda6f41515cae
                                                                          • Opcode Fuzzy Hash: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                                          • Instruction Fuzzy Hash: C291B530A042449FDF11EBA9DC52BAE7FA4EF4A304F51447BF500AB292DA7DAC05CB59
                                                                          APIs
                                                                          • GetLastError.KERNEL32(00000000,0045ACF8,?,?,?,?,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045ABAA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                          • API String ID: 1452528299-3112430753
                                                                          • Opcode ID: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                                          • Instruction ID: f5e388fb48f96f1c0466849e1c52bdf0d536658550fb6e74c3a20cf80cd44526
                                                                          • Opcode Fuzzy Hash: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                                          • Instruction Fuzzy Hash: 2271AE707002445BDB01EB69D8427AE77A6AF48316F50856BFC01DB383CA7C9A5DC79A
                                                                          APIs
                                                                          • GetVersion.KERNEL32 ref: 0045CF3E
                                                                          • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CF5E
                                                                          • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CF6B
                                                                          • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CF78
                                                                          • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CF86
                                                                            • Part of subcall function 0045CE2C: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CECB,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CEA5
                                                                          • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D03F
                                                                          • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D048
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                          • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                          • API String ID: 59345061-4263478283
                                                                          • Opcode ID: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                                          • Instruction ID: 4ce31bb81caf279f5ed3d10c62bb09a2aad5f6c7ba3f26a8019cd68bbbdcec0a
                                                                          • Opcode Fuzzy Hash: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                                          • Instruction Fuzzy Hash: E95193B1D00608EFDB10DFA9C845BAEBBB8EF48315F14806AF915B7381C2389945CF69
                                                                          APIs
                                                                          • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,0045688D), ref: 00456592
                                                                          • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,0045688D), ref: 004565B8
                                                                          • SysFreeString.OLEAUT32(?), ref: 00456745
                                                                          Strings
                                                                          • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004567B6
                                                                          • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004566DB
                                                                          • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004566A7
                                                                          • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045677C
                                                                          • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 0045672A
                                                                          • IPersistFile::Save, xrefs: 00456814
                                                                          • CoCreateInstance, xrefs: 004565C3
                                                                          • IPropertyStore::Commit, xrefs: 00456795
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateInstance$FreeString
                                                                          • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)
                                                                          • API String ID: 308859552-3936712486
                                                                          • Opcode ID: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                                          • Instruction ID: c99fdec92309fd26656a6f7ea9bd91ecf5cc306c054acb75a5569a06f28a4b2e
                                                                          • Opcode Fuzzy Hash: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                                          • Instruction Fuzzy Hash: 29A13E71A00104AFDB50EFA9C885B9E7BF8EF09706F55406AF804E7252DB38DD48CB69
                                                                          APIs
                                                                          • 73A24C40.GDI32(00000000,?,00000000,?), ref: 0041B3D3
                                                                          • 73A24C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B3DD
                                                                          • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3EF
                                                                          • 73A26180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B406
                                                                          • 73A1A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B412
                                                                          • 73A24C00.GDI32(00000000,0000000B,?,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B43F
                                                                          • 73A1A480.USER32(00000000,00000000,0041B472,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B465
                                                                          • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                          • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                          • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                          • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                          • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                          • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                          • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Object$Select$Delete$A26180A480A570Stretch
                                                                          • String ID:
                                                                          • API String ID: 359944910-0
                                                                          • Opcode ID: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                                          • Instruction ID: 9e854467c286a28b18f31183f63f6c048648830cb6dea2264be82148a8da808a
                                                                          • Opcode Fuzzy Hash: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                                          • Instruction Fuzzy Hash: DC419D71E40619AFDF10EAE9D846FAFB7B8EF08704F104466B614FB281D67969408BA4
                                                                          APIs
                                                                            • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                          • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472F70
                                                                          • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473077
                                                                          • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0047308D
                                                                          • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 004730B2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                          • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                          • API String ID: 971782779-3668018701
                                                                          • Opcode ID: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                                          • Instruction ID: 1ded2309c22d90a9957aabde76cedeacc99048359e90752decbb9b8a0015ab1b
                                                                          • Opcode Fuzzy Hash: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                                          • Instruction Fuzzy Hash: 8FD12574A00149AFDB01EFA9D581BDDBBF5AF08305F50806AF804B7392D778AE45CB69
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,?,00000000,?,00000000,00454AF9,?,0045AECE,00000003,00000000,00000000,00454B30), ref: 00454979
                                                                            • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                          • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 004549FD
                                                                          • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 00454A2C
                                                                          Strings
                                                                          • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454897
                                                                          • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548D0
                                                                          • RegOpenKeyEx, xrefs: 004548FC
                                                                          • , xrefs: 004548EA
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue$FormatMessageOpen
                                                                          • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                          • API String ID: 2812809588-1577016196
                                                                          • Opcode ID: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                                          • Instruction ID: 44bd6ba1492406805f437c97fe518088f2f8e7c1bef0b67c8a01139b77ca8c69
                                                                          • Opcode Fuzzy Hash: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                                          • Instruction Fuzzy Hash: C0911471944248ABDB10DFE5D942BDEB7FCEB48309F50406BF900FB282D6789E458B69
                                                                          APIs
                                                                            • Part of subcall function 004596C8: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459863
                                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 004598CD
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459934
                                                                          Strings
                                                                          • v2.0.50727, xrefs: 004598BF
                                                                          • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00459880
                                                                          • .NET Framework version %s not found, xrefs: 0045996D
                                                                          • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 00459816
                                                                          • v4.0.30319, xrefs: 00459855
                                                                          • v1.1.4322, xrefs: 00459926
                                                                          • .NET Framework not found, xrefs: 00459981
                                                                          • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 004598E7
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Close$Open
                                                                          • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                          • API String ID: 2976201327-446240816
                                                                          • Opcode ID: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                                          • Instruction ID: 729b419896cd5506e065475e0ee5015c208a67e93f4f54458093df2d8724af3d
                                                                          • Opcode Fuzzy Hash: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                                          • Instruction Fuzzy Hash: 0051A030A04145EBCB04DFA9C8A1BEE77B69B59305F54447FA841DB393D63D9E0E8B18
                                                                          APIs
                                                                          • CloseHandle.KERNEL32(?), ref: 00458DDF
                                                                          • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458DFB
                                                                          • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458E09
                                                                          • GetExitCodeProcess.KERNEL32(?), ref: 00458E1A
                                                                          • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E61
                                                                          • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E7D
                                                                          Strings
                                                                          • Helper process exited., xrefs: 00458E29
                                                                          • Helper isn't responding; killing it., xrefs: 00458DEB
                                                                          • Helper process exited, but failed to get exit code., xrefs: 00458E53
                                                                          • Stopping 64-bit helper process. (PID: %u), xrefs: 00458DD1
                                                                          • Helper process exited with failure code: 0x%x, xrefs: 00458E47
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                          • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                          • API String ID: 3355656108-1243109208
                                                                          • Opcode ID: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                                          • Instruction ID: b06cb4cb11178ece3cea1db1bc2ca69ea432733d5239d7d0987fb8f0d427a68f
                                                                          • Opcode Fuzzy Hash: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                                          • Instruction Fuzzy Hash: D9216D706047009AD720E679C44275BB6E59F08709F04CC2FB999EB293DF78E8488B2A
                                                                          APIs
                                                                            • Part of subcall function 0042DDF4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                          • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 0045463B
                                                                          • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 00454777
                                                                            • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                          Strings
                                                                          • RegCreateKeyEx, xrefs: 004545AF
                                                                          • , xrefs: 0045459D
                                                                          • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454583
                                                                          • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454553
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseCreateFormatMessageQueryValue
                                                                          • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                          • API String ID: 2481121983-1280779767
                                                                          • Opcode ID: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                                          • Instruction ID: a200d9e45076b9aa1c9026ee470310bfc0f5ccdb1a8093a9a555fb12639cba12
                                                                          • Opcode Fuzzy Hash: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                                          • Instruction Fuzzy Hash: 6C81DE75A00209AFDB00DFD5C941BDFB7F9EB49309F50442AE901FB282D7789A45CB69
                                                                          APIs
                                                                            • Part of subcall function 004538A8: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                                            • Part of subcall function 004538A8: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0049669D
                                                                          • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004967F1), ref: 004966BE
                                                                          • CreateWindowExA.USER32(00000000,STATIC,00496800,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004966E5
                                                                          • SetWindowLongA.USER32(?,000000FC,00495E78), ref: 004966F8
                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC,00496800), ref: 00496728
                                                                          • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0049679C
                                                                          • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000), ref: 004967A8
                                                                            • Part of subcall function 00453D1C: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                                          • 73A25CF0.USER32(?,004967CB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC), ref: 004967BE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                          • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                          • API String ID: 170458502-2312673372
                                                                          • Opcode ID: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                                          • Instruction ID: 3fac7199250898b77632ea887e905273a0ca2a52c1bf25bf17bddf130f7f486a
                                                                          • Opcode Fuzzy Hash: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                                          • Instruction Fuzzy Hash: EE413D70A44208AFDF01EFA5DC42F9E7BB8EB09714F61457AF500F7291D6799E008BA8
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E451
                                                                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E457
                                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E4A5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressCloseHandleModuleProc
                                                                          • String ID: .DEFAULT\Control Panel\International$=aE$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                          • API String ID: 4190037839-1003587384
                                                                          • Opcode ID: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                                          • Instruction ID: 6214d84d9e891aa165dd1588e79579c1e4a82babed7fc21810c195be89e1891e
                                                                          • Opcode Fuzzy Hash: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                                          • Instruction Fuzzy Hash: 65215230B10219ABCB10EAE7DC45A9E77A8EB04318FA04877A500E7281EB7CDE41CA5C
                                                                          APIs
                                                                          • GetActiveWindow.USER32 ref: 00462D68
                                                                          • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462D7C
                                                                          • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462D89
                                                                          • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462D96
                                                                          • GetWindowRect.USER32(?,00000000), ref: 00462DE2
                                                                          • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462E20
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                          • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                          • API String ID: 2610873146-3407710046
                                                                          • Opcode ID: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                                          • Instruction ID: 308e9426e96dcd15a0811dc773674cbbce9379ede84ac64ebea6e7762974983c
                                                                          • Opcode Fuzzy Hash: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                                          • Instruction Fuzzy Hash: 8421A775701B046FD3019A64DD41F3B3395DB94714F08453AF944EB381E6B9EC018A9A
                                                                          APIs
                                                                          • GetActiveWindow.USER32 ref: 0042F1A4
                                                                          • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1B8
                                                                          • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1C5
                                                                          • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1D2
                                                                          • GetWindowRect.USER32(?,00000000), ref: 0042F21E
                                                                          • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F25C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                          • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                          • API String ID: 2610873146-3407710046
                                                                          • Opcode ID: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                                          • Instruction ID: f96f766bc13e38d455a6b30724ea53c80225cfaaeacd9570d6dca051b777ffc7
                                                                          • Opcode Fuzzy Hash: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                                          • Instruction Fuzzy Hash: 3221D7797057149BD300D664ED81F3B33A4DB85B14F88457AF944DB381D679EC044BA9
                                                                          APIs
                                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0045915F,?,00000000,004591C2,?,?,02243858,00000000), ref: 00458FDD
                                                                          • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02243858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 0045903A
                                                                          • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02243858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 00459047
                                                                          • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00459093
                                                                          • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02243858,?,00000000,004590F4,?,00000000), ref: 004590B9
                                                                          • GetLastError.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02243858,?,00000000,004590F4,?,00000000), ref: 004590C0
                                                                            • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                          • String ID: CreateEvent$TransactNamedPipe
                                                                          • API String ID: 2182916169-3012584893
                                                                          • Opcode ID: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                                          • Instruction ID: 50fb7c1009465aa7c5405e125e9101384e11cc4d6b330c20a7fc1de2f8ccdd80
                                                                          • Opcode Fuzzy Hash: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                                          • Instruction Fuzzy Hash: 68417F71A00608EFDB15DF99C985F9EB7F9EB08714F1044AAF904E72D2C6789E44CB28
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456CBD,?,?,00000031,?), ref: 00456B80
                                                                          • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456B86
                                                                          • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456BD3
                                                                            • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                          • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                          • API String ID: 1914119943-2711329623
                                                                          • Opcode ID: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                                          • Instruction ID: a27b950e9f8baa5d3fd7d83d3f5f0f06fd95d714c0010da27a3b0cf72a10e13f
                                                                          • Opcode Fuzzy Hash: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                                          • Instruction Fuzzy Hash: AB319471B00604AFDB12EFAACC41D5BB7BDEB897557528466FC04D7252DA38DD04CB28
                                                                          APIs
                                                                          • RectVisible.GDI32(?,?), ref: 00416E23
                                                                          • SaveDC.GDI32(?), ref: 00416E37
                                                                          • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E5A
                                                                          • RestoreDC.GDI32(?,?), ref: 00416E75
                                                                          • CreateSolidBrush.GDI32(00000000), ref: 00416EF5
                                                                          • FrameRect.USER32(?,?,?), ref: 00416F28
                                                                          • DeleteObject.GDI32(?), ref: 00416F32
                                                                          • CreateSolidBrush.GDI32(00000000), ref: 00416F42
                                                                          • FrameRect.USER32(?,?,?), ref: 00416F75
                                                                          • DeleteObject.GDI32(?), ref: 00416F7F
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                          • String ID:
                                                                          • API String ID: 375863564-0
                                                                          • Opcode ID: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                                          • Instruction ID: 305d9ddf0f7240c011be45b7bb8b7ddc49b42f68556790db257713301bb8c367
                                                                          • Opcode Fuzzy Hash: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                                          • Instruction Fuzzy Hash: FC514C712086445FDB54EF69C8C0B9777E8AF48314F15466AFD488B287C738EC85CB99
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                          • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                          • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                          • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                          • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                          • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                          • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                          • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                          • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                          • String ID:
                                                                          • API String ID: 1694776339-0
                                                                          • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                          • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                          • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                          • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                          APIs
                                                                          • GetSystemMenu.USER32(00000000,00000000), ref: 00422243
                                                                          • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422261
                                                                          • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226E
                                                                          • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042227B
                                                                          • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422288
                                                                          • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422295
                                                                          • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004222A2
                                                                          • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004222AF
                                                                          • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222CD
                                                                          • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222E9
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Menu$Delete$EnableItem$System
                                                                          • String ID:
                                                                          • API String ID: 3985193851-0
                                                                          • Opcode ID: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                                          • Instruction ID: b791af981bedf3385b2dd143af085cc0c004e448fbd85fce69a0ff0a91ac5271
                                                                          • Opcode Fuzzy Hash: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                                          • Instruction Fuzzy Hash: 35213370340744BAE720D725DD8BF9B7BD89B04718F4440A5BA487F2D7C7F9AA80869C
                                                                          APIs
                                                                          • FreeLibrary.KERNEL32(10000000), ref: 00481499
                                                                          • FreeLibrary.KERNEL32(00000000), ref: 004814AD
                                                                          • SendNotifyMessageA.USER32(0002042C,00000496,00002710,00000000), ref: 0048151F
                                                                          Strings
                                                                          • Not restarting Windows because Setup is being run from the debugger., xrefs: 004814CE
                                                                          • DeinitializeSetup, xrefs: 00481395
                                                                          • Restarting Windows., xrefs: 004814FA
                                                                          • GetCustomSetupExitCode, xrefs: 00481339
                                                                          • Deinitializing Setup., xrefs: 004812FA
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FreeLibrary$MessageNotifySend
                                                                          • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                          • API String ID: 3817813901-1884538726
                                                                          • Opcode ID: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                                          • Instruction ID: fb8259b883485ef9100c7f5c1e95e74d54582b152ce66d5af1bc00326fba4159
                                                                          • Opcode Fuzzy Hash: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                                          • Instruction Fuzzy Hash: 4451A034704240AFD711EB69D895B2E7BE9FB59704F50887BE801C72B1DB38A846CB5D
                                                                          APIs
                                                                          • SHGetMalloc.SHELL32(?), ref: 00461A33
                                                                          • GetActiveWindow.USER32 ref: 00461A97
                                                                          • CoInitialize.OLE32(00000000), ref: 00461AAB
                                                                          • SHBrowseForFolder.SHELL32(?), ref: 00461AC2
                                                                          • CoUninitialize.OLE32(00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AD7
                                                                          • SetActiveWindow.USER32(?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AED
                                                                          • SetActiveWindow.USER32(?,?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AF6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                          • String ID: A
                                                                          • API String ID: 2684663990-3554254475
                                                                          • Opcode ID: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                                          • Instruction ID: 1302daae15839a874164301860301a8b98b45f7dd6f96d3c0913b4bd506695dd
                                                                          • Opcode Fuzzy Hash: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                                          • Instruction Fuzzy Hash: 64314FB0E00248AFDB00EFE6D885A9EBBF8EB09304F51447AF404E7251E7785A44CF59
                                                                          APIs
                                                                          • GetFileAttributesA.KERNEL32(00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85,?,?,00000000,004731F4), ref: 00472C8C
                                                                            • Part of subcall function 0042CDA4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE1A
                                                                            • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                          • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85), ref: 00472D03
                                                                          • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000), ref: 00472D09
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                          • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                          • API String ID: 884541143-1710247218
                                                                          • Opcode ID: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                                          • Instruction ID: a2498b92200520dbea2b626460b71344a260e4c3afc9e0684e621ff8b49742b9
                                                                          • Opcode Fuzzy Hash: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                                          • Instruction Fuzzy Hash: 731122303005087BD721EA66DD82B9E73ACCB88714F60853BB404B72D1CB7CEE02865C
                                                                          APIs
                                                                          • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                                          • LocalFree.KERNEL32(00613DE8,00000000,00401B68), ref: 00401ACF
                                                                          • VirtualFree.KERNEL32(?,00000000,00008000,00613DE8,00000000,00401B68), ref: 00401AEE
                                                                          • LocalFree.KERNEL32(006123B0,?,00000000,00008000,00613DE8,00000000,00401B68), ref: 00401B2D
                                                                          • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                                          • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                          • String ID: )a$=a
                                                                          • API String ID: 3782394904-1008144910
                                                                          • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                          • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                                          • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                          • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                                          APIs
                                                                          • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D621
                                                                          • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D631
                                                                          • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D641
                                                                          • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D651
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc
                                                                          • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                          • API String ID: 190572456-3516654456
                                                                          • Opcode ID: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                                          • Instruction ID: 6d5035e3426567f523c7c0f539c0fc89aa7e9857b83a97dd2a4ec5b9764e3533
                                                                          • Opcode Fuzzy Hash: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                                          • Instruction Fuzzy Hash: 0D01ECB0900740DEEB24DFB6ACC572236A5ABA470AF14C13B980DD62A2D779044ADF2C
                                                                          APIs
                                                                          • SetBkColor.GDI32(?,00000000), ref: 0041A9C9
                                                                          • 73A24D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041AA03
                                                                          • SetBkColor.GDI32(?,?), ref: 0041AA18
                                                                          • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA62
                                                                          • SetTextColor.GDI32(00000000,00000000), ref: 0041AA6D
                                                                          • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA7D
                                                                          • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AABC
                                                                          • SetTextColor.GDI32(00000000,00000000), ref: 0041AAC6
                                                                          • SetBkColor.GDI32(00000000,?), ref: 0041AAD3
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Color$StretchText
                                                                          • String ID:
                                                                          • API String ID: 2984075790-0
                                                                          • Opcode ID: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                                          • Instruction ID: 0e7efefeb240adcf91359f1fba61dc18d1efd34d50a4dd97ee32c9a960060edb
                                                                          • Opcode Fuzzy Hash: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                                          • Instruction Fuzzy Hash: 9861C5B5A00105EFCB40EFADD985E9AB7F8AF08314B10856AF918DB261C735ED41CF68
                                                                          APIs
                                                                            • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                          • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,004580B4,?, /s ",?,regsvr32.exe",?,004580B4), ref: 00458026
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseDirectoryHandleSystem
                                                                          • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                          • API String ID: 2051275411-1862435767
                                                                          • Opcode ID: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                                          • Instruction ID: 809e342f07c36c5fe80e3456e65159aecd70c9e1b429d99a18f855550af0e9f5
                                                                          • Opcode Fuzzy Hash: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                                          • Instruction Fuzzy Hash: 97411570A043086BDB10EFD5D842B8EF7B9AB49705F51407FA904BB292DF789A0D8B19
                                                                          APIs
                                                                          • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1B9
                                                                          • GetSysColor.USER32(00000014), ref: 0044D1C0
                                                                          • SetTextColor.GDI32(00000000,00000000), ref: 0044D1D8
                                                                          • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D201
                                                                          • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D20B
                                                                          • GetSysColor.USER32(00000010), ref: 0044D212
                                                                          • SetTextColor.GDI32(00000000,00000000), ref: 0044D22A
                                                                          • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D253
                                                                          • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D27E
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Text$Color$Draw$OffsetRect
                                                                          • String ID:
                                                                          • API String ID: 1005981011-0
                                                                          • Opcode ID: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                                          • Instruction ID: 3cb6cff9cb4fe1f97db5fca9cf7ecf77bacdc285bba155e9e6a5fbb2dce94e66
                                                                          • Opcode Fuzzy Hash: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                                          • Instruction Fuzzy Hash: 4921CFB42015007FC710FB6ACD8AE8B7BDCDF19319B01857AB918EB393C678DD408669
                                                                          APIs
                                                                          • GetFocus.USER32 ref: 0041B755
                                                                          • 73A1A570.USER32(?), ref: 0041B761
                                                                          • 73A18830.GDI32(00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B796
                                                                          • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B7A2
                                                                          • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B7D0
                                                                          • 73A18830.GDI32(00000000,00000000,00000000,0041B811,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B804
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A18830$A122A26310A570Focus
                                                                          • String ID: k H
                                                                          • API String ID: 3906783838-1447039187
                                                                          • Opcode ID: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                                          • Instruction ID: e4fa2330707e2e3496a7563b6e1a8945dd65194040c1b513b55e56702052f46b
                                                                          • Opcode Fuzzy Hash: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                                          • Instruction Fuzzy Hash: 33512D74A00208AFCB11DFA9C855AEEBBF9FF49704F104466F504A7390D7789981CBA9
                                                                          APIs
                                                                          • GetFocus.USER32 ref: 0041BA27
                                                                          • 73A1A570.USER32(?), ref: 0041BA33
                                                                          • 73A18830.GDI32(00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA6D
                                                                          • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA79
                                                                          • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BA9D
                                                                          • 73A18830.GDI32(00000000,00000000,00000000,0041BADE,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BAD1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A18830$A122A26310A570Focus
                                                                          • String ID: k H
                                                                          • API String ID: 3906783838-1447039187
                                                                          • Opcode ID: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                                          • Instruction ID: 8a06375b061ea5bfc02952791cdae78cf5b61e443f36c9dad2d84499db0416b2
                                                                          • Opcode Fuzzy Hash: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                                          • Instruction Fuzzy Hash: FE510975A002189FCB11DFA9C891AAEBBF9FF49700F15806AF504EB751D7789D40CBA4
                                                                          APIs
                                                                            • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                            • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 00495F55
                                                                          • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00495F69
                                                                          • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00495F83
                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F8F
                                                                          • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F95
                                                                          • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495FA8
                                                                          Strings
                                                                          • Deleting Uninstall data files., xrefs: 00495ECB
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                          • String ID: Deleting Uninstall data files.
                                                                          • API String ID: 1570157960-2568741658
                                                                          • Opcode ID: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                                          • Instruction ID: fec72cc46ef3efd5c3c8e8a450f489c3c08d507a48e2b84f6ee45df75d5b7e94
                                                                          • Opcode Fuzzy Hash: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                                          • Instruction Fuzzy Hash: 34219571304610AFEB11EB75ECC2B2637A8EB54338F61053BF504DA1E6D678AC008B1D
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1,?,?,?,?,00000000), ref: 0047050B
                                                                          • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1), ref: 00470522
                                                                          • AddFontResourceA.GDI32(00000000), ref: 0047053F
                                                                          • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00470553
                                                                          Strings
                                                                          • Failed to set value in Fonts registry key., xrefs: 00470514
                                                                          • AddFontResource, xrefs: 0047055D
                                                                          • Failed to open Fonts registry key., xrefs: 00470529
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                          • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                          • API String ID: 955540645-649663873
                                                                          • Opcode ID: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                                          • Instruction ID: 66ce3b01f7eb708e2302e7809b1ea03697ff66c32de1c99646f3643d23023453
                                                                          • Opcode Fuzzy Hash: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                                          • Instruction Fuzzy Hash: 62216570741204BBDB10EA669C42FAE779D9B55708F50843BB904EB3C2D67CDE028A5D
                                                                          APIs
                                                                            • Part of subcall function 00416420: GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                            • Part of subcall function 00416420: UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                            • Part of subcall function 00416420: RegisterClassA.USER32(?), ref: 004164DE
                                                                          • GetVersion.KERNEL32 ref: 004631CC
                                                                          • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 0046320A
                                                                          • SHGetFileInfo.SHELL32(004632A8,00000000,?,00000160,00004011), ref: 00463227
                                                                          • LoadCursorA.USER32(00000000,00007F02), ref: 00463245
                                                                          • SetCursor.USER32(00000000,00000000,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046324B
                                                                          • SetCursor.USER32(?,0046328B,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046327E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                          • String ID: Explorer
                                                                          • API String ID: 2594429197-512347832
                                                                          • Opcode ID: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                                          • Instruction ID: b0d998c5e58c3251a46d3edbb0a2afbc6be3b3781793d4cbec8386629f90fe5f
                                                                          • Opcode Fuzzy Hash: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                                          • Instruction Fuzzy Hash: FA21E7307403446AEB10FF795C57F9A7698DB09709F5040BFF605EA1C3EA7C8908866D
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02242BD8,?,?,?,02242BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                                          • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02242BD8,?,?,?,02242BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                                          • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02242BD8,?,?,?,02242BD8), ref: 004782E8
                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,02242BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                          • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                          • API String ID: 2704155762-2318956294
                                                                          • Opcode ID: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                                          • Instruction ID: d6ca79aa4c48c3adffb9da4b01ee7f27494699adf3768a2d59cb90ace03db172
                                                                          • Opcode Fuzzy Hash: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                                          • Instruction Fuzzy Hash: 5701C4707C0B0466E520316E4D8AFEB554C8B54B69F54813F7E0CEA2C2DDAE8D06016E
                                                                          APIs
                                                                          • GetLastError.KERNEL32(00000000,0045A2F2,?,00000000,00000000,00000000,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045A236
                                                                            • Part of subcall function 004543E0: FindClose.KERNEL32(000000FF,004544D6), ref: 004544C5
                                                                          Strings
                                                                          • Failed to strip read-only attribute., xrefs: 0045A204
                                                                          • Stripped read-only attribute., xrefs: 0045A1F8
                                                                          • Failed to delete directory (%d). Will retry later., xrefs: 0045A24F
                                                                          • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 0045A210
                                                                          • Failed to delete directory (%d)., xrefs: 0045A2CC
                                                                          • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 0045A2AB
                                                                          • Deleting directory: %s, xrefs: 0045A1BF
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseErrorFindLast
                                                                          • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                          • API String ID: 754982922-1448842058
                                                                          • Opcode ID: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                                          • Instruction ID: e72d66395cbcced70a1ff0d39e5b36b51bb4b2a363b16cebf3a96f2a9050ba33
                                                                          • Opcode Fuzzy Hash: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                                          • Instruction Fuzzy Hash: 9A41A730A042449ACB00DBA988463AE76A55F4930AF5486BBBC04D7393CB7D8E1D875F
                                                                          APIs
                                                                          • GetCapture.USER32 ref: 00422EB4
                                                                          • GetCapture.USER32 ref: 00422EC3
                                                                          • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EC9
                                                                          • ReleaseCapture.USER32 ref: 00422ECE
                                                                          • GetActiveWindow.USER32 ref: 00422EDD
                                                                          • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F5C
                                                                          • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FC0
                                                                          • GetActiveWindow.USER32 ref: 00422FCF
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                          • String ID:
                                                                          • API String ID: 862346643-0
                                                                          • Opcode ID: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                                          • Instruction ID: 0c1e69f79f034fd7694da938dfb4ae80f60ee9794ae3f0b0e2c785ff7ec3c7d8
                                                                          • Opcode Fuzzy Hash: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                                          • Instruction Fuzzy Hash: E4413F70B00254AFDB10EB6ADA42B9A77F1EF44304F5540BAF500AB392DB78AE40DB5D
                                                                          APIs
                                                                          • GetWindowLongA.USER32(?,000000F0), ref: 0042F2CA
                                                                          • GetWindowLongA.USER32(?,000000EC), ref: 0042F2E1
                                                                          • GetActiveWindow.USER32 ref: 0042F2EA
                                                                          • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F317
                                                                          • SetActiveWindow.USER32(?,0042F447,00000000,?), ref: 0042F338
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ActiveLong$Message
                                                                          • String ID:
                                                                          • API String ID: 2785966331-0
                                                                          • Opcode ID: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                                          • Instruction ID: 0493a3c03df3966e51b4b777c60d25e7c68e0b9e8cdf2dbcd65ae894a3a71964
                                                                          • Opcode Fuzzy Hash: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                                          • Instruction Fuzzy Hash: 7631B471A00654AFDB01EFB5DC52E6EBBB8EB09714B91447AF804E3691D738AD10CB58
                                                                          APIs
                                                                          • 73A1A570.USER32(00000000), ref: 0042949A
                                                                          • GetTextMetricsA.GDI32(00000000), ref: 004294A3
                                                                            • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                          • SelectObject.GDI32(00000000,00000000), ref: 004294B2
                                                                          • GetTextMetricsA.GDI32(00000000,?), ref: 004294BF
                                                                          • SelectObject.GDI32(00000000,00000000), ref: 004294C6
                                                                          • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004294CE
                                                                          • GetSystemMetrics.USER32(00000006), ref: 004294F3
                                                                          • GetSystemMetrics.USER32(00000006), ref: 0042950D
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                                          • String ID:
                                                                          • API String ID: 361401722-0
                                                                          • Opcode ID: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                                          • Instruction ID: f9189b99ec718bdc55f682ba078bc6b9c4dab98ca430e676b6dc028aca6f8884
                                                                          • Opcode Fuzzy Hash: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                                          • Instruction Fuzzy Hash: 3301E1917087513BFB11B67A9CC2F6B61C8CB8435CF44043FFA459A3D2D96C9C80866A
                                                                          APIs
                                                                          • 73A1A570.USER32(00000000,?,00419069,004985AE), ref: 0041DE37
                                                                          • 73A24620.GDI32(00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE41
                                                                          • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE4E
                                                                          • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE5D
                                                                          • GetStockObject.GDI32(00000007), ref: 0041DE6B
                                                                          • GetStockObject.GDI32(00000005), ref: 0041DE77
                                                                          • GetStockObject.GDI32(0000000D), ref: 0041DE83
                                                                          • LoadIconA.USER32(00000000,00007F00), ref: 0041DE94
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ObjectStock$A24620A480A570IconLoad
                                                                          • String ID:
                                                                          • API String ID: 3573811560-0
                                                                          • Opcode ID: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                                          • Instruction ID: 4e0a0a69a1fbcc37fa68332f5170e2556ef2fd96a8c36c1a21edcb526b0e3b4b
                                                                          • Opcode Fuzzy Hash: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                                          • Instruction Fuzzy Hash: E11100B06457015AE740FF666A92BA63694D724708F00813FF605AF3D2D7792C449B9E
                                                                          APIs
                                                                          • LoadCursorA.USER32(00000000,00007F02), ref: 004636B0
                                                                          • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463745), ref: 004636B6
                                                                          • SetCursor.USER32(?,0046372D,00007F02,00000000,00463745), ref: 00463720
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Cursor$Load
                                                                          • String ID: $ $Internal error: Item already expanding
                                                                          • API String ID: 1675784387-1948079669
                                                                          • Opcode ID: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                                          • Instruction ID: 5f7148262a90782ca5f39c73a98182432cf514ee5891adbc4e31059349ad3c9c
                                                                          • Opcode Fuzzy Hash: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                                          • Instruction Fuzzy Hash: EEB19270600284DFD710DF29C585B9ABBF1AF04319F14C4AAE8459B792E778EE48CF5A
                                                                          APIs
                                                                          • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: PrivateProfileStringWrite
                                                                          • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                          • API String ID: 390214022-3304407042
                                                                          • Opcode ID: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                                          • Instruction ID: f7f3e57e327ad0b7fc32dd9a0c0ef844c3cf52932767352b59a94e8a2e0b7a1e
                                                                          • Opcode Fuzzy Hash: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                                          • Instruction Fuzzy Hash: 0E910534E001099BDB01EFA5D842BDEB7F5EF4874AF50806AE90077292D7786E49CB59
                                                                          APIs
                                                                          • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476BC5
                                                                          • 73A259E0.USER32(00000000,000000FC,00476B20,00000000,00476E04,?,00000000,00476E2E), ref: 00476BEC
                                                                          • GetACP.KERNEL32(00000000,00476E04,?,00000000,00476E2E), ref: 00476C29
                                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476C6F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A259ClassInfoMessageSend
                                                                          • String ID: COMBOBOX$Inno Setup: Language
                                                                          • API String ID: 3217714596-4234151509
                                                                          • Opcode ID: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                                          • Instruction ID: 76a62d5c2b18ddabed1a1f2db415f61daf58d6c828ad3828204ddc2489713d7e
                                                                          • Opcode Fuzzy Hash: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                                          • Instruction Fuzzy Hash: 4E813C346006059FC720DF69C985AEAB7F2FB09304F1580BAE849E7762D738ED41CB59
                                                                          APIs
                                                                          • GetSystemDefaultLCID.KERNEL32(00000000,00408970,?,?,?,?,00000000,00000000,00000000,?,00409977,00000000,0040998A), ref: 00408742
                                                                            • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                            • Part of subcall function 004085BC: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087BE,?,?,?,00000000,00408970), ref: 004085CF
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: InfoLocale$DefaultSystem
                                                                          • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                          • API String ID: 1044490935-665933166
                                                                          • Opcode ID: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                                          • Instruction ID: bf07bec6589cb82417a29d9109d5e68838e6a5c97ac1b9e4b464d3d1e075229e
                                                                          • Opcode Fuzzy Hash: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                                          • Instruction Fuzzy Hash: 55513E24B00108ABD701FBA69E41A9E77A9DB94304F50C07FA541BB3C7DA3DDE05975D
                                                                          APIs
                                                                          • GetVersion.KERNEL32(00000000,00411909), ref: 0041179C
                                                                          • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041185A
                                                                            • Part of subcall function 00411ABC: CreatePopupMenu.USER32 ref: 00411AD6
                                                                          • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118E6
                                                                            • Part of subcall function 00411ABC: CreateMenu.USER32 ref: 00411AE0
                                                                          • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118CD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                          • String ID: ,$?
                                                                          • API String ID: 2359071979-2308483597
                                                                          • Opcode ID: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                                          • Instruction ID: df95c3f439c97799bb0998fa3429798e8a176efd4e8e18b788060c5868d8049e
                                                                          • Opcode Fuzzy Hash: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                                          • Instruction Fuzzy Hash: BA51F674A00144ABDB10EF6ADC816DA7BF9AF09304B11857BF914E73A6E738DD41CB58
                                                                          APIs
                                                                          • GetObjectA.GDI32(?,00000018,?), ref: 0041BF38
                                                                          • GetObjectA.GDI32(?,00000018,?), ref: 0041BF47
                                                                          • GetBitmapBits.GDI32(?,?,?), ref: 0041BF98
                                                                          • GetBitmapBits.GDI32(?,?,?), ref: 0041BFA6
                                                                          • DeleteObject.GDI32(?), ref: 0041BFAF
                                                                          • DeleteObject.GDI32(?), ref: 0041BFB8
                                                                          • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFD5
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                          • String ID:
                                                                          • API String ID: 1030595962-0
                                                                          • Opcode ID: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                                          • Instruction ID: 0934d86ca8fb123134a847d885dc0ae0ba41a9d0998c4bba382ea8cf266d8dc0
                                                                          • Opcode Fuzzy Hash: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                                          • Instruction Fuzzy Hash: 5A510571E00219AFCB14DFA9C8819EEBBF9EF48314B11442AF914E7391D738AD81CB64
                                                                          APIs
                                                                          • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CF0E
                                                                          • 73A24620.GDI32(00000000,00000026), ref: 0041CF2D
                                                                          • 73A18830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CF93
                                                                          • 73A122A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CFA2
                                                                          • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D00C
                                                                          • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D04A
                                                                          • 73A18830.GDI32(?,?,00000001,0041D07C,00000000,00000026), ref: 0041D06F
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Stretch$A18830$A122A24620BitsMode
                                                                          • String ID:
                                                                          • API String ID: 430401518-0
                                                                          • Opcode ID: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                                          • Instruction ID: 415929d19c0355200a34ec50ec85ee50bdb26205500aadc12dd1df5ccaef5bc8
                                                                          • Opcode Fuzzy Hash: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                                          • Instruction Fuzzy Hash: 7A514EB0604200AFD714DFA9C995F9BBBF9EF08304F10859AB549DB292C779ED81CB58
                                                                          APIs
                                                                          • SendMessageA.USER32(00000000,?,?), ref: 00457166
                                                                            • Part of subcall function 0042428C: GetWindowTextA.USER32(?,?,00000100), ref: 004242AC
                                                                            • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                            • Part of subcall function 0041EEB4: 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                            • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004571CD
                                                                          • TranslateMessage.USER32(?), ref: 004571EB
                                                                          • DispatchMessageA.USER32(?), ref: 004571F4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Message$TextWindow$A25940CurrentDispatchSendThreadTranslate
                                                                          • String ID: [Paused]
                                                                          • API String ID: 3047529653-4230553315
                                                                          • Opcode ID: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                                          • Instruction ID: cc82e29175726c0716c689c1ffa83d11e9869aeff1ced20ba9c80888b84e3111
                                                                          • Opcode Fuzzy Hash: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                                          • Instruction Fuzzy Hash: 013196309082489EDB11DBB5EC81FDEBBB8DB49314F5540B7F800E7292D67C9909CB69
                                                                          APIs
                                                                          • GetCursor.USER32(00000000,0046B897), ref: 0046B814
                                                                          • LoadCursorA.USER32(00000000,00007F02), ref: 0046B822
                                                                          • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B897), ref: 0046B828
                                                                          • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B832
                                                                          • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B838
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Cursor$LoadSleep
                                                                          • String ID: CheckPassword
                                                                          • API String ID: 4023313301-1302249611
                                                                          • Opcode ID: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                                          • Instruction ID: aec6a0205c5a75bc54f0fc291e1a1f9730d999611bc1887dd1e74dc6007ab6bd
                                                                          • Opcode Fuzzy Hash: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                                          • Instruction Fuzzy Hash: 333164346406049FD711EB69C889F9E7BE4EF49304F5580B6F844DB3A2D778AD40CB99
                                                                          APIs
                                                                            • Part of subcall function 00477AB0: GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                                            • Part of subcall function 00477AB0: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                                            • Part of subcall function 00477AB0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                                          • SendMessageA.USER32(00000000,0000004A,00000000,00477F42), ref: 00477BBD
                                                                          • GetTickCount.KERNEL32 ref: 00477C02
                                                                          • GetTickCount.KERNEL32 ref: 00477C0C
                                                                          • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477C61
                                                                          Strings
                                                                          • CallSpawnServer: Unexpected response: $%x, xrefs: 00477BF2
                                                                          • CallSpawnServer: Unexpected status: %d, xrefs: 00477C4A
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                          • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                          • API String ID: 613034392-3771334282
                                                                          • Opcode ID: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                                          • Instruction ID: 65d184c56696bd8d6baefe4a5ac293f093c2dd543b1706e930bc299cdf77f89e
                                                                          • Opcode Fuzzy Hash: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                                          • Instruction Fuzzy Hash: B131A474B042149ADB11EBB988867EEB6A09F48304F90C47AF548EB392D67C9E41879D
                                                                          APIs
                                                                          • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 00459BA3
                                                                          Strings
                                                                          • Fusion.dll, xrefs: 00459B43
                                                                          • .NET Framework CreateAssemblyCache function failed, xrefs: 00459BC6
                                                                          • CreateAssemblyCache, xrefs: 00459B9A
                                                                          • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 00459BAE
                                                                          • Failed to load .NET Framework DLL "%s", xrefs: 00459B88
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc
                                                                          • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                          • API String ID: 190572456-3990135632
                                                                          • Opcode ID: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                                          • Instruction ID: 1db31b6b51e2e068c3f61674d824012408e1fbc1d182cf764eafebb5ab4ea00f
                                                                          • Opcode Fuzzy Hash: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                                          • Instruction Fuzzy Hash: EF318970E00619EBDB01EFA5C88169EB7B8AF44315F50857BE814E7382D738AE09C799
                                                                          APIs
                                                                            • Part of subcall function 0041C058: GetObjectA.GDI32(?,00000018), ref: 0041C065
                                                                          • GetFocus.USER32 ref: 0041C178
                                                                          • 73A1A570.USER32(?), ref: 0041C184
                                                                          • 73A18830.GDI32(?,?,00000000,00000000,0041C203,?,?), ref: 0041C1A5
                                                                          • 73A122A0.GDI32(?,?,?,00000000,00000000,0041C203,?,?), ref: 0041C1B1
                                                                          • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1C8
                                                                          • 73A18830.GDI32(?,00000000,00000000,0041C20A,?,?), ref: 0041C1F0
                                                                          • 73A1A480.USER32(?,?,0041C20A,?,?), ref: 0041C1FD
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A18830$A122A480A570BitsFocusObject
                                                                          • String ID:
                                                                          • API String ID: 2231653193-0
                                                                          • Opcode ID: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                                          • Instruction ID: a51b9c7cee13939b32e911f1849152ebfa7eb0d73570b73294f05c7218cf190f
                                                                          • Opcode Fuzzy Hash: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                                          • Instruction Fuzzy Hash: A0116A71E40609BBDB10DBE9CC85FAFBBFCEF48700F54446AB518E7281D67899008B28
                                                                          APIs
                                                                          • GetSystemMetrics.USER32(0000000E), ref: 00418C80
                                                                          • GetSystemMetrics.USER32(0000000D), ref: 00418C88
                                                                          • 6F532980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C8E
                                                                            • Part of subcall function 004099C0: 6F52C400.COMCTL32(0049B628,000000FF,00000000,00418CBC,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004099C4
                                                                          • 6F59CB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CDE
                                                                          • 6F59C740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CE9
                                                                          • 6F59CB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000), ref: 00418CFC
                                                                          • 6F530860.COMCTL32(0049B628,00418D1F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E), ref: 00418D12
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: MetricsSystem$C400C740F530860F532980
                                                                          • String ID:
                                                                          • API String ID: 209721339-0
                                                                          • Opcode ID: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                                          • Instruction ID: e0b43fe86d74620756cf035266125a11838772e9d6ef4bcae2e69295d5b8951d
                                                                          • Opcode Fuzzy Hash: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                                          • Instruction Fuzzy Hash: A11149B1744204BBEB10EBA9DC83F5E73B8DB48704F6044BAB604E72D2DB799D409759
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004837A4), ref: 00483789
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpen
                                                                          • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                          • API String ID: 47109696-2530820420
                                                                          • Opcode ID: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                                          • Instruction ID: 8316402a246994b7737153b66ed252a9f16b12b2be78e08e0fa98e077eb8f510
                                                                          • Opcode Fuzzy Hash: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                                          • Instruction Fuzzy Hash: 0311B1B4704244AADB10FF65CC52B5E7AE9DB41B19F60C87BA400A7282EB38CA05875C
                                                                          APIs
                                                                          • 73A1A570.USER32(00000000,?,?,00000000), ref: 00494EE9
                                                                            • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00494F0B
                                                                          • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495489), ref: 00494F1F
                                                                          • GetTextMetricsA.GDI32(00000000,?), ref: 00494F41
                                                                          • 73A1A480.USER32(00000000,00000000,00494F6B,00494F64,?,00000000,?,?,00000000), ref: 00494F5E
                                                                          Strings
                                                                          • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00494F16
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                          • API String ID: 1435929781-222967699
                                                                          • Opcode ID: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                                          • Instruction ID: 6f18d4fe6cef93123b0455e30b82395b7dbfc0c8f911bccc88a8e51c4d6277b1
                                                                          • Opcode Fuzzy Hash: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                                          • Instruction Fuzzy Hash: 95018476A04609BFEB00DBA9CC41F5EB7ECDB89704F51447AB600E7281D678AE018B28
                                                                          APIs
                                                                          • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                          • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                          • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                          • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                          • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                          • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                          • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ObjectSelect$Delete$Stretch
                                                                          • String ID:
                                                                          • API String ID: 1458357782-0
                                                                          • Opcode ID: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                                          • Instruction ID: 28529174ed8a1a36c66279ad8c479dcd7ed434ba0fbaa502c63cdd0cc078bbc5
                                                                          • Opcode Fuzzy Hash: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                                          • Instruction Fuzzy Hash: A1114C72E40559ABDF10D6D9D885FAFB3BCEF08704F048456B614FB241C678A8418B54
                                                                          APIs
                                                                          • GetCursorPos.USER32 ref: 004233BF
                                                                          • WindowFromPoint.USER32(?,?), ref: 004233CC
                                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233DA
                                                                          • GetCurrentThreadId.KERNEL32 ref: 004233E1
                                                                          • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233FA
                                                                          • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423411
                                                                          • SetCursor.USER32(00000000), ref: 00423423
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                          • String ID:
                                                                          • API String ID: 1770779139-0
                                                                          • Opcode ID: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                                          • Instruction ID: 219e0d69ac6b6a38dcb61baa39fbc914f783b163521ae56cddb293ea60412e1c
                                                                          • Opcode Fuzzy Hash: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                                          • Instruction Fuzzy Hash: E601D42230472036D6217B795C86E2F26A8CFC5B15F50457FB649BB283DA3D8C0063BD
                                                                          APIs
                                                                          • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                          • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                          • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                          • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                          • String ID: )a$=a
                                                                          • API String ID: 730355536-1008144910
                                                                          • Opcode ID: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                          • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                                          • Opcode Fuzzy Hash: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                          • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(user32.dll), ref: 00494D0C
                                                                          • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00494D19
                                                                          • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00494D26
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleModule
                                                                          • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                          • API String ID: 667068680-2254406584
                                                                          • Opcode ID: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                                          • Instruction ID: 42226921e916c2e61715a17367c32eae2b2292ab525ca03b869d6a68ec0a34c4
                                                                          • Opcode Fuzzy Hash: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                                          • Instruction Fuzzy Hash: 6CF0F69AB41B1466DA2025B68C81F7B698CCFD1B71F050337BE04A7382ED9D8D0642AD
                                                                          APIs
                                                                          • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D9F5
                                                                          • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045DA05
                                                                          • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045DA15
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc
                                                                          • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                          • API String ID: 190572456-212574377
                                                                          • Opcode ID: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                                          • Instruction ID: e47ea2fb967bc5a05fa6d8d3c64fcba096cc564050e4d812c51f788cc71ed1ca
                                                                          • Opcode Fuzzy Hash: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                                          • Instruction Fuzzy Hash: 2BF030B0D05300DFEB24DFB29CC372336959BA4316F14803B9A0D96267D278088CCE2C
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,00480D8E), ref: 0042EA45
                                                                          • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA4B
                                                                          • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA5C
                                                                            • Part of subcall function 0042E9BC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                                            • Part of subcall function 0042E9BC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                            • Part of subcall function 0042E9BC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                                          • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA70
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                          • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                          • API String ID: 142928637-2676053874
                                                                          • Opcode ID: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                                          • Instruction ID: 2c8c4e1fda890c3dedf4e0e73620de090a3a9d5666271f16a874a7bcdd66483b
                                                                          • Opcode Fuzzy Hash: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                                          • Instruction Fuzzy Hash: 52E092A1741720EAEA10B7B67CC6F9A2668E714729F54403BF100A51E1C3BD1C80CE9E
                                                                          APIs
                                                                          • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F099), ref: 0044C7FB
                                                                          • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C80C
                                                                          • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C81C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$LibraryLoad
                                                                          • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                          • API String ID: 2238633743-1050967733
                                                                          • Opcode ID: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                                          • Instruction ID: d5a6e329c062b47ae4ba9e11e7719f1ec1b45dd3e70fac445fdcae0b1af11dcb
                                                                          • Opcode Fuzzy Hash: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                                          • Instruction Fuzzy Hash: 64F0FE70246305CAFB50BBB5FDC67223694E3A4B0AF18137BE40156192D7BC4444CF4C
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                                          • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                                          • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleModule
                                                                          • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                          • API String ID: 667068680-222143506
                                                                          • Opcode ID: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                                          • Instruction ID: 8ade474bf949b7c868f23be577f60042bf37b8b7e1302e6d2b868e4e2d48ad49
                                                                          • Opcode Fuzzy Hash: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                                          • Instruction Fuzzy Hash: D4C0E9F0AC1740EEAA00E7F15CDAD762558D514B34724943F754DAA193D97D58044A2C
                                                                          APIs
                                                                          • GetFocus.USER32 ref: 0041B58E
                                                                          • 73A1A570.USER32(?,00000000,0041B668,?,?,?,?), ref: 0041B59A
                                                                          • 73A24620.GDI32(?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5B6
                                                                          • 73A4E680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5D3
                                                                          • 73A4E680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668), ref: 0041B5EA
                                                                          • 73A1A480.USER32(?,?,0041B643,?,?), ref: 0041B636
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: E680$A24620A480A570Focus
                                                                          • String ID:
                                                                          • API String ID: 3709697839-0
                                                                          • Opcode ID: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                                          • Instruction ID: 7d41d09f6123fe0998bcf531a8d6f09bc5b1e179d78523dd82c4b1b978091a2c
                                                                          • Opcode Fuzzy Hash: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                                          • Instruction Fuzzy Hash: 7E41D571A04254AFDB10DFA9C886EAFBBB4EB55704F1484AAF500EB351D3389D11CBA5
                                                                          APIs
                                                                          • SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                                          • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D4E8,?,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D45A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                          • API String ID: 1452528299-1580325520
                                                                          • Opcode ID: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                                          • Instruction ID: bfdb5615fdc952ab51c5d4d36cfcdc52ba3649a349ed7733e19bd606ff263fd4
                                                                          • Opcode Fuzzy Hash: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                                          • Instruction Fuzzy Hash: A6117835A04204ABD731DE95C941A5E76DCDF46306F608077AD0596283D67C6F0A952A
                                                                          APIs
                                                                          • GetSystemMetrics.USER32(0000000B), ref: 0041BDE5
                                                                          • GetSystemMetrics.USER32(0000000C), ref: 0041BDEF
                                                                          • 73A1A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDF9
                                                                          • 73A24620.GDI32(00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE20
                                                                          • 73A24620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE2D
                                                                          • 73A1A480.USER32(00000000,00000000,0041BE73,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE66
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A24620MetricsSystem$A480A570
                                                                          • String ID:
                                                                          • API String ID: 4042297458-0
                                                                          • Opcode ID: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                                          • Instruction ID: cee0947e7f2791638d7e7c91bd9cc57ffb528c4a132e606019bcc307a049f0f1
                                                                          • Opcode Fuzzy Hash: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                                          • Instruction Fuzzy Hash: 40212C74E046499FEB00EFA9C982BEEB7B4EB48714F10842AF514B7781D7785940CBA9
                                                                          APIs
                                                                          • GetWindowLongA.USER32(?,000000EC), ref: 0047E272
                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CFF1), ref: 0047E298
                                                                          • GetWindowLongA.USER32(?,000000EC), ref: 0047E2A8
                                                                          • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E2C9
                                                                          • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E2DD
                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E2F9
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Long$Show
                                                                          • String ID:
                                                                          • API String ID: 3609083571-0
                                                                          • Opcode ID: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                                          • Instruction ID: 64a3e6c2176d4acc74ea6130292171d5cd043058eec335b926c35577e1896bc6
                                                                          • Opcode Fuzzy Hash: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                                          • Instruction Fuzzy Hash: DE010CB5651210ABE600D769DE41F66379CAB0D334F0503AAB959DF2E3C729EC009B49
                                                                          APIs
                                                                            • Part of subcall function 0041A6F0: CreateBrushIndirect.GDI32 ref: 0041A75B
                                                                          • UnrealizeObject.GDI32(00000000), ref: 0041B28C
                                                                          • SelectObject.GDI32(?,00000000), ref: 0041B29E
                                                                          • SetBkColor.GDI32(?,00000000), ref: 0041B2C1
                                                                          • SetBkMode.GDI32(?,00000002), ref: 0041B2CC
                                                                          • SetBkColor.GDI32(?,00000000), ref: 0041B2E7
                                                                          • SetBkMode.GDI32(?,00000001), ref: 0041B2F2
                                                                            • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                          • String ID:
                                                                          • API String ID: 3527656728-0
                                                                          • Opcode ID: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                                          • Instruction ID: 5f3c9a08814bcb0dec11b684bd4148c9aa8da507e688bf70d4fc6563dceee2e6
                                                                          • Opcode Fuzzy Hash: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                                          • Instruction Fuzzy Hash: 7EF0C2B1651501ABCE00FFBAD9CAE4B37A89F043097088057B544DF197C97CD8548B3D
                                                                          APIs
                                                                            • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                          • ShowWindow.USER32(?,00000005,00000000,00497991,?,?,00000000), ref: 00497762
                                                                            • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                            • Part of subcall function 004072B0: SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                                            • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                          • String ID: .dat$.msg$IMsg$Uninstall
                                                                          • API String ID: 3312786188-1660910688
                                                                          • Opcode ID: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                                          • Instruction ID: bbf2e7f3574d42a9113524bdb42c94a944b0e97273f2a70b882bd080beededf8
                                                                          • Opcode Fuzzy Hash: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                                          • Instruction Fuzzy Hash: 8E318F74A10214AFDB00EF65DC82D6E7BB5EB89318B51847AF800AB392D739BD01CB58
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EAEA
                                                                          • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAF0
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB19
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                          • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                          • API String ID: 828529508-2866557904
                                                                          • Opcode ID: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                                          • Instruction ID: f5c55ae169209784706469d1b6e96428d25835975ad7b3a5622eb1d8c2489c6d
                                                                          • Opcode Fuzzy Hash: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                                          • Instruction Fuzzy Hash: 2DF022E078062136E620E2BFACC3F6B498C8FA0725F040436F009EA2C2E92C9900422E
                                                                          APIs
                                                                          • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00457E64
                                                                          • GetExitCodeProcess.KERNEL32(?,00498116), ref: 00457E85
                                                                          • CloseHandle.KERNEL32(?,00457EB8,?,?,004586D3,00000000,00000000), ref: 00457EAB
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                          • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                          • API String ID: 2573145106-3235461205
                                                                          • Opcode ID: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                                          • Instruction ID: 6a931132ee958b8202ab537f65b64b7fb4871f4dbf11571726e28c2ddef09419
                                                                          • Opcode Fuzzy Hash: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                                          • Instruction Fuzzy Hash: 1101A735604704AFDB11EB999D43A1E77A8DB49711F5004B6FC10E73D3D63C9D048618
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                                          • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                          • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                          • String ID: ChangeWindowMessageFilter$user32.dll
                                                                          • API String ID: 3478007392-2498399450
                                                                          • Opcode ID: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                                          • Instruction ID: 5ef4959e42d5312267b3952f4de6be483a2b5690063b138e9708ef51bd19b1c3
                                                                          • Opcode Fuzzy Hash: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                                          • Instruction Fuzzy Hash: A3E0ECB1741314EADA106B62BECBF5A2558E724B15F54043BF101751F2C7BD2C80C95E
                                                                          APIs
                                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                                          • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                                          • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                          • String ID: AllowSetForegroundWindow$user32.dll
                                                                          • API String ID: 1782028327-3855017861
                                                                          • Opcode ID: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                                          • Instruction ID: 8233eca9c26ae86130ab8a2651ceb45e7b9436c82c984da63702dcb6f06a18e2
                                                                          • Opcode Fuzzy Hash: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                                          • Instruction Fuzzy Hash: 27D0A7A0208300A6ED10F3F14C47E6F224C8D847587A4C43B7404E3182CABCE900993C
                                                                          APIs
                                                                          • BeginPaint.USER32(00000000,?), ref: 00416C62
                                                                          • SaveDC.GDI32(?), ref: 00416C93
                                                                          • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D55), ref: 00416CF4
                                                                          • RestoreDC.GDI32(?,?), ref: 00416D1B
                                                                          • EndPaint.USER32(00000000,?,00416D5C,00000000,00416D55), ref: 00416D4F
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                          • String ID:
                                                                          • API String ID: 3808407030-0
                                                                          • Opcode ID: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                                          • Instruction ID: c70ebf24aed337d2f43398dc79d2f74fb7d9fd2825851e0a0ce007a429ecfdc3
                                                                          • Opcode Fuzzy Hash: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                                          • Instruction Fuzzy Hash: D7413C70A04204AFDB04DB99D985FAE77F9EB48304F1640AEE4059B362D778ED85CB58
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                          • Instruction ID: fc599d946787c0506e623d191f8eefd10b4a308858d20a9272ac2d3790a9447e
                                                                          • Opcode Fuzzy Hash: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                          • Instruction Fuzzy Hash: A1314F746047449FC320EF69C984BABB7E8AF89314F04891EF9D9C3752C638EC858B19
                                                                          APIs
                                                                          • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429818
                                                                          • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429847
                                                                          • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429863
                                                                          • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042988E
                                                                          • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 004298AC
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID:
                                                                          • API String ID: 3850602802-0
                                                                          • Opcode ID: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                                          • Instruction ID: c447c4a9eb68fcc7219df142ffdb21218ba7f26748626b58278b549ffff81a32
                                                                          • Opcode Fuzzy Hash: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                                          • Instruction Fuzzy Hash: 3321AF707507057AE710BB66CC82F5B76ACEB42708F94043EB541AB2D2DF78ED41825C
                                                                          APIs
                                                                          • GetSystemMetrics.USER32(0000000B), ref: 0041BBDA
                                                                          • GetSystemMetrics.USER32(0000000C), ref: 0041BBE4
                                                                          • 73A1A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC22
                                                                          • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BD8D,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC69
                                                                          • DeleteObject.GDI32(00000000), ref: 0041BCAA
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: MetricsSystem$A26310A570DeleteObject
                                                                          • String ID:
                                                                          • API String ID: 4277397052-0
                                                                          • Opcode ID: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                                          • Instruction ID: d912de8c3c57523408de13a46bdb54385142bc6a2202aaac6113f7462e2bca5d
                                                                          • Opcode Fuzzy Hash: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                                          • Instruction Fuzzy Hash: CE314F74E00209EFDB04DFA5C941AAEB7F5EB48700F11856AF514AB381D7789E40DB98
                                                                          APIs
                                                                            • Part of subcall function 0045D3B0: SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                                          • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738D5
                                                                          • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738EB
                                                                          Strings
                                                                          • Failed to set permissions on registry key (%d)., xrefs: 004738FC
                                                                          • Setting permissions on registry key: %s\%s, xrefs: 0047389A
                                                                          • Could not set permissions on the registry key because it currently does not exist., xrefs: 004738DF
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                          • API String ID: 1452528299-4018462623
                                                                          • Opcode ID: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                                          • Instruction ID: 0e56c8fb080e82cb73bff42131c1910bc7e2d1be1188aa0d4929b19add272574
                                                                          • Opcode Fuzzy Hash: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                                          • Instruction Fuzzy Hash: D42186B0A046485FCB00DFA9C8816EEBBE5DF49315F50817BE508E7392D7B85A05CB6A
                                                                          APIs
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                          • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide$AllocString
                                                                          • String ID:
                                                                          • API String ID: 262959230-0
                                                                          • Opcode ID: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                                          • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                          • Opcode Fuzzy Hash: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                                          • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                          APIs
                                                                          • 73A18830.GDI32(00000000,00000000,00000000), ref: 00414429
                                                                          • 73A122A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414431
                                                                          • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414445
                                                                          • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0041444B
                                                                          • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414456
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A122A18830$A480
                                                                          • String ID:
                                                                          • API String ID: 3325508737-0
                                                                          • Opcode ID: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                                          • Instruction ID: 307ee49d89b37f6f535ee678b6e17b633f9af621dfcf88cb872c79a1e2d754b8
                                                                          • Opcode Fuzzy Hash: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                                          • Instruction Fuzzy Hash: A901D47121C3406AD200B63D8C45B9F6BEC8FC6314F05546EF494D7382C97ACC018765
                                                                          APIs
                                                                          • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 0040700B
                                                                          • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00407085
                                                                          • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070DD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Enum$NameOpenResourceUniversal
                                                                          • String ID: Z
                                                                          • API String ID: 3604996873-1505515367
                                                                          • Opcode ID: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                                          • Instruction ID: 2ace50d644c075eff23e32fa5e1ddfe03b8fa53596be5d4ceb5675c655e146ae
                                                                          • Opcode Fuzzy Hash: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                                          • Instruction Fuzzy Hash: C0513070E04218ABDB15DF55CD41A9EBBB9FB49304F1041BAE910BB3D1C778AE418F5A
                                                                          APIs
                                                                          • SetRectEmpty.USER32(?), ref: 0044D05E
                                                                          • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D089
                                                                          • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D111
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: DrawText$EmptyRect
                                                                          • String ID:
                                                                          • API String ID: 182455014-2867612384
                                                                          • Opcode ID: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                                          • Instruction ID: 2c2bbb7fbf4b59eae95d31c7b28000ca71a9f0321ec4255fb332cd8a4a3f7a8e
                                                                          • Opcode Fuzzy Hash: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                                          • Instruction Fuzzy Hash: F6516071E00244AFDB10DFA5C885BDEBBF8AF49308F08847AE845EB255D778A945CB64
                                                                          APIs
                                                                          • 73A1A570.USER32(00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042EFAE
                                                                            • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                          • SelectObject.GDI32(?,00000000), ref: 0042EFD1
                                                                          • 73A1A480.USER32(00000000,?,0042F0BD,00000000,0042F0B6,?,00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000), ref: 0042F0B0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: A480A570CreateFontIndirectObjectSelect
                                                                          • String ID: ...\
                                                                          • API String ID: 2998766281-983595016
                                                                          • Opcode ID: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                                          • Instruction ID: 4ea51e63949933808241df29427b07dd96e06abf1a704ffa26f869fa6ec4a11f
                                                                          • Opcode Fuzzy Hash: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                                          • Instruction Fuzzy Hash: 2F315270B00128ABDF11EF96D841BAEB7B8EB48708FD1447BF410A7292D7785D49CA59
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                                          • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseCreateFileHandle
                                                                          • String ID: .tmp$_iu
                                                                          • API String ID: 3498533004-10593223
                                                                          • Opcode ID: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                                          • Instruction ID: 4fa05f029f2566c48aedd37e5d2d112a05e3774389c58111587f2dbaaee79b9c
                                                                          • Opcode Fuzzy Hash: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                                          • Instruction Fuzzy Hash: 9531A6B0A40149ABCF01EF95C982B9EBBB5AF44345F50452AF800B72C2D6785F058AAD
                                                                          APIs
                                                                          • GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                          • UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                          • RegisterClassA.USER32(?), ref: 004164DE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Class$InfoRegisterUnregister
                                                                          • String ID: @
                                                                          • API String ID: 3749476976-2766056989
                                                                          • Opcode ID: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                                          • Instruction ID: 7ea39428e622c43f80c69b44bdb33f9ce6dea52ad5211df5dc1c1138561595a4
                                                                          • Opcode Fuzzy Hash: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                                          • Instruction Fuzzy Hash: 0E318E706042009BD760EF68C981B9B77E5AB88308F04457FF985DB392DB39D9848B6A
                                                                          APIs
                                                                          • GetFileAttributesA.KERNEL32(00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C50
                                                                          • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C79
                                                                          • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00497C92
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: File$Attributes$Move
                                                                          • String ID: isRS-%.3u.tmp
                                                                          • API String ID: 3839737484-3657609586
                                                                          • Opcode ID: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                                          • Instruction ID: 213244b736f3eff521ec2db090c728ece63042f248bf50699bdf4cb02408e53f
                                                                          • Opcode Fuzzy Hash: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                                          • Instruction Fuzzy Hash: 53214171E14219AFCF05EFA9C881AAFBBB8AB44714F50453BB814B72D1D6385E018B69
                                                                          APIs
                                                                          • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                          • ExitProcess.KERNEL32 ref: 00404E0D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ExitMessageProcess
                                                                          • String ID: Error$Runtime error at 00000000
                                                                          • API String ID: 1220098344-2970929446
                                                                          • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                          • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                                          • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                          • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                                          APIs
                                                                            • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                            • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                            • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                          • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456A88
                                                                          • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456AB5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                          • String ID: LoadTypeLib$RegisterTypeLib
                                                                          • API String ID: 1312246647-2435364021
                                                                          • Opcode ID: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                                          • Instruction ID: 5567ca09ff2ddd9e87874ef4cfa4ab968baaa8f1c3db1669d027a8a21fc87fa6
                                                                          • Opcode Fuzzy Hash: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                                          • Instruction Fuzzy Hash: 20119331B00604AFDB11EFA6CD55A5EB7BDEB8A705B51C4B6BC04E3652DA389E04CB24
                                                                          APIs
                                                                          • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00456FA6
                                                                          • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00457043
                                                                          Strings
                                                                          • Failed to create DebugClientWnd, xrefs: 0045700C
                                                                          • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00456FD2
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                          • API String ID: 3850602802-3720027226
                                                                          • Opcode ID: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                                          • Instruction ID: 61f5065308a022425a12d25e559eb7300ab1b4b0d104b50eccf394a1c4e119f6
                                                                          • Opcode Fuzzy Hash: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                                          • Instruction Fuzzy Hash: 921123706082509BD300AB689C82B5F7BD89B55719F45403BF9859B3C3D7798C08C7AE
                                                                          APIs
                                                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000,00495E13), ref: 00495DDE
                                                                          • CloseHandle.KERNEL32(x^I,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000), ref: 00495DF5
                                                                            • Part of subcall function 00495CC8: GetLastError.KERNEL32(00000000,00495D60,?,?,?,?), ref: 00495CEC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseCreateErrorHandleLastProcess
                                                                          • String ID: D$x^I
                                                                          • API String ID: 3798668922-903578107
                                                                          • Opcode ID: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                                          • Instruction ID: 0d7d1bccb2b79611993d32b5dcf50d38d0c3e5c5098d5d0063742a7482510134
                                                                          • Opcode Fuzzy Hash: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                                          • Instruction Fuzzy Hash: F201A1B1604648AFDF01EBA2DC42E9FBBACDF08704F60003AF904E72C1D6385E008A28
                                                                          APIs
                                                                            • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                          • GetFocus.USER32 ref: 00478673
                                                                          • GetKeyState.USER32(0000007A), ref: 00478685
                                                                          • WaitMessage.USER32(?,00000000,004786AC,?,00000000,004786D3,?,?,00000001,00000000,?,?,?,0047FED4,00000000,00480D8E), ref: 0047868F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: FocusMessageStateTextWaitWindow
                                                                          • String ID: Wnd=$%x
                                                                          • API String ID: 1381870634-2927251529
                                                                          • Opcode ID: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                                          • Instruction ID: ef44951ba698f020dd2967180cd2d6f5e0b89f016f08406409eb47c9a327eab3
                                                                          • Opcode Fuzzy Hash: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                                          • Instruction Fuzzy Hash: 2411A374644244BFC700EF65DD45A9E7BF8EB49714B5184BAF408E3691DB38AE00CA6E
                                                                          APIs
                                                                          • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E8C0
                                                                          • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E8CF
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Time$File$LocalSystem
                                                                          • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                          • API String ID: 1748579591-1013271723
                                                                          • Opcode ID: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                                          • Instruction ID: 5dd70de3b3cbc2db986134396dd9c806d54cb2705fd1511918c86a199fc004ed
                                                                          • Opcode Fuzzy Hash: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                                          • Instruction Fuzzy Hash: 1711F8A440C3919AD340DF2AC44432BBBE4AF89704F44892EF9D8D6381E779C948DB77
                                                                          APIs
                                                                          • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F6F
                                                                            • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                          • MoveFileA.KERNEL32(00000000,00000000), ref: 00453F94
                                                                            • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: File$AttributesDeleteErrorLastMove
                                                                          • String ID: DeleteFile$MoveFile
                                                                          • API String ID: 3024442154-139070271
                                                                          • Opcode ID: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                                          • Instruction ID: b42c41819cc20c1867e4fcb1ab4fb5766129ddbc0fc5112b2d6697d8e42203d6
                                                                          • Opcode Fuzzy Hash: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                                          • Instruction Fuzzy Hash: 49F062716041455AEB01FAA5D84266EA3ECDB8430BFA0403BB800BB6C3DA3C9E09493D
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483685
                                                                          • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004836A8
                                                                          Strings
                                                                          • System\CurrentControlSet\Control\Windows, xrefs: 00483652
                                                                          • CSDVersion, xrefs: 0048367C
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpenQueryValue
                                                                          • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                          • API String ID: 3677997916-1910633163
                                                                          • Opcode ID: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                                          • Instruction ID: 3c550b8be62ae6962ae8a8b2bb2136c6a1766c1456238aff6c9f059f5d92f743
                                                                          • Opcode Fuzzy Hash: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                                          • Instruction Fuzzy Hash: B1F06D75E00208B6DF20EED88C45BAFB3BCAF14B05F204566E910E7381F6789B448B59
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpen
                                                                          • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                          • API String ID: 47109696-2631785700
                                                                          • Opcode ID: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                                          • Instruction ID: 5fc53f2980ca067f7fdefaa7aa50a153e5e830959166a8c5adde0da5508e813c
                                                                          • Opcode Fuzzy Hash: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                                          • Instruction Fuzzy Hash: 97F0AF35720150DBCB10EF5AE885B4E6298DB99396F50403BB985CB263C77CCC06CA99
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B46,00000000,00453BE9,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FD9,00000000), ref: 0042D91A
                                                                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                          • API String ID: 1646373207-4063490227
                                                                          • Opcode ID: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                                          • Instruction ID: 1097081faf8e12b72459453f22f39748745641366cc83a46a0cb0e3cd7246884
                                                                          • Opcode Fuzzy Hash: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                                          • Instruction Fuzzy Hash: 5FE04FE1B40B1112D71066BA5C82B6B158E4B84724F90443B3994E62C3DDBCD9885A5D
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAE0), ref: 0042EB72
                                                                          • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB78
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                          • API String ID: 1646373207-260599015
                                                                          • Opcode ID: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                                          • Instruction ID: 186c8a8b24504359f9bd95d8817b94a00a7cf61d77d8ea7090d5fad6c77db3b3
                                                                          • Opcode Fuzzy Hash: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                                          • Instruction Fuzzy Hash: 1CD0C792312732666D10F1F73CD1DBB098C89116753544477F505E5241D55DDD01196D
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                                          • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: NotifyWinEvent$user32.dll
                                                                          • API String ID: 1646373207-597752486
                                                                          • Opcode ID: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                                          • Instruction ID: adaf68bc035e952e092e397114f6a1653fed54d9058db7208dfb757fc5d15743
                                                                          • Opcode Fuzzy Hash: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                                          • Instruction Fuzzy Hash: F7E012F4E417049DEF00BBF5BA86B1E3A90E764718B01417FF404A62A2DB7C440C8E5D
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                                          • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                          • API String ID: 1646373207-834958232
                                                                          • Opcode ID: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                                          • Instruction ID: 7eda4cb16e2cba450c320cc229382d7be1fc12bfd2fbc27455de3eb8489cf644
                                                                          • Opcode Fuzzy Hash: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                                          • Instruction Fuzzy Hash: 88B092C128174298AC7032FA0C02A1F08084882F28718083F3C48F50C2CD6ED804182D
                                                                          APIs
                                                                            • Part of subcall function 0044B668: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                                            • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                                          • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                                          • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$LibraryLoad
                                                                          • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                          • API String ID: 2238633743-2683653824
                                                                          • Opcode ID: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                                          • Instruction ID: ef62b78e1ecbbf86accf82cc5e54c74759ffbda80f6f2c7107c350d82a6c33f4
                                                                          • Opcode Fuzzy Hash: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                                          • Instruction Fuzzy Hash: 48B092E06E2700A88E00B7FA2887B0B104895D0B1DB56063F704979092EB7C4008CD6E
                                                                          APIs
                                                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,0000001D,00000000,?,0047D70E), ref: 0047D484
                                                                          • FindClose.KERNEL32(000000FF,0047D4AF,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,0000001D,00000000,?,0047D70E,00000000), ref: 0047D4A2
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Find$CloseFileNext
                                                                          • String ID:
                                                                          • API String ID: 2066263336-0
                                                                          • Opcode ID: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                                          • Instruction ID: 2979fa4f850f67a6d1e6d53d287e6b8f4dfe67a5ddfa55c2aaa4ecb03bfc0e13
                                                                          • Opcode Fuzzy Hash: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                                          • Instruction Fuzzy Hash: CA812D70D0024DAFDF11DFA5CC55ADFBBB9EF49308F5080AAE808A7291D6399A46CF54
                                                                          APIs
                                                                            • Part of subcall function 0042EE40: GetTickCount.KERNEL32 ref: 0042EE46
                                                                            • Part of subcall function 0042EC98: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECCD
                                                                          • GetLastError.KERNEL32(00000000,00475991,?,?,0049C1D0,00000000), ref: 0047587A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CountErrorFileLastMoveTick
                                                                          • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                          • API String ID: 2406187244-2685451598
                                                                          • Opcode ID: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                                          • Instruction ID: 8ae0701305b01ce1bca9537847079d861391bf026d2cb8563746cd807755024f
                                                                          • Opcode Fuzzy Hash: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                                          • Instruction Fuzzy Hash: BB4166B0A006098FDB10EFA5D882ADE77B5EF48314F60853BE514BB351D7789A058BA9
                                                                          APIs
                                                                          • GetDesktopWindow.USER32 ref: 00413D56
                                                                          • GetDesktopWindow.USER32 ref: 00413E0E
                                                                            • Part of subcall function 00418ED0: 6F59C6F0.COMCTL32(?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418EEC
                                                                            • Part of subcall function 00418ED0: ShowCursor.USER32(00000001,?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418F09
                                                                          • SetCursor.USER32(00000000,?,?,?,?,00413B03,00000000,00413B16), ref: 00413E4C
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CursorDesktopWindow$Show
                                                                          • String ID:
                                                                          • API String ID: 2074268717-0
                                                                          • Opcode ID: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                                          • Instruction ID: 95de96b99ba854305cf3f6c98da1fc171ffd9c3687d173b50ed20deed18b133b
                                                                          • Opcode Fuzzy Hash: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                                          • Instruction Fuzzy Hash: 59411F75600250AFC710DF2AFA85B5677E1EB64319F15817BE404CB365DB38AD81CF98
                                                                          APIs
                                                                          • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A7D
                                                                          • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AEC
                                                                          • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B87
                                                                          • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BC6
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: LoadString$FileMessageModuleName
                                                                          • String ID:
                                                                          • API String ID: 704749118-0
                                                                          • Opcode ID: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                                          • Instruction ID: 11344639af0fa1b95b6fef638a25282c94d515b30ba3ed4b3402aedba36e13da
                                                                          • Opcode Fuzzy Hash: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                                          • Instruction Fuzzy Hash: 843133706083849ED330EA658945B9F77D89B85304F40483FF6C8D72D1DB79A9048B67
                                                                          APIs
                                                                          • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E91D
                                                                            • Part of subcall function 0044CF60: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF92
                                                                          • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E9A1
                                                                            • Part of subcall function 0042BBC4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBD8
                                                                          • IsRectEmpty.USER32(?), ref: 0044E963
                                                                          • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E986
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                          • String ID:
                                                                          • API String ID: 855768636-0
                                                                          • Opcode ID: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                                          • Instruction ID: 03991ef50c1cdc1947edd1d0bf9da16660927dd763c0b41cb42d654f0fd6bbd7
                                                                          • Opcode Fuzzy Hash: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                                          • Instruction Fuzzy Hash: 47113871B5030027E250AA7A9C86B5B76899B88748F14093FB546EB3C7EE7DDC09429D
                                                                          APIs
                                                                          • OffsetRect.USER32(?,?,00000000), ref: 00495358
                                                                          • OffsetRect.USER32(?,00000000,?), ref: 00495373
                                                                          • OffsetRect.USER32(?,?,00000000), ref: 0049538D
                                                                          • OffsetRect.USER32(?,00000000,?), ref: 004953A8
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: OffsetRect
                                                                          • String ID:
                                                                          • API String ID: 177026234-0
                                                                          • Opcode ID: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                                          • Instruction ID: af1c1dfc71d00ff4a9a929e8d6bf6bfabc08d13bc1b1844b1e7d273cf48c6b2a
                                                                          • Opcode Fuzzy Hash: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                                          • Instruction Fuzzy Hash: 94217CB6700701ABD700DE69CD85E5BB7DEEBC4344F24CA2AF954C7249D634ED0487A6
                                                                          APIs
                                                                          • GetCursorPos.USER32 ref: 00417270
                                                                          • SetCursor.USER32(00000000), ref: 004172B3
                                                                          • GetLastActivePopup.USER32(?), ref: 004172DD
                                                                          • GetForegroundWindow.USER32(?), ref: 004172E4
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                          • String ID:
                                                                          • API String ID: 1959210111-0
                                                                          • Opcode ID: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                                          • Instruction ID: a2974bbdd40a4ad71efed6c963999b1e78101043f5dd1c0306289f7dfca9f025
                                                                          • Opcode Fuzzy Hash: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                                          • Instruction Fuzzy Hash: 4321A1313082018BCB20AB69E985AE733B1EF44754B0545ABF854CB352D73CDC82CB89
                                                                          APIs
                                                                          • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00494FC1
                                                                          • MulDiv.KERNEL32(50142444,00000008,?), ref: 00494FD5
                                                                          • MulDiv.KERNEL32(F70577E8,00000008,?), ref: 00494FE9
                                                                          • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00495007
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                          • Instruction ID: c81a7ae82503e1df060b9d2e8e6c822c04bb2cec442f3182d8fec1f0f0e8f71f
                                                                          • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                          • Instruction Fuzzy Hash: 48112472604204ABCF50DE99C8C4D9B7BECEF4D320B1541A6F918DB246D674DD408BA4
                                                                          APIs
                                                                          • GetClassInfoA.USER32(00400000,0041F480,?), ref: 0041F4B1
                                                                          • UnregisterClassA.USER32(0041F480,00400000), ref: 0041F4DA
                                                                          • RegisterClassA.USER32(00499598), ref: 0041F4E4
                                                                          • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F51F
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                          • String ID:
                                                                          • API String ID: 4025006896-0
                                                                          • Opcode ID: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                                          • Instruction ID: e8d232a05c88a2160d81946a52d6ac90de0a8bd7e5396313334bc6410d622602
                                                                          • Opcode Fuzzy Hash: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                                          • Instruction Fuzzy Hash: 7B011B722401047BDA10EB6DED81E9B3799D719314B11413BBA15E72A1D7369C154BAC
                                                                          APIs
                                                                          • WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                                          • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                                          • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                                          • CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                          • String ID:
                                                                          • API String ID: 4071923889-0
                                                                          • Opcode ID: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                                          • Instruction ID: 44a5693fa59bfbe72ab063cfacecacb9b789a88f4d4f9747d0667cdf65a63c8e
                                                                          • Opcode Fuzzy Hash: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                                          • Instruction Fuzzy Hash: 7201F9716046087EEB20979E8C06F6B7BACDF44774F610167F904DB2C2C6785D40C668
                                                                          APIs
                                                                          • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D227
                                                                          • LoadResource.KERNEL32(00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4,0000000A,REGDLL_EXE), ref: 0040D241
                                                                          • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4), ref: 0040D25B
                                                                          • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?), ref: 0040D265
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Resource$FindLoadLockSizeof
                                                                          • String ID:
                                                                          • API String ID: 3473537107-0
                                                                          • Opcode ID: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                                          • Instruction ID: 8b55825d53d46818f15098a3aa340eb6897fe62b828c159971ec5f2842f97e2f
                                                                          • Opcode Fuzzy Hash: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                                          • Instruction Fuzzy Hash: ADF062736046046F8704EE9DA881D5B77ECDE88364310017FF908EB246DA38DD018B78
                                                                          APIs
                                                                          • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,0049B450,?,?,?,004018B4), ref: 00401566
                                                                          • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,0049B450,?,?,?,004018B4), ref: 0040158B
                                                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,0049B450,?,?,?,004018B4), ref: 004015B1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Virtual$Alloc$Free
                                                                          • String ID: )a
                                                                          • API String ID: 3668210933-2596428473
                                                                          • Opcode ID: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                                          • Instruction ID: ed10fda1d5a177d2a0c43996bc0be7fa2989f050302610c9045c0a13ae1d279a
                                                                          • Opcode Fuzzy Hash: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                                          • Instruction Fuzzy Hash: AFF0C8716403206AEB315A294C85F133AD4DBC5754F104075BE09FF3DAD6B8980082AC
                                                                          APIs
                                                                          • GetLastError.KERNEL32(00000000,00000000), ref: 004700ED
                                                                          Strings
                                                                          • Failed to set NTFS compression state (%d)., xrefs: 004700FE
                                                                          • Setting NTFS compression on directory: %s, xrefs: 004700BB
                                                                          • Unsetting NTFS compression on directory: %s, xrefs: 004700D3
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                          • API String ID: 1452528299-1392080489
                                                                          • Opcode ID: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                                          • Instruction ID: 8e5543267561a70d3fbbbef991b1365390ff1382f756d9cdf86c8bb39141f558
                                                                          • Opcode Fuzzy Hash: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                                          • Instruction Fuzzy Hash: C9011730E0928C96CF05D7ADA0412DDBBF4DF4D314F84C1AFA45DE7282DA790609879A
                                                                          APIs
                                                                          • GetLastError.KERNEL32(0000001D,00000000), ref: 00470899
                                                                          Strings
                                                                          • Failed to set NTFS compression state (%d)., xrefs: 004708AA
                                                                          • Unsetting NTFS compression on file: %s, xrefs: 0047087F
                                                                          • Setting NTFS compression on file: %s, xrefs: 00470867
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                          • API String ID: 1452528299-3038984924
                                                                          • Opcode ID: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                                          • Instruction ID: 78fa65e16581c334b53b8e167e27839d8ecb3154876bc13dabe901d18edf2e93
                                                                          • Opcode Fuzzy Hash: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                                          • Instruction Fuzzy Hash: 5C01F430D092489ADB04A7E9A4412EDBBF49F09314F45C1ABA459E7282DAB9050947DB
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000,0045BB39), ref: 00455DC4
                                                                          • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000), ref: 00455DCD
                                                                          • RemoveFontResourceA.GDI32(00000000), ref: 00455DDA
                                                                          • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455DEE
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                          • String ID:
                                                                          • API String ID: 4283692357-0
                                                                          • Opcode ID: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                                          • Instruction ID: 88a6b2d0cd2ebf9d052afffcb5c4be27c29a8e8e48dcb03e602a07ae18d4e81c
                                                                          • Opcode Fuzzy Hash: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                                          • Instruction Fuzzy Hash: E3F05EB6B4470176EA10B6B69C8BF2B229C9F54745F10883BBA00EF2C3D97CDC04962D
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$CountSleepTick
                                                                          • String ID:
                                                                          • API String ID: 2227064392-0
                                                                          • Opcode ID: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                                          • Instruction ID: e9c2c7e2fc271270d41d52dba3350464f1e42bdffd51bbfd166b1ef271046f5a
                                                                          • Opcode Fuzzy Hash: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                                          • Instruction Fuzzy Hash: 93E02B7130964845CA24B2BE28C37BF4A88CB8536AB14453FF08CD6242C42C4D05956E
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB,00000000), ref: 00478129
                                                                          • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0047812F
                                                                          • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478151
                                                                          • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478162
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                          • String ID:
                                                                          • API String ID: 215268677-0
                                                                          • Opcode ID: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                                          • Instruction ID: 3331d84468cd062744280f6e1aa24963878bc2b2d96e3aea022572b3ec77581d
                                                                          • Opcode Fuzzy Hash: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                                          • Instruction Fuzzy Hash: 70F030716843016BD600EAB5CC82E9B77DCEB44754F04893E7E98D72C1DA79DC08AB66
                                                                          APIs
                                                                          • GetLastActivePopup.USER32(?), ref: 0042425C
                                                                          • IsWindowVisible.USER32(?), ref: 0042426D
                                                                          • IsWindowEnabled.USER32(?), ref: 00424277
                                                                          • SetForegroundWindow.USER32(?), ref: 00424281
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                          • String ID:
                                                                          • API String ID: 2280970139-0
                                                                          • Opcode ID: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                                          • Instruction ID: cc3e18b4355afb8de1117362fa5ee1cc3bb5bcb08e60588071b409dab7082488
                                                                          • Opcode Fuzzy Hash: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                                          • Instruction Fuzzy Hash: DBE08691B02571929E71FA671881A9F018CCD45BE434602A7FD04F7243DB1CCC0041BC
                                                                          APIs
                                                                          • GlobalHandle.KERNEL32 ref: 00406287
                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0040628E
                                                                          • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                                          • GlobalLock.KERNEL32(00000000), ref: 00406299
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Global$AllocHandleLockUnlock
                                                                          • String ID:
                                                                          • API String ID: 2167344118-0
                                                                          • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                          • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                                                          • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                          • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                                                          APIs
                                                                          • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047B8D5,?,00000000,00000000,00000001,00000000,0047A301,?,00000000), ref: 0047A2C5
                                                                          Strings
                                                                          • Failed to parse "reg" constant, xrefs: 0047A2CC
                                                                          • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A139
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Close
                                                                          • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                          • API String ID: 3535843008-1938159461
                                                                          • Opcode ID: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                                          • Instruction ID: 3bf0094b3715a844c7fa4d69accdb7e726d223c3dcefaf8b2e4f531663087c06
                                                                          • Opcode Fuzzy Hash: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                                          • Instruction Fuzzy Hash: 5F814174E00149AFCB10DF95D881ADEBBF9EF48314F5081AAE814B7392D7389E05CB99
                                                                          APIs
                                                                          • GetForegroundWindow.USER32(00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483045
                                                                          • SetActiveWindow.USER32(?,00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483057
                                                                          Strings
                                                                          • Will not restart Windows automatically., xrefs: 00483176
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ActiveForeground
                                                                          • String ID: Will not restart Windows automatically.
                                                                          • API String ID: 307657957-4169339592
                                                                          • Opcode ID: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                                          • Instruction ID: df9a9ae9a8219d8b6a1298420550b74bcee7fa449f44545fa147fc9774bd32fa
                                                                          • Opcode Fuzzy Hash: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                                          • Instruction Fuzzy Hash: A7413330208340AED710FFA4DC9AB6E3BA4DB15F05F1408B7E9404B3A2D6BD5A04DB1D
                                                                          APIs
                                                                          • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,004021FC), ref: 004020CB
                                                                            • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                            • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                            • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                            • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                          • String ID: =a
                                                                          • API String ID: 296031713-3027013100
                                                                          • Opcode ID: 4b9225ab6ba6685e005fd9bf0415e9852399b88a9652eb18fdb70e0530e56136
                                                                          • Instruction ID: 30adadd309813d1a6846ca6b4958dbaac508113c784b73a5bb8d11bfdb372a30
                                                                          • Opcode Fuzzy Hash: 4b9225ab6ba6685e005fd9bf0415e9852399b88a9652eb18fdb70e0530e56136
                                                                          • Instruction Fuzzy Hash: 3941E3B2E00304DFDB10CF69EE8521A77A4F7A8324B15417FD854A77E2D3789801DB88
                                                                          Strings
                                                                          • Failed to proceed to next wizard page; aborting., xrefs: 0046CFCC
                                                                          • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CFE0
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                          • API String ID: 0-1974262853
                                                                          • Opcode ID: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                                          • Instruction ID: 63d40b18a6e87dbc706e62a2b7ed59e25ea13cd94e581da409b3f01416405f56
                                                                          • Opcode Fuzzy Hash: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                                          • Instruction Fuzzy Hash: 9A319E30A08244DFD711EB99D989BA977F6EB05308F1500FBF0489B392D779AE40CB1A
                                                                          APIs
                                                                            • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                          • RegCloseKey.ADVAPI32(?,00478E9A,?,?,00000001,00000000,00000000,00478EB5), ref: 00478E83
                                                                          Strings
                                                                          • %s\%s_is1, xrefs: 00478E2C
                                                                          • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478E0E
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpen
                                                                          • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                          • API String ID: 47109696-1598650737
                                                                          • Opcode ID: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                                          • Instruction ID: 403b8390735a8e98fed73365c843d129082673b7d0193522817cb9849c55968d
                                                                          • Opcode Fuzzy Hash: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                                          • Instruction Fuzzy Hash: 79218470B40208AFDB01DFAACC55A9EBBE8EB48304F90847EE904E7381DB785D018A59
                                                                          APIs
                                                                          • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501E9
                                                                          • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045021A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ExecuteMessageSendShell
                                                                          • String ID: open
                                                                          • API String ID: 812272486-2758837156
                                                                          • Opcode ID: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                                          • Instruction ID: 6e2feb9b457cb976a84d54f3b3258ed3b08e14d6ba220cef3ebd8abcd6e201e4
                                                                          • Opcode Fuzzy Hash: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                                          • Instruction Fuzzy Hash: 62219474E40208AFDB00DFA5C886B9EB7F8EB44705F2081BAB514E7282D7789E05CB58
                                                                          APIs
                                                                          • ShellExecuteEx.SHELL32(0000003C), ref: 00455318
                                                                          • GetLastError.KERNEL32(0000003C,00000000,00455361,?,?,00000001,00000001), ref: 00455329
                                                                            • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: DirectoryErrorExecuteLastShellSystem
                                                                          • String ID: <
                                                                          • API String ID: 893404051-4251816714
                                                                          • Opcode ID: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                                          • Instruction ID: ea799879bbb6ab716a70283d096866571a468ac1fa4b8cc73728b10af3e72d10
                                                                          • Opcode Fuzzy Hash: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                                          • Instruction Fuzzy Hash: 02215370A00609ABDB10DFA5D8926AE7BF8AF18355F50443AFC44E7281D7789949CB58
                                                                          APIs
                                                                          • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                                          • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                                            • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                            • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                            • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                            • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02294C0C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                          • String ID: )
                                                                          • API String ID: 2227675388-1084416617
                                                                          • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                          • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                                          • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                          • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                                          APIs
                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496539
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Window
                                                                          • String ID: /INITPROCWND=$%x $@
                                                                          • API String ID: 2353593579-4169826103
                                                                          • Opcode ID: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                                          • Instruction ID: 8ac61a852f64af84e8a4d996ffe215da0ea6a1f7c0dd4c2642a2787a2d41e8fe
                                                                          • Opcode Fuzzy Hash: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                                          • Instruction Fuzzy Hash: C711A531A043089FDB01DF64E855BAE7BE8EB48324F52847BE404E7281DB3CE905CA58
                                                                          APIs
                                                                            • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                            • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                          • SysFreeString.OLEAUT32(?), ref: 004474D6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: String$AllocByteCharFreeMultiWide
                                                                          • String ID: NIL Interface Exception$Unknown Method
                                                                          • API String ID: 3952431833-1023667238
                                                                          • Opcode ID: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                                          • Instruction ID: aafd2560cbf8ba646f5ae6954b41d26adab4393ec7197c17a1bba45f9511721b
                                                                          • Opcode Fuzzy Hash: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                                          • Instruction Fuzzy Hash: 0811D6306042049FEB10DFA59D42A6EBBACEB49704F91403AF504E7681C7789D01CB69
                                                                          APIs
                                                                          • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD88
                                                                          • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDC8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Value$EnumQuery
                                                                          • String ID: Inno Setup: No Icons
                                                                          • API String ID: 1576479698-2016326496
                                                                          • Opcode ID: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                                          • Instruction ID: 05ef73584c9e0c756a5fead926ccd29af3c260b6948a855c27afe474e1c18ecb
                                                                          • Opcode Fuzzy Hash: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                                          • Instruction Fuzzy Hash: B2012B36F5A77179F73046256D02BBB56888B82B60F68453BF940EA2C0D6589C04C36E
                                                                          APIs
                                                                            • Part of subcall function 004555D0: GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                                            • Part of subcall function 004555D0: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                                          • SetForegroundWindow.USER32(?), ref: 00497266
                                                                          Strings
                                                                          • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00497291
                                                                          • Restarting Windows., xrefs: 00497243
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Process$CurrentForegroundOpenTokenWindow
                                                                          • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                                          • API String ID: 3179053593-4147564754
                                                                          • Opcode ID: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                                          • Instruction ID: f042dff5c045186d33be5417afa4f05d679b9763972d2bb00463d131ea403ed4
                                                                          • Opcode Fuzzy Hash: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                                          • Instruction Fuzzy Hash: FD01D8706282406BEB00EB65E981B9C3F99AB5430CF5040BBF900A72D3D73C9945871D
                                                                          APIs
                                                                            • Part of subcall function 0047CD84: FreeLibrary.KERNEL32(6FBE0000,004814B7), ref: 0047CD9A
                                                                            • Part of subcall function 0047CA54: GetTickCount.KERNEL32 ref: 0047CA9E
                                                                            • Part of subcall function 004570CC: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004570EB
                                                                          • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049832B), ref: 00497A29
                                                                          • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049832B), ref: 00497A2F
                                                                          Strings
                                                                          • Detected restart. Removing temporary directory., xrefs: 004979E3
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                          • String ID: Detected restart. Removing temporary directory.
                                                                          • API String ID: 1717587489-3199836293
                                                                          • Opcode ID: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                                          • Instruction ID: 93f06bea8fcfa1b224d7ac257058da4e76460d04d1e35911cc499d3d1c0dfa98
                                                                          • Opcode Fuzzy Hash: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                                          • Instruction Fuzzy Hash: 51E0553120C3002EDA02B7B2BC52A2F7F8CD701728311083BF40882452C43D1810C77D
                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(00000000,00498586), ref: 0040334B
                                                                          • GetCommandLineA.KERNEL32(00000000,00498586), ref: 00403356
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: CommandHandleLineModule
                                                                          • String ID: H6_
                                                                          • API String ID: 2123368496-4076918906
                                                                          • Opcode ID: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                                                                          • Instruction ID: ff8fa06d391bd0b31f892a344b3e95d40f530220570fde7b1ba7fad45aeb04f1
                                                                          • Opcode Fuzzy Hash: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                                                                          • Instruction Fuzzy Hash: 45C002609013058AD754AF7579467162A94D751349F80447FF114BA3E1D77C82055BDD
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2938747490.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000001.00000002.2938722921.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938822209.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938848204.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938868835.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000001.00000002.2938891135.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_400000_etwSnBeIC2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastSleep
                                                                          • String ID:
                                                                          • API String ID: 1458359878-0
                                                                          • Opcode ID: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                                          • Instruction ID: a2606c7dd4c17da0a3c90c20a229de96912268129783a4208f21052e6a4fbdd3
                                                                          • Opcode Fuzzy Hash: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                                          • Instruction Fuzzy Hash: 62F02436B01D64578F20A59E998193F63DDEA94376750013BFC0CDB303D438CC098AA9

                                                                          Execution Graph

                                                                          Execution Coverage:9.9%
                                                                          Dynamic/Decrypted Code Coverage:83.8%
                                                                          Signature Coverage:4%
                                                                          Total number of Nodes:2000
                                                                          Total number of Limit Nodes:35
                                                                          execution_graph 17729 40b880 17730 40b95c lstrcmpiW 17729->17730 17733 2d3f7d6 CreateFileA 17734 2d3f8d2 17733->17734 17738 2d3f807 17733->17738 17735 2d3f81f DeviceIoControl 17735->17738 17736 2d3f8c8 CloseHandle 17736->17734 17737 2d3f894 GetLastError 17737->17736 17737->17738 17738->17735 17738->17736 17738->17737 17740 2d43a8f 17738->17740 17742 2d43a97 17740->17742 17743 2d43ab1 17742->17743 17745 2d43ab5 std::exception::exception 17742->17745 17748 2d42eec 17742->17748 17765 2d48143 RtlDecodePointer 17742->17765 17743->17738 17767 2d4449a 17745->17767 17747 2d43adf 17749 2d42f67 17748->17749 17758 2d42ef8 17748->17758 17750 2d48143 _malloc RtlDecodePointer 17749->17750 17751 2d42f6d 17750->17751 17753 2d45d9b __dosmaperr 58 API calls 17751->17753 17755 2d42f5f 17753->17755 17754 2d42f2b RtlAllocateHeap 17754->17755 17754->17758 17755->17742 17757 2d42f03 17757->17758 17770 2d48613 17757->17770 17779 2d48670 17757->17779 17814 2d4825c 17757->17814 17758->17754 17758->17757 17759 2d42f53 17758->17759 17762 2d48143 _malloc RtlDecodePointer 17758->17762 17763 2d42f51 17758->17763 17817 2d45d9b 17759->17817 17762->17758 17764 2d45d9b __dosmaperr 58 API calls 17763->17764 17764->17755 17766 2d48156 17765->17766 17766->17742 17768 2d444b9 RaiseException 17767->17768 17768->17747 17820 2d500be 17770->17820 17772 2d4861a 17773 2d48627 17772->17773 17774 2d500be __FF_MSGBANNER 59 API calls 17772->17774 17775 2d48670 __NMSG_WRITE 59 API calls 17773->17775 17777 2d48649 17773->17777 17774->17773 17776 2d4863f 17775->17776 17778 2d48670 __NMSG_WRITE 59 API calls 17776->17778 17777->17757 17778->17777 17780 2d4868e __NMSG_WRITE 17779->17780 17782 2d500be __FF_MSGBANNER 55 API calls 17780->17782 17813 2d487b5 17780->17813 17781 2d4448b __cftoe_l 6 API calls 17783 2d4881e 17781->17783 17784 2d486a1 17782->17784 17783->17757 17785 2d487ba GetStdHandle 17784->17785 17786 2d500be __FF_MSGBANNER 55 API calls 17784->17786 17789 2d487c8 _strlen 17785->17789 17785->17813 17787 2d486b2 17786->17787 17787->17785 17788 2d486c4 17787->17788 17788->17813 17864 2d4f47d 17788->17864 17792 2d48801 WriteFile 17789->17792 17789->17813 17792->17813 17793 2d486f1 GetModuleFileNameW 17795 2d48711 17793->17795 17801 2d48721 __NMSG_WRITE 17793->17801 17794 2d48822 17796 2d44e45 __invoke_watson 8 API calls 17794->17796 17797 2d4f47d __NMSG_WRITE 55 API calls 17795->17797 17798 2d4882c 17796->17798 17797->17801 17799 2d48851 RtlEnterCriticalSection 17798->17799 17916 2d488b5 17798->17916 17799->17757 17800 2d48767 17800->17794 17882 2d4f411 17800->17882 17801->17794 17801->17800 17873 2d4f4f2 17801->17873 17805 2d48844 17805->17799 17938 2d4837f 17805->17938 17807 2d4f411 __NMSG_WRITE 55 API calls 17809 2d4879e 17807->17809 17809->17794 17811 2d487a5 17809->17811 17891 2d500fe RtlEncodePointer 17811->17891 17813->17781 18001 2d48228 GetModuleHandleExW 17814->18001 18004 2d45bb2 GetLastError 17817->18004 17819 2d45da0 17819->17763 17821 2d500c8 17820->17821 17822 2d500d2 17821->17822 17823 2d45d9b __dosmaperr 59 API calls 17821->17823 17822->17772 17824 2d500ee 17823->17824 17827 2d44e35 17824->17827 17830 2d44e0a RtlDecodePointer 17827->17830 17831 2d44e1d 17830->17831 17836 2d44e45 IsProcessorFeaturePresent 17831->17836 17834 2d44e0a __cftoe_l 8 API calls 17835 2d44e41 17834->17835 17835->17772 17837 2d44e50 17836->17837 17842 2d44cd8 17837->17842 17841 2d44e34 17841->17834 17843 2d44cf2 ___raise_securityfailure setSBCS 17842->17843 17844 2d44d12 IsDebuggerPresent 17843->17844 17850 2d49468 SetUnhandledExceptionFilter UnhandledExceptionFilter 17844->17850 17847 2d44dd6 ___raise_securityfailure 17851 2d4448b 17847->17851 17848 2d44df9 17849 2d49453 GetCurrentProcess TerminateProcess 17848->17849 17849->17841 17850->17847 17852 2d44495 IsProcessorFeaturePresent 17851->17852 17853 2d44493 17851->17853 17855 2d494cf 17852->17855 17853->17848 17858 2d4947e IsDebuggerPresent 17855->17858 17859 2d49493 ___raise_securityfailure 17858->17859 17860 2d49468 ___raise_securityfailure SetUnhandledExceptionFilter UnhandledExceptionFilter 17859->17860 17861 2d4949b ___raise_securityfailure 17860->17861 17862 2d49453 __invoke_watson GetCurrentProcess TerminateProcess 17861->17862 17863 2d494b8 17862->17863 17863->17848 17865 2d4f488 17864->17865 17866 2d4f496 17864->17866 17865->17866 17871 2d4f4af 17865->17871 17867 2d45d9b __dosmaperr 59 API calls 17866->17867 17868 2d4f4a0 17867->17868 17869 2d44e35 __cftoe_l 9 API calls 17868->17869 17870 2d486e4 17869->17870 17870->17793 17870->17794 17871->17870 17872 2d45d9b __dosmaperr 59 API calls 17871->17872 17872->17868 17877 2d4f500 17873->17877 17874 2d4f504 17875 2d4f509 17874->17875 17876 2d45d9b __dosmaperr 59 API calls 17874->17876 17875->17800 17878 2d4f534 17876->17878 17877->17874 17877->17875 17880 2d4f543 17877->17880 17879 2d44e35 __cftoe_l 9 API calls 17878->17879 17879->17875 17880->17875 17881 2d45d9b __dosmaperr 59 API calls 17880->17881 17881->17878 17883 2d4f42b 17882->17883 17885 2d4f41d 17882->17885 17884 2d45d9b __dosmaperr 59 API calls 17883->17884 17890 2d4f435 17884->17890 17885->17883 17888 2d4f457 17885->17888 17886 2d44e35 __cftoe_l 9 API calls 17887 2d48787 17886->17887 17887->17794 17887->17807 17888->17887 17889 2d45d9b __dosmaperr 59 API calls 17888->17889 17889->17890 17890->17886 17892 2d50132 ___crtIsPackagedApp 17891->17892 17893 2d501f1 IsDebuggerPresent 17892->17893 17894 2d50141 LoadLibraryExW 17892->17894 17895 2d50216 17893->17895 17896 2d501fb 17893->17896 17897 2d5017e GetProcAddress 17894->17897 17898 2d50158 GetLastError 17894->17898 17900 2d50209 17895->17900 17901 2d5021b RtlDecodePointer 17895->17901 17899 2d50202 OutputDebugStringW 17896->17899 17896->17900 17903 2d50192 7 API calls 17897->17903 17904 2d5020e 17897->17904 17902 2d50167 LoadLibraryExW 17898->17902 17898->17904 17899->17900 17900->17904 17910 2d50242 RtlDecodePointer RtlDecodePointer 17900->17910 17914 2d5025a 17900->17914 17901->17904 17902->17897 17902->17904 17905 2d501ee 17903->17905 17906 2d501da GetProcAddress RtlEncodePointer 17903->17906 17907 2d4448b __cftoe_l 6 API calls 17904->17907 17905->17893 17906->17905 17911 2d502e0 17907->17911 17908 2d5027e RtlDecodePointer 17908->17904 17909 2d50292 RtlDecodePointer 17909->17908 17912 2d50299 17909->17912 17910->17914 17911->17813 17912->17908 17915 2d502aa RtlDecodePointer 17912->17915 17914->17908 17914->17909 17915->17908 17917 2d488c1 __mtinitlocknum 17916->17917 17918 2d48613 __FF_MSGBANNER 59 API calls 17917->17918 17930 2d488e0 17917->17930 17920 2d488cf 17918->17920 17923 2d48670 __NMSG_WRITE 59 API calls 17920->17923 17922 2d48903 __mtinitlocknum 17922->17805 17926 2d488d6 17923->17926 17924 2d4890d 17950 2d4882d 17924->17950 17925 2d488fe 17928 2d45d9b __dosmaperr 59 API calls 17925->17928 17927 2d4825c _malloc 3 API calls 17926->17927 17927->17930 17928->17922 17930->17922 17945 2d489f4 17930->17945 17931 2d48914 17932 2d48921 17931->17932 17933 2d48939 17931->17933 17957 2d4914c 17932->17957 17960 2d42eb4 17933->17960 17936 2d4892d 17966 2d48955 17936->17966 17939 2d48613 __FF_MSGBANNER 59 API calls 17938->17939 17940 2d48387 17939->17940 17941 2d48670 __NMSG_WRITE 59 API calls 17940->17941 17942 2d4838f 17941->17942 17971 2d4842e 17942->17971 17948 2d48a02 17945->17948 17946 2d42eec _malloc 59 API calls 17946->17948 17947 2d488f7 17947->17924 17947->17925 17948->17946 17948->17947 17969 2d49445 Sleep 17948->17969 17951 2d48851 RtlEnterCriticalSection 17950->17951 17952 2d4883e 17950->17952 17951->17931 17953 2d488b5 __mtinitlocknum 58 API calls 17952->17953 17954 2d48844 17953->17954 17954->17951 17955 2d4837f __amsg_exit 58 API calls 17954->17955 17956 2d48850 17955->17956 17956->17951 17958 2d4915c 17957->17958 17959 2d49169 InitializeCriticalSectionAndSpinCount 17957->17959 17958->17936 17959->17936 17961 2d42ebd HeapFree 17960->17961 17965 2d42ee6 __dosmaperr 17960->17965 17962 2d42ed2 17961->17962 17961->17965 17963 2d45d9b __dosmaperr 57 API calls 17962->17963 17964 2d42ed8 GetLastError 17963->17964 17964->17965 17965->17936 17970 2d48997 RtlLeaveCriticalSection 17966->17970 17968 2d4895c 17968->17922 17969->17948 17970->17968 17974 2d484e4 17971->17974 17973 2d4839a 17975 2d484f0 __mtinitlocknum 17974->17975 17976 2d4882d __lock 52 API calls 17975->17976 17977 2d484f7 17976->17977 17978 2d485b0 _doexit 17977->17978 17979 2d48525 RtlDecodePointer 17977->17979 17994 2d485fe 17978->17994 17979->17978 17981 2d4853c RtlDecodePointer 17979->17981 17987 2d4854c 17981->17987 17983 2d4860d __mtinitlocknum 17983->17973 17985 2d48559 RtlEncodePointer 17985->17987 17986 2d485f5 17988 2d4825c _malloc 3 API calls 17986->17988 17987->17978 17987->17985 17989 2d48569 RtlDecodePointer RtlEncodePointer 17987->17989 17990 2d485fe 17988->17990 17992 2d4857b RtlDecodePointer RtlDecodePointer 17989->17992 17991 2d4860b 17990->17991 17999 2d48997 RtlLeaveCriticalSection 17990->17999 17991->17973 17992->17987 17995 2d48604 17994->17995 17996 2d485de 17994->17996 18000 2d48997 RtlLeaveCriticalSection 17995->18000 17996->17983 17998 2d48997 RtlLeaveCriticalSection 17996->17998 17998->17986 17999->17991 18000->17996 18002 2d48241 GetProcAddress 18001->18002 18003 2d48253 ExitProcess 18001->18003 18002->18003 18018 2d4910b 18004->18018 18006 2d45bc7 18007 2d45c15 SetLastError 18006->18007 18021 2d489ac 18006->18021 18007->17819 18011 2d45bee 18012 2d45bf4 18011->18012 18013 2d45c0c 18011->18013 18030 2d45c21 18012->18030 18015 2d42eb4 _free 56 API calls 18013->18015 18017 2d45c12 18015->18017 18016 2d45bfc GetCurrentThreadId 18016->18007 18017->18007 18019 2d49122 TlsGetValue 18018->18019 18020 2d4911e 18018->18020 18019->18006 18020->18006 18022 2d489b3 18021->18022 18024 2d45bda 18022->18024 18026 2d489d1 18022->18026 18040 2d503f8 18022->18040 18024->18007 18027 2d4912a 18024->18027 18026->18022 18026->18024 18048 2d49445 Sleep 18026->18048 18028 2d49144 TlsSetValue 18027->18028 18029 2d49140 18027->18029 18028->18011 18029->18011 18031 2d45c2d __mtinitlocknum 18030->18031 18032 2d4882d __lock 59 API calls 18031->18032 18033 2d45c6a 18032->18033 18049 2d45cc2 18033->18049 18036 2d4882d __lock 59 API calls 18037 2d45c8b ___addlocaleref 18036->18037 18052 2d45ccb 18037->18052 18039 2d45cb6 __mtinitlocknum 18039->18016 18041 2d50403 18040->18041 18046 2d5041e 18040->18046 18042 2d5040f 18041->18042 18041->18046 18044 2d45d9b __dosmaperr 58 API calls 18042->18044 18043 2d5042e RtlAllocateHeap 18045 2d50414 18043->18045 18043->18046 18044->18045 18045->18022 18046->18043 18046->18045 18047 2d48143 _malloc RtlDecodePointer 18046->18047 18047->18046 18048->18026 18055 2d48997 RtlLeaveCriticalSection 18049->18055 18051 2d45c84 18051->18036 18056 2d48997 RtlLeaveCriticalSection 18052->18056 18054 2d45cd2 18054->18039 18055->18051 18056->18054 18057 402785 18058 40bab8 RegCloseKey 18057->18058 18059 4021c6 18062 401f64 FindResourceA 18059->18062 18061 4021cb 18063 401f86 GetLastError SizeofResource 18062->18063 18068 401f9f 18062->18068 18064 401fa6 LoadResource LockResource GlobalAlloc 18063->18064 18063->18068 18065 401fd2 18064->18065 18066 401ffb GetTickCount 18065->18066 18069 402005 GlobalAlloc 18066->18069 18068->18061 18069->18068 18070 2d886d0 18071 2d9990b ReadFile 18070->18071 18073 2d3f8da LoadLibraryA 18074 2d3f903 GetProcAddress 18073->18074 18075 2d3f9bd 18073->18075 18076 2d3f9b6 FreeLibrary 18074->18076 18078 2d3f917 18074->18078 18076->18075 18077 2d3f929 GetAdaptersInfo 18077->18078 18078->18077 18079 2d3f9b1 18078->18079 18080 2d43a8f _Allocate 60 API calls 18078->18080 18079->18076 18080->18078 18081 40b0ca RegOpenKeyExA 18082 4025c7 18081->18082 18082->18081 18083 40b3bc 18082->18083 18084 40278d 18085 40b54b RegSetValueExA 18084->18085 18087 402294 18088 40ba39 VirtualAlloc 18087->18088 18089 40ba42 18088->18089 18090 2d6e002 18091 2d6e080 18090->18091 18092 2d6e009 18090->18092 18094 2d6fa26 DeleteFileA 18091->18094 18095 2d74646 18094->18095 18096 2d7fec1 18097 2d81738 CreateFileA 18096->18097 18099 2d3648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 18177 2d342c7 18099->18177 18178 2d3104d 18183 2d432e7 18178->18183 18189 2d431eb 18183->18189 18185 2d31057 18186 2d31aa9 InterlockedIncrement 18185->18186 18187 2d31ac5 WSAStartup InterlockedExchange 18186->18187 18188 2d3105c 18186->18188 18187->18188 18190 2d431f7 __mtinitlocknum 18189->18190 18197 2d484d2 18190->18197 18196 2d4321e __mtinitlocknum 18196->18185 18198 2d4882d __lock 59 API calls 18197->18198 18199 2d43200 18198->18199 18200 2d4322f RtlDecodePointer RtlDecodePointer 18199->18200 18201 2d4325c 18200->18201 18202 2d4320c 18200->18202 18201->18202 18214 2d4909d 18201->18214 18211 2d43229 18202->18211 18204 2d432bf RtlEncodePointer RtlEncodePointer 18204->18202 18205 2d4326e 18205->18204 18206 2d43293 18205->18206 18221 2d48a3b 18205->18221 18206->18202 18208 2d48a3b __realloc_crt 62 API calls 18206->18208 18209 2d432ad RtlEncodePointer 18206->18209 18210 2d432a7 18208->18210 18209->18204 18210->18202 18210->18209 18248 2d484db 18211->18248 18215 2d490a6 18214->18215 18216 2d490bb RtlSizeHeap 18214->18216 18217 2d45d9b __dosmaperr 59 API calls 18215->18217 18216->18205 18218 2d490ab 18217->18218 18219 2d44e35 __cftoe_l 9 API calls 18218->18219 18220 2d490b6 18219->18220 18220->18205 18225 2d48a42 18221->18225 18223 2d48a7f 18223->18206 18225->18223 18226 2d502e4 18225->18226 18247 2d49445 Sleep 18225->18247 18227 2d502ed 18226->18227 18228 2d502f8 18226->18228 18229 2d42eec _malloc 59 API calls 18227->18229 18230 2d50300 18228->18230 18239 2d5030d 18228->18239 18231 2d502f5 18229->18231 18232 2d42eb4 _free 59 API calls 18230->18232 18231->18225 18246 2d50308 __dosmaperr 18232->18246 18233 2d50345 18234 2d48143 _malloc RtlDecodePointer 18233->18234 18236 2d5034b 18234->18236 18235 2d50315 RtlReAllocateHeap 18235->18239 18235->18246 18237 2d45d9b __dosmaperr 59 API calls 18236->18237 18237->18246 18238 2d50375 18241 2d45d9b __dosmaperr 59 API calls 18238->18241 18239->18233 18239->18235 18239->18238 18240 2d48143 _malloc RtlDecodePointer 18239->18240 18243 2d5035d 18239->18243 18240->18239 18242 2d5037a GetLastError 18241->18242 18242->18246 18244 2d45d9b __dosmaperr 59 API calls 18243->18244 18245 2d50362 GetLastError 18244->18245 18245->18246 18246->18225 18247->18225 18251 2d48997 RtlLeaveCriticalSection 18248->18251 18250 2d4322e 18250->18196 18251->18250 18252 402d60 GetVersion 18276 4039f0 HeapCreate 18252->18276 18254 402dbf 18255 402dc4 18254->18255 18256 402dcc 18254->18256 18351 402e7b 18255->18351 18288 4036d0 18256->18288 18260 402dd4 GetCommandLineA 18302 40359e 18260->18302 18264 402dee 18334 403298 18264->18334 18266 402df3 18267 402df8 GetStartupInfoA 18266->18267 18347 403240 18267->18347 18269 402e0a GetModuleHandleA 18271 402e2e 18269->18271 18357 402fe7 18271->18357 18277 403a10 18276->18277 18278 403a46 18276->18278 18364 4038a8 18277->18364 18278->18254 18281 403a2c 18284 403a49 18281->18284 18378 404618 18281->18378 18282 403a1f 18376 403dc7 HeapAlloc 18282->18376 18284->18254 18286 403a29 18286->18284 18287 403a3a HeapDestroy 18286->18287 18287->18278 18441 402e9f 18288->18441 18291 4036ef GetStartupInfoA 18299 403800 18291->18299 18301 40373b 18291->18301 18294 403867 SetHandleCount 18294->18260 18295 403827 GetStdHandle 18297 403835 GetFileType 18295->18297 18295->18299 18296 402e9f 12 API calls 18296->18301 18297->18299 18298 4037ac 18298->18299 18300 4037ce GetFileType 18298->18300 18299->18294 18299->18295 18300->18298 18301->18296 18301->18298 18301->18299 18303 4035b9 GetEnvironmentStringsW 18302->18303 18304 4035ec 18302->18304 18305 4035c1 18303->18305 18306 4035cd GetEnvironmentStrings 18303->18306 18304->18305 18307 4035dd 18304->18307 18309 403605 WideCharToMultiByte 18305->18309 18310 4035f9 GetEnvironmentStringsW 18305->18310 18306->18307 18308 402de4 18306->18308 18307->18308 18311 40368b 18307->18311 18312 40367f GetEnvironmentStrings 18307->18312 18325 403351 18308->18325 18314 403639 18309->18314 18315 40366b FreeEnvironmentStringsW 18309->18315 18310->18308 18310->18309 18316 402e9f 12 API calls 18311->18316 18312->18308 18312->18311 18317 402e9f 12 API calls 18314->18317 18315->18308 18323 4036a6 18316->18323 18318 40363f 18317->18318 18318->18315 18319 403648 WideCharToMultiByte 18318->18319 18321 403662 18319->18321 18322 403659 18319->18322 18320 4036bc FreeEnvironmentStringsA 18320->18308 18321->18315 18507 402f51 18322->18507 18323->18320 18326 403363 18325->18326 18327 403368 GetModuleFileNameA 18325->18327 18537 405042 18326->18537 18329 40338b 18327->18329 18330 402e9f 12 API calls 18329->18330 18331 4033ac 18330->18331 18332 4033bc 18331->18332 18333 402e56 7 API calls 18331->18333 18332->18264 18333->18332 18335 4032a5 18334->18335 18337 4032aa 18334->18337 18336 405042 19 API calls 18335->18336 18336->18337 18338 402e9f 12 API calls 18337->18338 18339 4032d7 18338->18339 18340 402e56 7 API calls 18339->18340 18345 4032eb 18339->18345 18340->18345 18341 40332e 18342 402f51 7 API calls 18341->18342 18343 40333a 18342->18343 18343->18266 18344 402e9f 12 API calls 18344->18345 18345->18341 18345->18344 18346 402e56 7 API calls 18345->18346 18346->18345 18348 403249 18347->18348 18350 40324e 18347->18350 18349 405042 19 API calls 18348->18349 18349->18350 18350->18269 18352 402e84 18351->18352 18353 402e89 18351->18353 18354 403c20 7 API calls 18352->18354 18355 403c59 7 API calls 18353->18355 18354->18353 18356 402e92 ExitProcess 18355->18356 18561 403009 18357->18561 18360 4030bc 18361 4030c8 18360->18361 18362 4031f1 UnhandledExceptionFilter 18361->18362 18363 402e48 18361->18363 18362->18363 18387 402c40 18364->18387 18367 4038d1 18368 4038eb GetEnvironmentVariableA 18367->18368 18370 4038e3 18367->18370 18371 40390a 18368->18371 18375 4039c8 18368->18375 18370->18281 18370->18282 18372 40394f GetModuleFileNameA 18371->18372 18373 403947 18371->18373 18372->18373 18373->18375 18389 40505e 18373->18389 18375->18370 18392 40387b GetModuleHandleA 18375->18392 18377 403de3 18376->18377 18377->18286 18379 404625 18378->18379 18380 40462c HeapAlloc 18378->18380 18381 404649 VirtualAlloc 18379->18381 18380->18381 18386 404681 18380->18386 18382 404669 VirtualAlloc 18381->18382 18383 40473e 18381->18383 18384 404730 VirtualFree 18382->18384 18382->18386 18385 404746 HeapFree 18383->18385 18383->18386 18384->18383 18385->18386 18386->18286 18388 402c4c GetVersionExA 18387->18388 18388->18367 18388->18368 18394 405075 18389->18394 18393 403892 18392->18393 18393->18370 18396 40508d 18394->18396 18398 4050bd 18396->18398 18401 405d39 18396->18401 18397 405d39 6 API calls 18397->18398 18398->18397 18399 405071 18398->18399 18405 405c6d 18398->18405 18399->18375 18402 405d57 18401->18402 18404 405d4b 18401->18404 18411 405b24 18402->18411 18404->18396 18406 405c98 18405->18406 18410 405c7b 18405->18410 18407 405cb4 18406->18407 18408 405d39 6 API calls 18406->18408 18407->18410 18423 4058d5 18407->18423 18408->18407 18410->18398 18412 405b55 GetStringTypeW 18411->18412 18416 405b6d 18411->18416 18413 405b71 GetStringTypeA 18412->18413 18412->18416 18413->18416 18417 405c59 18413->18417 18414 405b98 GetStringTypeA 18414->18417 18415 405bbc 18415->18417 18419 405bd2 MultiByteToWideChar 18415->18419 18416->18414 18416->18415 18417->18404 18419->18417 18420 405bf6 18419->18420 18420->18417 18421 405c30 MultiByteToWideChar 18420->18421 18421->18417 18422 405c49 GetStringTypeW 18421->18422 18422->18417 18424 405905 LCMapStringW 18423->18424 18425 405921 18423->18425 18424->18425 18426 405929 LCMapStringA 18424->18426 18428 405987 18425->18428 18429 40596a LCMapStringA 18425->18429 18426->18425 18427 405a63 18426->18427 18427->18410 18428->18427 18430 40599d MultiByteToWideChar 18428->18430 18429->18427 18430->18427 18431 4059c7 18430->18431 18431->18427 18432 4059fd MultiByteToWideChar 18431->18432 18432->18427 18433 405a16 LCMapStringW 18432->18433 18433->18427 18434 405a31 18433->18434 18435 405a37 18434->18435 18437 405a77 18434->18437 18435->18427 18436 405a45 LCMapStringW 18435->18436 18436->18427 18437->18427 18438 405aaf LCMapStringW 18437->18438 18438->18427 18439 405ac7 WideCharToMultiByte 18438->18439 18439->18427 18450 402eb1 18441->18450 18444 402e56 18445 402e64 18444->18445 18446 402e5f 18444->18446 18493 403c59 18445->18493 18487 403c20 18446->18487 18451 402eae 18450->18451 18453 402eb8 18450->18453 18451->18291 18451->18444 18453->18451 18454 402edd 18453->18454 18455 402eec 18454->18455 18458 402f01 18454->18458 18462 402efa 18455->18462 18463 404163 18455->18463 18457 402f40 HeapAlloc 18459 402f4f 18457->18459 18458->18457 18458->18462 18469 404910 18458->18469 18459->18453 18460 402eff 18460->18453 18462->18457 18462->18459 18462->18460 18466 404195 18463->18466 18464 404234 18468 404243 18464->18468 18483 40451d 18464->18483 18466->18464 18466->18468 18476 40446c 18466->18476 18468->18462 18470 40491e 18469->18470 18471 404a0a VirtualAlloc 18470->18471 18472 404adf 18470->18472 18475 4049db 18470->18475 18471->18475 18473 404618 5 API calls 18472->18473 18473->18475 18475->18462 18477 4044af HeapAlloc 18476->18477 18478 40447f HeapReAlloc 18476->18478 18480 4044d5 VirtualAlloc 18477->18480 18481 4044ff 18477->18481 18479 40449e 18478->18479 18478->18481 18479->18477 18480->18481 18482 4044ef HeapFree 18480->18482 18481->18464 18482->18481 18484 40452f VirtualAlloc 18483->18484 18486 404578 18484->18486 18486->18468 18488 403c2a 18487->18488 18489 403c59 7 API calls 18488->18489 18490 403c57 18488->18490 18491 403c41 18489->18491 18490->18445 18492 403c59 7 API calls 18491->18492 18492->18490 18496 403c6c 18493->18496 18494 402e6d 18494->18291 18495 403d83 18499 403d96 GetStdHandle WriteFile 18495->18499 18496->18494 18496->18495 18497 403cac 18496->18497 18497->18494 18498 403cb8 GetModuleFileNameA 18497->18498 18500 403cd0 18498->18500 18499->18494 18502 405408 18500->18502 18503 405415 LoadLibraryA 18502->18503 18505 405457 18502->18505 18504 405426 GetProcAddress 18503->18504 18503->18505 18504->18505 18506 40543d GetProcAddress GetProcAddress 18504->18506 18505->18494 18506->18505 18508 402f5d 18507->18508 18517 402f79 18507->18517 18509 402f67 18508->18509 18513 402f7d 18508->18513 18511 402fa9 HeapFree 18509->18511 18512 402f73 18509->18512 18510 402fa8 18510->18511 18511->18517 18518 403e3a 18512->18518 18513->18510 18515 402f97 18513->18515 18524 4048cb 18515->18524 18517->18321 18519 403e78 18518->18519 18523 40412e 18518->18523 18520 404074 VirtualFree 18519->18520 18519->18523 18521 4040d8 18520->18521 18522 4040e7 VirtualFree HeapFree 18521->18522 18521->18523 18522->18523 18523->18517 18525 4048f8 18524->18525 18526 40490e 18524->18526 18525->18526 18528 4047b2 18525->18528 18526->18517 18531 4047bf 18528->18531 18529 40486f 18529->18526 18530 4047e0 VirtualFree 18530->18531 18531->18529 18531->18530 18533 40475c VirtualFree 18531->18533 18534 404779 18533->18534 18535 4047a9 18534->18535 18536 404789 HeapFree 18534->18536 18535->18531 18536->18531 18538 40504b 18537->18538 18539 405052 18537->18539 18541 404c7e 18538->18541 18539->18327 18548 404e17 18541->18548 18543 404e0b 18543->18539 18546 404cc1 GetCPInfo 18547 404cd5 18546->18547 18547->18543 18553 404ebd GetCPInfo 18547->18553 18549 404e37 18548->18549 18550 404e27 GetOEMCP 18548->18550 18551 404e3c GetACP 18549->18551 18552 404c8f 18549->18552 18550->18549 18551->18552 18552->18543 18552->18546 18552->18547 18557 404ee0 18553->18557 18560 404fa8 18553->18560 18554 405b24 6 API calls 18555 404f5c 18554->18555 18556 4058d5 9 API calls 18555->18556 18558 404f80 18556->18558 18557->18554 18559 4058d5 9 API calls 18558->18559 18559->18560 18560->18543 18562 403015 GetCurrentProcess TerminateProcess 18561->18562 18563 403026 18561->18563 18562->18563 18564 402e37 18563->18564 18565 403090 ExitProcess 18563->18565 18564->18360 18566 4022a2 18567 4027a6 CopyFileA 18566->18567 18569 402224 18570 4025f1 LoadLibraryExA 18569->18570 18572 40b8aa 18573 40b8ad GetLocalTime 18572->18573 18577 401f27 18573->18577 18578 401f3c 18577->18578 18581 401a1d 18578->18581 18580 401f45 18582 401a2c 18581->18582 18587 401a4f CreateFileA 18582->18587 18586 401a3e 18586->18580 18588 401a35 18587->18588 18590 401a7d 18587->18590 18595 401b4b LoadLibraryA 18588->18595 18589 401a98 DeviceIoControl 18589->18590 18590->18589 18591 401b3a CloseHandle 18590->18591 18593 401b0e GetLastError 18590->18593 18604 402ba6 18590->18604 18607 402b98 18590->18607 18591->18588 18593->18590 18593->18591 18596 401c21 18595->18596 18597 401b6e GetProcAddress 18595->18597 18596->18586 18598 401c18 FreeLibrary 18597->18598 18602 401b85 18597->18602 18598->18596 18599 401b95 GetAdaptersInfo 18599->18602 18600 402ba6 7 API calls 18600->18602 18601 401c15 18601->18598 18602->18599 18602->18600 18602->18601 18603 402b98 12 API calls 18602->18603 18603->18602 18605 402f51 7 API calls 18604->18605 18606 402baf 18605->18606 18606->18590 18608 402eb1 12 API calls 18607->18608 18609 402ba3 18608->18609 18609->18590 18610 40226b OpenSCManagerA 18611 4027e2 18610->18611 18612 4022af Sleep 18613 40b944 18612->18613 18614 402231 18615 4025f9 CreateDirectoryA 18614->18615 18616 40b537 18615->18616 18617 402772 RegQueryValueExA 18618 2d931af 18619 2d93b04 WriteFile 18618->18619 18621 4024f6 18624 4024fa 18621->18624 18622 4024c6 18624->18622 18626 2d43c52 18624->18626 18627 2d43c60 18626->18627 18628 2d43c5b 18626->18628 18632 2d43c75 18627->18632 18640 2d4b821 18628->18640 18631 40b4fb 18633 2d43c81 __mtinitlocknum 18632->18633 18637 2d43ccf ___DllMainCRTStartup 18633->18637 18639 2d43d2c __mtinitlocknum 18633->18639 18644 2d43ae0 18633->18644 18635 2d43d09 18636 2d43ae0 __CRT_INIT@12 138 API calls 18635->18636 18635->18639 18636->18639 18637->18635 18638 2d43ae0 __CRT_INIT@12 138 API calls 18637->18638 18637->18639 18638->18635 18639->18631 18641 2d4b844 18640->18641 18642 2d4b851 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 18640->18642 18641->18642 18643 2d4b848 18641->18643 18642->18643 18643->18627 18645 2d43aec __mtinitlocknum 18644->18645 18646 2d43af4 18645->18646 18647 2d43b6e 18645->18647 18692 2d48126 GetProcessHeap 18646->18692 18649 2d43bd7 18647->18649 18650 2d43b72 18647->18650 18651 2d43bdc 18649->18651 18652 2d43c3a 18649->18652 18655 2d43b93 18650->18655 18684 2d43afd __mtinitlocknum __CRT_INIT@12 18650->18684 18793 2d4839b 18650->18793 18654 2d4910b __threadstartex@4 TlsGetValue 18651->18654 18652->18684 18824 2d45b64 18652->18824 18653 2d43af9 18653->18684 18693 2d45cd4 18653->18693 18658 2d43be7 18654->18658 18796 2d48272 RtlDecodePointer 18655->18796 18663 2d489ac __calloc_crt 59 API calls 18658->18663 18658->18684 18661 2d43b09 __RTC_Initialize 18669 2d43b19 GetCommandLineA 18661->18669 18661->18684 18665 2d43bf8 18663->18665 18664 2d43ba9 __CRT_INIT@12 18820 2d43bc2 18664->18820 18670 2d4912a __threadstartex@4 TlsSetValue 18665->18670 18665->18684 18666 2d4b4bf __ioterm 60 API calls 18668 2d43ba4 18666->18668 18671 2d45d4a __mtterm 62 API calls 18668->18671 18714 2d4b8bd GetEnvironmentStringsW 18669->18714 18673 2d43c10 18670->18673 18671->18664 18675 2d43c16 18673->18675 18676 2d43c2e 18673->18676 18678 2d45c21 __initptd 59 API calls 18675->18678 18679 2d42eb4 _free 59 API calls 18676->18679 18681 2d43c1e GetCurrentThreadId 18678->18681 18679->18684 18680 2d43b33 18689 2d43b37 18680->18689 18746 2d4b511 18680->18746 18681->18684 18684->18637 18779 2d45d4a 18689->18779 18691 2d43b57 18691->18684 18788 2d4b4bf 18691->18788 18692->18653 18832 2d48442 RtlEncodePointer 18693->18832 18695 2d45cd9 18837 2d4895e 18695->18837 18698 2d45ce2 18699 2d45d4a __mtterm 62 API calls 18698->18699 18701 2d45ce7 18699->18701 18701->18661 18703 2d45cff 18704 2d489ac __calloc_crt 59 API calls 18703->18704 18705 2d45d0c 18704->18705 18706 2d45d41 18705->18706 18708 2d4912a __threadstartex@4 TlsSetValue 18705->18708 18707 2d45d4a __mtterm 62 API calls 18706->18707 18709 2d45d46 18707->18709 18710 2d45d20 18708->18710 18709->18661 18710->18706 18711 2d45d26 18710->18711 18712 2d45c21 __initptd 59 API calls 18711->18712 18713 2d45d2e GetCurrentThreadId 18712->18713 18713->18661 18715 2d4b8d0 WideCharToMultiByte 18714->18715 18720 2d43b29 18714->18720 18717 2d4b903 18715->18717 18718 2d4b93a FreeEnvironmentStringsW 18715->18718 18719 2d489f4 __malloc_crt 59 API calls 18717->18719 18718->18720 18721 2d4b909 18719->18721 18727 2d4b20b 18720->18727 18721->18718 18722 2d4b910 WideCharToMultiByte 18721->18722 18723 2d4b926 18722->18723 18724 2d4b92f FreeEnvironmentStringsW 18722->18724 18725 2d42eb4 _free 59 API calls 18723->18725 18724->18720 18726 2d4b92c 18725->18726 18726->18724 18728 2d4b217 __mtinitlocknum 18727->18728 18729 2d4882d __lock 59 API calls 18728->18729 18730 2d4b21e 18729->18730 18731 2d489ac __calloc_crt 59 API calls 18730->18731 18732 2d4b22f 18731->18732 18733 2d4b29a GetStartupInfoW 18732->18733 18734 2d4b23a __mtinitlocknum @_EH4_CallFilterFunc@8 18732->18734 18735 2d4b3de 18733->18735 18736 2d4b2af 18733->18736 18734->18680 18737 2d4b4a6 18735->18737 18740 2d4b42b GetStdHandle 18735->18740 18741 2d4b43e GetFileType 18735->18741 18745 2d4914c __mtinitlocknum InitializeCriticalSectionAndSpinCount 18735->18745 18736->18735 18739 2d489ac __calloc_crt 59 API calls 18736->18739 18743 2d4b2fd 18736->18743 18845 2d4b4b6 18737->18845 18739->18736 18740->18735 18741->18735 18742 2d4b331 GetFileType 18742->18743 18743->18735 18743->18742 18744 2d4914c __mtinitlocknum InitializeCriticalSectionAndSpinCount 18743->18744 18744->18743 18745->18735 18747 2d4b524 GetModuleFileNameA 18746->18747 18748 2d4b51f 18746->18748 18750 2d4b551 18747->18750 18855 2d451ca 18748->18855 18849 2d4b5c4 18750->18849 18752 2d43b43 18752->18691 18757 2d4b740 18752->18757 18754 2d489f4 __malloc_crt 59 API calls 18755 2d4b58a 18754->18755 18755->18752 18756 2d4b5c4 _parse_cmdline 59 API calls 18755->18756 18756->18752 18758 2d4b749 18757->18758 18760 2d4b74e _strlen 18757->18760 18780 2d45d54 18779->18780 18782 2d45d5a 18779->18782 19031 2d490ec 18780->19031 18783 2d48877 RtlDeleteCriticalSection 18782->18783 18784 2d48893 18782->18784 18785 2d42eb4 _free 59 API calls 18783->18785 18786 2d4889f RtlDeleteCriticalSection 18784->18786 18787 2d488b2 18784->18787 18785->18782 18786->18784 18787->18684 18794 2d484e4 _doexit 59 API calls 18793->18794 18795 2d483a6 18794->18795 18795->18655 18797 2d4829e 18796->18797 18798 2d4828c 18796->18798 18799 2d42eb4 _free 59 API calls 18797->18799 18798->18797 18800 2d42eb4 _free 59 API calls 18798->18800 18801 2d482ab 18799->18801 18800->18798 18802 2d482cf 18801->18802 18804 2d42eb4 _free 59 API calls 18801->18804 18803 2d42eb4 _free 59 API calls 18802->18803 18805 2d482db 18803->18805 18804->18801 18806 2d42eb4 _free 59 API calls 18805->18806 18807 2d482ec 18806->18807 18808 2d42eb4 _free 59 API calls 18807->18808 18809 2d482f7 18808->18809 18810 2d4831c RtlEncodePointer 18809->18810 18815 2d42eb4 _free 59 API calls 18809->18815 18811 2d48331 18810->18811 18812 2d48337 18810->18812 18813 2d42eb4 _free 59 API calls 18811->18813 18814 2d4834d 18812->18814 18816 2d42eb4 _free 59 API calls 18812->18816 18813->18812 18817 2d43b98 18814->18817 18819 2d42eb4 _free 59 API calls 18814->18819 18818 2d4831b 18815->18818 18816->18814 18817->18664 18817->18666 18818->18810 18819->18817 18821 2d43bd4 18820->18821 18822 2d43bc6 18820->18822 18821->18684 18822->18821 18823 2d45d4a __mtterm 62 API calls 18822->18823 18823->18821 18825 2d45b71 18824->18825 18826 2d45b97 18824->18826 18827 2d45b7f 18825->18827 18828 2d4910b __threadstartex@4 TlsGetValue 18825->18828 18826->18684 18829 2d4912a __threadstartex@4 TlsSetValue 18827->18829 18828->18827 18830 2d45b8f 18829->18830 19034 2d45a2f 18830->19034 18833 2d48453 __init_pointers __initp_misc_winsig 18832->18833 18844 2d4394a RtlEncodePointer 18833->18844 18835 2d4846b __init_pointers 18836 2d491ba 34 API calls 18835->18836 18836->18695 18838 2d4896a 18837->18838 18839 2d4914c __mtinitlocknum InitializeCriticalSectionAndSpinCount 18838->18839 18840 2d45cde 18838->18840 18839->18838 18840->18698 18841 2d490ce 18840->18841 18842 2d490e5 TlsAlloc 18841->18842 18843 2d45cf4 18841->18843 18843->18698 18843->18703 18844->18835 18848 2d48997 RtlLeaveCriticalSection 18845->18848 18847 2d4b4bd 18847->18734 18848->18847 18851 2d4b5e6 18849->18851 18852 2d4b64a 18851->18852 18859 2d51516 18851->18859 18853 2d4b567 18852->18853 18854 2d51516 _parse_cmdline 59 API calls 18852->18854 18853->18752 18853->18754 18854->18852 18856 2d451da 18855->18856 18857 2d451d3 18855->18857 18856->18747 18915 2d45527 18857->18915 18862 2d514bc 18859->18862 18865 2d421bb 18862->18865 18866 2d421cc 18865->18866 18872 2d42219 18865->18872 18873 2d45b9a 18866->18873 18872->18851 18916 2d45533 __mtinitlocknum 18915->18916 18917 2d45b9a __CreateFrameInfo 59 API calls 18916->18917 18918 2d4553b 18917->18918 18919 2d45481 __setmbcp 59 API calls 18918->18919 18920 2d45545 18919->18920 19032 2d49103 TlsFree 19031->19032 19033 2d490ff 19031->19033 19032->18782 19033->18782 19036 2d45a3b __mtinitlocknum 19034->19036 19035 2d45a54 19038 2d45a63 19035->19038 19040 2d42eb4 _free 59 API calls 19035->19040 19036->19035 19037 2d42eb4 _free 59 API calls 19036->19037 19039 2d45b43 __mtinitlocknum 19036->19039 19037->19035 19041 2d42eb4 _free 59 API calls 19038->19041 19043 2d45a72 19038->19043 19039->18826 19040->19038 19041->19043 19042 2d45a81 19044 2d45a90 19042->19044 19046 2d42eb4 _free 59 API calls 19042->19046 19043->19042 19045 2d42eb4 _free 59 API calls 19043->19045 19047 2d45a9f 19044->19047 19048 2d42eb4 _free 59 API calls 19044->19048 19045->19042 19046->19044 19049 2d45aae 19047->19049 19050 2d42eb4 _free 59 API calls 19047->19050 19048->19047 19051 2d45ac0 19049->19051 19053 2d42eb4 _free 59 API calls 19049->19053 19050->19049 19052 2d4882d __lock 59 API calls 19051->19052 19056 2d45ac8 19052->19056 19053->19051 19054 2d45aeb 19066 2d45b4f 19054->19066 19056->19054 19058 2d42eb4 _free 59 API calls 19056->19058 19058->19054 19059 2d4882d __lock 59 API calls 19064 2d45aff ___removelocaleref 19059->19064 19060 2d45b30 19099 2d45b5b 19060->19099 19063 2d42eb4 _free 59 API calls 19063->19039 19064->19060 19069 2d44f05 19064->19069 19102 2d48997 RtlLeaveCriticalSection 19066->19102 19068 2d45af8 19068->19059 19070 2d44f7e 19069->19070 19071 2d44f1a 19069->19071 19072 2d44fcb 19070->19072 19073 2d42eb4 _free 59 API calls 19070->19073 19071->19070 19079 2d44f4b 19071->19079 19082 2d42eb4 _free 59 API calls 19071->19082 19075 2d44ff4 19072->19075 19143 2d4d47d 19072->19143 19076 2d44f9f 19073->19076 19084 2d45053 19075->19084 19094 2d42eb4 59 API calls _free 19075->19094 19078 2d42eb4 _free 59 API calls 19076->19078 19080 2d44fb2 19078->19080 19085 2d42eb4 _free 59 API calls 19079->19085 19098 2d44f69 19079->19098 19086 2d42eb4 _free 59 API calls 19080->19086 19081 2d42eb4 _free 59 API calls 19087 2d44f73 19081->19087 19088 2d44f40 19082->19088 19083 2d42eb4 _free 59 API calls 19083->19075 19089 2d42eb4 _free 59 API calls 19084->19089 19091 2d44f5e 19085->19091 19092 2d44fc0 19086->19092 19093 2d42eb4 _free 59 API calls 19087->19093 19103 2d4d31a 19088->19103 19090 2d45059 19089->19090 19090->19060 19131 2d4d416 19091->19131 19097 2d42eb4 _free 59 API calls 19092->19097 19093->19070 19094->19075 19097->19072 19098->19081 19319 2d48997 RtlLeaveCriticalSection 19099->19319 19101 2d45b3d 19101->19063 19102->19068 19104 2d4d329 19103->19104 19130 2d4d412 19103->19130 19105 2d4d33a 19104->19105 19107 2d42eb4 _free 59 API calls 19104->19107 19106 2d4d34c 19105->19106 19108 2d42eb4 _free 59 API calls 19105->19108 19109 2d4d35e 19106->19109 19110 2d42eb4 _free 59 API calls 19106->19110 19107->19105 19108->19106 19111 2d4d370 19109->19111 19112 2d42eb4 _free 59 API calls 19109->19112 19110->19109 19113 2d4d382 19111->19113 19115 2d42eb4 _free 59 API calls 19111->19115 19112->19111 19114 2d4d394 19113->19114 19116 2d42eb4 _free 59 API calls 19113->19116 19115->19113 19116->19114 19130->19079 19132 2d4d421 19131->19132 19142 2d4d479 19131->19142 19133 2d42eb4 _free 59 API calls 19132->19133 19137 2d4d431 19132->19137 19133->19137 19134 2d42eb4 _free 59 API calls 19136 2d4d443 19134->19136 19135 2d4d455 19139 2d4d467 19135->19139 19140 2d42eb4 _free 59 API calls 19135->19140 19136->19135 19138 2d42eb4 _free 59 API calls 19136->19138 19137->19134 19137->19136 19138->19135 19141 2d42eb4 _free 59 API calls 19139->19141 19139->19142 19140->19139 19141->19142 19142->19098 19144 2d4d48c 19143->19144 19145 2d44fe9 19143->19145 19146 2d42eb4 _free 59 API calls 19144->19146 19145->19083 19147 2d4d494 19146->19147 19148 2d42eb4 _free 59 API calls 19147->19148 19149 2d4d49c 19148->19149 19150 2d42eb4 _free 59 API calls 19149->19150 19151 2d4d4a4 19150->19151 19152 2d42eb4 _free 59 API calls 19151->19152 19319->19101 19320 40b578 lstrcmpiW 19321 40b586 19320->19321 19322 40b14c 19320->19322 19322->19320 19323 2d372ab InternetOpenA 19324 2d372c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 19323->19324 19358 2d366f4 shared_ptr setSBCS 19323->19358 19331 2d37342 setSBCS 19324->19331 19325 2d37322 InternetOpenUrlA 19326 2d37382 InternetCloseHandle 19325->19326 19325->19331 19326->19358 19327 2d36708 Sleep 19329 2d3670e RtlEnterCriticalSection RtlLeaveCriticalSection 19327->19329 19328 2d37346 InternetReadFile 19330 2d37377 InternetCloseHandle 19328->19330 19328->19331 19329->19358 19330->19326 19331->19325 19331->19328 19332 2d373e9 RtlEnterCriticalSection RtlLeaveCriticalSection 19434 2d4227c 19332->19434 19334 2d4227c 66 API calls 19334->19358 19335 2d42eec _malloc 59 API calls 19336 2d3749d RtlEnterCriticalSection RtlLeaveCriticalSection 19335->19336 19336->19358 19337 2d3776a RtlEnterCriticalSection RtlLeaveCriticalSection 19337->19358 19339 2d42eec 59 API calls _malloc 19339->19358 19342 2d378e2 RtlEnterCriticalSection 19343 2d3790f RtlLeaveCriticalSection 19342->19343 19342->19358 19484 2d33c67 19343->19484 19348 2d42eb4 59 API calls _free 19348->19358 19350 2d3a658 73 API calls 19350->19358 19351 2d43a8f _Allocate 60 API calls 19351->19358 19357 2d43529 60 API calls _strtok 19357->19358 19358->19323 19358->19327 19358->19329 19358->19332 19358->19334 19358->19335 19358->19337 19358->19339 19358->19342 19358->19343 19358->19348 19358->19350 19358->19351 19358->19357 19358->19358 19362 2d376e7 shared_ptr 19358->19362 19363 2d376ec Sleep 19358->19363 19366 2d35119 19358->19366 19395 2d3ab42 19358->19395 19405 2d361f5 19358->19405 19408 2d3826e 19358->19408 19414 2d3d04a 19358->19414 19419 2d3831d 19358->19419 19427 2d333b2 19358->19427 19444 2d42790 19358->19444 19447 2d3966a 19358->19447 19454 2d3a782 19358->19454 19462 2d34100 19358->19462 19466 2d42358 19358->19466 19475 2d31ba7 19358->19475 19491 2d33d7e 19358->19491 19498 2d38f36 19358->19498 19505 2d3534d 19358->19505 19362->19363 19458 2d41830 19363->19458 19367 2d35123 __EH_prolog 19366->19367 19515 2d40a50 19367->19515 19370 2d33c67 72 API calls 19371 2d3514a 19370->19371 19372 2d33d7e 64 API calls 19371->19372 19373 2d35158 19372->19373 19374 2d3826e 89 API calls 19373->19374 19375 2d3516c 19374->19375 19376 2d35322 shared_ptr 19375->19376 19519 2d3a658 19375->19519 19376->19358 19379 2d351f6 19382 2d3a658 73 API calls 19379->19382 19380 2d351c4 19381 2d3a658 73 API calls 19380->19381 19383 2d351d4 19381->19383 19384 2d35207 19382->19384 19383->19376 19386 2d3a658 73 API calls 19383->19386 19384->19376 19385 2d3a658 73 API calls 19384->19385 19387 2d3524a 19385->19387 19388 2d352b4 19386->19388 19387->19376 19389 2d3a658 73 API calls 19387->19389 19388->19376 19390 2d3a658 73 API calls 19388->19390 19389->19383 19391 2d352da 19390->19391 19391->19376 19392 2d3a658 73 API calls 19391->19392 19393 2d35304 19392->19393 19524 2d3ce0c 19393->19524 19396 2d3ab4c __EH_prolog 19395->19396 19575 2d3d021 19396->19575 19398 2d3ab6d shared_ptr 19578 2d42030 19398->19578 19400 2d3ab84 19401 2d3ab9a 19400->19401 19584 2d33fb0 19400->19584 19401->19358 19406 2d42eec _malloc 59 API calls 19405->19406 19407 2d36208 19406->19407 19409 2d382a7 19408->19409 19410 2d38286 19408->19410 19413 2d382cc 19409->19413 20030 2d32ac7 19409->20030 20027 2d39530 19410->20027 19413->19358 19415 2d40a50 Mailbox 68 API calls 19414->19415 19417 2d3d060 19415->19417 19416 2d3d14e 19416->19358 19417->19416 19418 2d32db5 73 API calls 19417->19418 19418->19417 19420 2d38338 WSASetLastError shutdown 19419->19420 19421 2d38328 19419->19421 19423 2d3a43c 69 API calls 19420->19423 19422 2d40a50 Mailbox 68 API calls 19421->19422 19424 2d3832d 19422->19424 19425 2d38355 19423->19425 19424->19358 19425->19424 19426 2d40a50 Mailbox 68 API calls 19425->19426 19426->19424 19428 2d333e1 19427->19428 19429 2d333c4 InterlockedCompareExchange 19427->19429 19431 2d329ee 76 API calls 19428->19431 19429->19428 19430 2d333d6 19429->19430 20124 2d332ab 19430->20124 19433 2d333f1 19431->19433 19433->19358 19436 2d42288 19434->19436 19439 2d422ab 19434->19439 19437 2d4228e 19436->19437 19436->19439 19438 2d45d9b __dosmaperr 59 API calls 19437->19438 19441 2d42293 19438->19441 20177 2d422c3 19439->20177 19440 2d422be 19440->19358 19442 2d44e35 __cftoe_l 9 API calls 19441->19442 19443 2d4229e 19442->19443 19443->19358 20187 2d427ae 19444->20187 19446 2d427a9 19446->19358 19448 2d39674 __EH_prolog 19447->19448 19449 2d31ba7 210 API calls 19448->19449 19451 2d396c9 19449->19451 19450 2d396e6 RtlEnterCriticalSection 19452 2d39701 19450->19452 19453 2d39704 RtlLeaveCriticalSection 19450->19453 19451->19450 19452->19453 19453->19358 19455 2d3a78c __EH_prolog 19454->19455 20193 2d3df33 19455->20193 19457 2d3a7aa shared_ptr 19457->19358 19459 2d41861 19458->19459 19460 2d4183d 19458->19460 19459->19358 19460->19459 19461 2d41851 GetProcessHeap HeapFree 19460->19461 19461->19459 19463 2d34112 19462->19463 19464 2d34118 19462->19464 20197 2d3a636 19463->20197 19464->19358 19467 2d42374 19466->19467 19468 2d42389 19466->19468 19469 2d45d9b __dosmaperr 59 API calls 19467->19469 19468->19467 19471 2d42390 19468->19471 19470 2d42379 19469->19470 19472 2d44e35 __cftoe_l 9 API calls 19470->19472 19473 2d42384 19471->19473 20199 2d45e41 19471->20199 19472->19473 19473->19358 20400 2d55330 19475->20400 19477 2d31bb1 RtlEnterCriticalSection 19478 2d31be9 RtlLeaveCriticalSection 19477->19478 19480 2d31bd1 19477->19480 20401 2d3e263 19478->20401 19480->19478 19482 2d31c55 RtlLeaveCriticalSection 19480->19482 19481 2d31c22 19481->19482 19482->19358 19485 2d40a50 Mailbox 68 API calls 19484->19485 19486 2d33c7e 19485->19486 20483 2d33ca2 19486->20483 19492 2d33dcb htons 19491->19492 19493 2d33d99 htons 19491->19493 20516 2d33c16 19492->20516 20510 2d33bd3 19493->20510 19497 2d33ded 19497->19358 19499 2d38f40 __EH_prolog 19498->19499 20547 2d3373f 19499->20547 19501 2d38f5a RtlEnterCriticalSection 19502 2d38f69 RtlLeaveCriticalSection 19501->19502 19504 2d38fa3 19502->19504 19504->19358 19506 2d42eec _malloc 59 API calls 19505->19506 19507 2d35362 SHGetSpecialFolderPathA 19506->19507 19508 2d35378 19507->19508 20556 2d436b4 19508->20556 19511 2d353e2 19511->19358 19513 2d353dc 20572 2d439c7 19513->20572 19516 2d40a79 19515->19516 19518 2d3513d 19515->19518 19517 2d432e7 __cinit 68 API calls 19516->19517 19517->19518 19518->19370 19520 2d40a50 Mailbox 68 API calls 19519->19520 19522 2d3a672 19520->19522 19521 2d3519d 19521->19376 19521->19379 19521->19380 19522->19521 19529 2d32db5 19522->19529 19525 2d40a50 Mailbox 68 API calls 19524->19525 19526 2d3ce26 19525->19526 19527 2d3cf35 19526->19527 19556 2d32b95 19526->19556 19527->19376 19530 2d32de4 19529->19530 19531 2d32dca 19529->19531 19532 2d32dfc 19530->19532 19534 2d32def 19530->19534 19533 2d40a50 Mailbox 68 API calls 19531->19533 19543 2d32d39 WSASetLastError WSASend 19532->19543 19536 2d32dcf 19533->19536 19537 2d40a50 Mailbox 68 API calls 19534->19537 19536->19522 19537->19536 19538 2d32e0c 19538->19536 19539 2d32e54 WSASetLastError select 19538->19539 19541 2d40a50 68 API calls Mailbox 19538->19541 19542 2d32d39 71 API calls 19538->19542 19553 2d3a43c 19539->19553 19541->19538 19542->19538 19544 2d3a43c 69 API calls 19543->19544 19545 2d32d6e 19544->19545 19546 2d32d75 19545->19546 19548 2d32d82 19545->19548 19547 2d40a50 Mailbox 68 API calls 19546->19547 19549 2d32d7a 19547->19549 19548->19549 19550 2d40a50 Mailbox 68 API calls 19548->19550 19551 2d32d9c 19549->19551 19552 2d40a50 Mailbox 68 API calls 19549->19552 19550->19549 19551->19538 19552->19551 19554 2d40a50 Mailbox 68 API calls 19553->19554 19555 2d3a448 WSAGetLastError 19554->19555 19555->19538 19557 2d32bb1 19556->19557 19558 2d32bc7 19556->19558 19559 2d40a50 Mailbox 68 API calls 19557->19559 19560 2d32bd2 19558->19560 19570 2d32bdf 19558->19570 19564 2d32bb6 19559->19564 19562 2d40a50 Mailbox 68 API calls 19560->19562 19561 2d32be2 WSASetLastError WSARecv 19563 2d3a43c 69 API calls 19561->19563 19562->19564 19563->19570 19564->19526 19565 2d32d22 19571 2d31996 19565->19571 19567 2d40a50 68 API calls Mailbox 19567->19570 19568 2d32cbc WSASetLastError select 19569 2d3a43c 69 API calls 19568->19569 19569->19570 19570->19561 19570->19564 19570->19565 19570->19567 19570->19568 19572 2d3199f 19571->19572 19573 2d319bb 19571->19573 19574 2d432e7 __cinit 68 API calls 19572->19574 19573->19564 19574->19573 19597 2d3e1b3 19575->19597 19577 2d3d033 19577->19398 19679 2d432fc 19578->19679 19581 2d42054 19581->19400 19582 2d4207d ResumeThread 19582->19400 19583 2d42076 CloseHandle 19583->19582 19585 2d40a50 Mailbox 68 API calls 19584->19585 19586 2d33fb8 19585->19586 19998 2d31815 19586->19998 19589 2d3a5be 19590 2d3a5c8 __EH_prolog 19589->19590 20004 2d3cb76 19590->20004 19598 2d3e1bd __EH_prolog 19597->19598 19603 2d34030 19598->19603 19601 2d3e1eb 19601->19577 19615 2d55330 19603->19615 19605 2d3403a GetProcessHeap RtlAllocateHeap 19606 2d34053 std::exception::exception 19605->19606 19607 2d3407c 19605->19607 19616 2d3a5fd 19606->19616 19607->19601 19609 2d3408a 19607->19609 19610 2d34094 __EH_prolog 19609->19610 19660 2d3a21c 19610->19660 19615->19605 19617 2d3a607 __EH_prolog 19616->19617 19624 2d3cbac 19617->19624 19622 2d4449a __CxxThrowException@8 RaiseException 19623 2d3a635 19622->19623 19630 2d3d70c 19624->19630 19627 2d3cbc6 19652 2d3d744 19627->19652 19629 2d3a624 19629->19622 19633 2d42453 19630->19633 19636 2d42481 19633->19636 19637 2d4248f 19636->19637 19640 2d3a616 19636->19640 19642 2d42517 19637->19642 19640->19627 19643 2d42520 19642->19643 19645 2d42494 19642->19645 19644 2d42eb4 _free 59 API calls 19643->19644 19644->19645 19645->19640 19646 2d424d9 19645->19646 19647 2d424e5 _strlen 19646->19647 19650 2d4250a 19646->19650 19648 2d42eec _malloc 59 API calls 19647->19648 19649 2d424f7 19648->19649 19649->19650 19651 2d46bfc __cftoe2_l 59 API calls 19649->19651 19650->19640 19651->19650 19653 2d3d74e __EH_prolog 19652->19653 19656 2d3b66f 19653->19656 19655 2d3d785 Mailbox 19655->19629 19657 2d3b679 __EH_prolog 19656->19657 19658 2d42453 std::exception::exception 59 API calls 19657->19658 19659 2d3b68a Mailbox 19658->19659 19659->19655 19671 2d3b033 19660->19671 19663 2d33fdc 19678 2d55330 19663->19678 19665 2d33fe6 CreateEventA 19666 2d3400f 19665->19666 19667 2d33ffd 19665->19667 19666->19601 19668 2d33fb0 Mailbox 68 API calls 19667->19668 19669 2d34005 19668->19669 19670 2d3a5be Mailbox 60 API calls 19669->19670 19670->19666 19672 2d340c1 19671->19672 19673 2d3b03f 19671->19673 19672->19663 19674 2d43a8f _Allocate 60 API calls 19673->19674 19675 2d3b04f std::exception::exception 19673->19675 19674->19675 19675->19672 19676 2d4449a __CxxThrowException@8 RaiseException 19675->19676 19677 2d3fa64 19676->19677 19678->19665 19680 2d4331e 19679->19680 19681 2d4330a 19679->19681 19682 2d489ac __calloc_crt 59 API calls 19680->19682 19683 2d45d9b __dosmaperr 59 API calls 19681->19683 19684 2d4332b 19682->19684 19685 2d4330f 19683->19685 19686 2d4337c 19684->19686 19688 2d45b9a __CreateFrameInfo 59 API calls 19684->19688 19687 2d44e35 __cftoe_l 9 API calls 19685->19687 19689 2d42eb4 _free 59 API calls 19686->19689 19690 2d4204b 19687->19690 19691 2d43338 19688->19691 19692 2d43382 19689->19692 19690->19581 19690->19582 19690->19583 19693 2d45c21 __initptd 59 API calls 19691->19693 19692->19690 19698 2d45d7a 19692->19698 19694 2d43341 CreateThread 19693->19694 19694->19690 19697 2d43374 GetLastError 19694->19697 19706 2d4345c 19694->19706 19697->19686 19703 2d45d67 19698->19703 19700 2d45d83 __dosmaperr 19701 2d45d9b __dosmaperr 59 API calls 19700->19701 19702 2d45d96 19701->19702 19702->19690 19704 2d45bb2 __getptd_noexit 59 API calls 19703->19704 19705 2d45d6c 19704->19705 19705->19700 19707 2d43465 __threadstartex@4 19706->19707 19708 2d4910b __threadstartex@4 TlsGetValue 19707->19708 19709 2d4346b 19708->19709 19710 2d43472 __threadstartex@4 19709->19710 19711 2d4349e 19709->19711 19714 2d4912a __threadstartex@4 TlsSetValue 19710->19714 19712 2d45a2f __freefls@4 59 API calls 19711->19712 19713 2d434b9 ___crtIsPackagedApp 19712->19713 19716 2d434cd 19713->19716 19722 2d43404 19713->19722 19715 2d43481 19714->19715 19717 2d43494 GetCurrentThreadId 19715->19717 19718 2d43487 GetLastError RtlExitUserThread 19715->19718 19728 2d43395 19716->19728 19717->19713 19718->19717 19723 2d43446 RtlDecodePointer 19722->19723 19724 2d4340d LoadLibraryExW GetProcAddress 19722->19724 19727 2d43456 19723->19727 19725 2d43430 RtlEncodePointer 19724->19725 19726 2d4342f 19724->19726 19725->19723 19726->19716 19727->19716 19729 2d433a1 __mtinitlocknum 19728->19729 19730 2d45b9a __CreateFrameInfo 59 API calls 19729->19730 19731 2d433a6 19730->19731 19738 2d420a0 19731->19738 19756 2d41550 19738->19756 19741 2d420f0 19778 2d3dce7 19741->19778 19742 2d420e8 TlsSetValue 19742->19741 19773 2d415b4 19756->19773 19757 2d41630 19758 2d41646 19757->19758 19759 2d41643 CloseHandle 19757->19759 19761 2d4448b __cftoe_l 6 API calls 19758->19761 19759->19758 19760 2d4160e ResetEvent 19765 2d41615 19760->19765 19764 2d4165e 19761->19764 19762 2d415e5 OpenEventA 19768 2d41607 19762->19768 19769 2d415ff 19762->19769 19763 2d415cc 19763->19760 19763->19762 19794 2d41b50 19763->19794 19764->19741 19764->19742 19798 2d41790 19765->19798 19766 2d416dc WaitForSingleObject 19766->19773 19768->19760 19768->19765 19769->19768 19771 2d41604 CloseHandle 19769->19771 19770 2d415e2 19770->19762 19771->19768 19772 2d416b0 CreateEventA 19772->19773 19773->19757 19773->19763 19773->19766 19773->19772 19775 2d41b50 GetCurrentProcessId 19773->19775 19776 2d416ce CloseHandle 19773->19776 19775->19773 19776->19773 19779 2d3dd09 19778->19779 19809 2d34d86 19779->19809 19808 2d40bb0 19794->19808 19796 2d41ba2 GetCurrentProcessId 19797 2d41bb5 19796->19797 19797->19770 19799 2d4179f 19798->19799 19802 2d417d5 CreateEventA 19799->19802 19803 2d41b50 GetCurrentProcessId 19799->19803 19804 2d417f7 19799->19804 19800 2d41803 SetEvent 19801 2d4162d 19800->19801 19801->19757 19802->19804 19805 2d417eb 19802->19805 19806 2d417d2 19803->19806 19804->19800 19804->19801 19805->19804 19806->19802 19808->19796 20001 2d42413 19998->20001 20002 2d424d9 std::exception::_Copy_str 59 API calls 20001->20002 20003 2d3182a 20002->20003 20003->19589 20010 2d3d63d 20004->20010 20007 2d3cb90 20019 2d3d675 20007->20019 20013 2d3b161 20010->20013 20014 2d3b16b __EH_prolog 20013->20014 20015 2d42453 std::exception::exception 59 API calls 20014->20015 20016 2d3b17c 20015->20016 20017 2d37c31 std::bad_exception::bad_exception 60 API calls 20016->20017 20018 2d3a5dd 20017->20018 20018->20007 20020 2d3d67f __EH_prolog 20019->20020 20023 2d3b559 20020->20023 20024 2d3b563 __EH_prolog 20023->20024 20025 2d3b161 std::bad_exception::bad_exception 60 API calls 20024->20025 20048 2d3353e 20027->20048 20031 2d32ae8 WSASetLastError connect 20030->20031 20032 2d32ad8 20030->20032 20033 2d3a43c 69 API calls 20031->20033 20034 2d40a50 Mailbox 68 API calls 20032->20034 20036 2d32b07 20033->20036 20035 2d32add 20034->20035 20038 2d40a50 Mailbox 68 API calls 20035->20038 20036->20035 20037 2d40a50 Mailbox 68 API calls 20036->20037 20037->20035 20039 2d32b1b 20038->20039 20041 2d40a50 Mailbox 68 API calls 20039->20041 20043 2d32b38 20039->20043 20041->20043 20044 2d32b87 20043->20044 20108 2d33027 20043->20108 20044->19413 20047 2d40a50 Mailbox 68 API calls 20047->20044 20049 2d33548 __EH_prolog 20048->20049 20050 2d33557 20049->20050 20051 2d33576 20049->20051 20052 2d31996 68 API calls 20050->20052 20070 2d32edd WSASetLastError WSASocketA 20051->20070 20069 2d3355f 20052->20069 20055 2d335ad CreateIoCompletionPort 20056 2d335c5 GetLastError 20055->20056 20057 2d335db 20055->20057 20058 2d40a50 Mailbox 68 API calls 20056->20058 20059 2d40a50 Mailbox 68 API calls 20057->20059 20060 2d335d2 20058->20060 20059->20060 20061 2d335ef 20060->20061 20063 2d33626 20060->20063 20062 2d40a50 Mailbox 68 API calls 20061->20062 20064 2d33608 20062->20064 20096 2d3de26 20063->20096 20078 2d329ee 20064->20078 20067 2d33659 20068 2d40a50 Mailbox 68 API calls 20067->20068 20068->20069 20069->19409 20071 2d40a50 Mailbox 68 API calls 20070->20071 20072 2d32f0a WSAGetLastError 20071->20072 20073 2d32f21 20072->20073 20074 2d32f41 20072->20074 20075 2d32f27 setsockopt 20073->20075 20076 2d32f3c 20073->20076 20074->20055 20074->20069 20075->20076 20077 2d40a50 Mailbox 68 API calls 20076->20077 20077->20074 20079 2d32a0c 20078->20079 20095 2d32aad 20078->20095 20081 2d32a39 WSASetLastError closesocket 20079->20081 20083 2d40a50 Mailbox 68 API calls 20079->20083 20080 2d40a50 Mailbox 68 API calls 20084 2d32ab8 20080->20084 20082 2d3a43c 69 API calls 20081->20082 20085 2d32a51 20082->20085 20086 2d32a21 20083->20086 20084->20069 20088 2d40a50 Mailbox 68 API calls 20085->20088 20085->20095 20100 2d32f50 20086->20100 20090 2d32a5c 20088->20090 20091 2d32a7b ioctlsocket WSASetLastError closesocket 20090->20091 20092 2d40a50 Mailbox 68 API calls 20090->20092 20093 2d3a43c 69 API calls 20091->20093 20094 2d32a6e 20092->20094 20093->20095 20094->20091 20094->20095 20095->20080 20095->20084 20097 2d3de30 __EH_prolog 20096->20097 20098 2d43a8f _Allocate 60 API calls 20097->20098 20099 2d3de44 20098->20099 20099->20067 20101 2d32f70 WSASetLastError setsockopt 20100->20101 20102 2d32f5b 20100->20102 20104 2d3a43c 69 API calls 20101->20104 20103 2d40a50 Mailbox 68 API calls 20102->20103 20105 2d32a36 20103->20105 20106 2d32f9e 20104->20106 20105->20081 20106->20105 20107 2d40a50 Mailbox 68 API calls 20106->20107 20107->20105 20109 2d3303b 20108->20109 20110 2d3304d WSASetLastError select 20108->20110 20111 2d40a50 Mailbox 68 API calls 20109->20111 20112 2d3a43c 69 API calls 20110->20112 20113 2d32b59 20111->20113 20114 2d33095 20112->20114 20113->20044 20116 2d32fb4 20113->20116 20114->20113 20115 2d40a50 Mailbox 68 API calls 20114->20115 20115->20113 20117 2d32fc0 20116->20117 20118 2d32fd5 WSASetLastError getsockopt 20116->20118 20119 2d40a50 Mailbox 68 API calls 20117->20119 20120 2d3a43c 69 API calls 20118->20120 20123 2d32b7a 20119->20123 20121 2d3300f 20120->20121 20122 2d40a50 Mailbox 68 API calls 20121->20122 20121->20123 20122->20123 20123->20044 20123->20047 20131 2d55330 20124->20131 20126 2d332b5 RtlEnterCriticalSection 20127 2d40a50 Mailbox 68 API calls 20126->20127 20128 2d332d6 20127->20128 20132 2d33307 20128->20132 20131->20126 20134 2d33311 __EH_prolog 20132->20134 20135 2d33350 20134->20135 20144 2d37db5 20134->20144 20148 2d3239d 20135->20148 20138 2d33390 20154 2d37d5e 20138->20154 20139 2d40a50 Mailbox 68 API calls 20141 2d3337c 20139->20141 20143 2d32d39 71 API calls 20141->20143 20143->20138 20145 2d37dc3 20144->20145 20147 2d37e39 20145->20147 20158 2d3891a 20145->20158 20147->20134 20152 2d323ab 20148->20152 20149 2d32417 20149->20138 20149->20139 20150 2d323c1 PostQueuedCompletionStatus 20151 2d323da RtlEnterCriticalSection 20150->20151 20150->20152 20151->20152 20152->20149 20152->20150 20153 2d323f8 InterlockedExchange RtlLeaveCriticalSection 20152->20153 20153->20152 20155 2d37d63 20154->20155 20156 2d332ee RtlLeaveCriticalSection 20155->20156 20174 2d31e7f 20155->20174 20156->19428 20159 2d38944 20158->20159 20160 2d37d5e 68 API calls 20159->20160 20161 2d3898a 20160->20161 20162 2d389b1 20161->20162 20164 2d3a1a7 20161->20164 20162->20147 20165 2d3a1b1 20164->20165 20166 2d3a1c1 20164->20166 20165->20166 20169 2d3fa65 20165->20169 20166->20162 20170 2d42413 std::exception::exception 59 API calls 20169->20170 20171 2d3fa7d 20170->20171 20172 2d4449a __CxxThrowException@8 RaiseException 20171->20172 20173 2d3fa92 20172->20173 20175 2d40a50 Mailbox 68 API calls 20174->20175 20176 2d31e90 20175->20176 20176->20155 20178 2d421bb _LocaleUpdate::_LocaleUpdate 59 API calls 20177->20178 20179 2d422d7 20178->20179 20180 2d422e5 20179->20180 20184 2d422fc 20179->20184 20181 2d45d9b __dosmaperr 59 API calls 20180->20181 20182 2d422ea 20181->20182 20183 2d44e35 __cftoe_l 9 API calls 20182->20183 20186 2d422f5 ___ascii_stricmp 20183->20186 20185 2d458ba 66 API calls __tolower_l 20184->20185 20184->20186 20185->20184 20186->19440 20188 2d427cb 20187->20188 20189 2d45d9b __dosmaperr 59 API calls 20188->20189 20192 2d427db _strlen 20188->20192 20190 2d427d0 20189->20190 20191 2d44e35 __cftoe_l 9 API calls 20190->20191 20191->20192 20192->19446 20194 2d3df3d __EH_prolog 20193->20194 20195 2d43a8f _Allocate 60 API calls 20194->20195 20196 2d3df54 20195->20196 20196->19457 20198 2d3a645 GetProcessHeap HeapFree 20197->20198 20198->19464 20220 2d49d71 20199->20220 20201 2d45e4f 20202 2d45e71 20201->20202 20203 2d45e5a 20201->20203 20205 2d45e76 20202->20205 20213 2d45e83 __flsbuf 20202->20213 20204 2d45d9b __dosmaperr 59 API calls 20203->20204 20206 2d45e5f 20204->20206 20207 2d45d9b __dosmaperr 59 API calls 20205->20207 20206->19473 20207->20206 20208 2d45ee7 20211 2d45f01 20208->20211 20215 2d45f18 20208->20215 20209 2d45f61 20210 2d49d95 __write 79 API calls 20209->20210 20210->20206 20239 2d49d95 20211->20239 20213->20206 20216 2d45ed2 20213->20216 20219 2d45edd 20213->20219 20227 2d4f6e2 20213->20227 20215->20206 20267 2d4f736 20215->20267 20216->20219 20236 2d4f8a5 20216->20236 20219->20208 20219->20209 20221 2d49d90 20220->20221 20222 2d49d7b 20220->20222 20221->20201 20223 2d45d9b __dosmaperr 59 API calls 20222->20223 20224 2d49d80 20223->20224 20225 2d44e35 __cftoe_l 9 API calls 20224->20225 20226 2d49d8b 20225->20226 20226->20201 20228 2d4f6ed 20227->20228 20229 2d4f6fa 20227->20229 20230 2d45d9b __dosmaperr 59 API calls 20228->20230 20231 2d4f706 20229->20231 20232 2d45d9b __dosmaperr 59 API calls 20229->20232 20233 2d4f6f2 20230->20233 20231->20216 20234 2d4f727 20232->20234 20233->20216 20235 2d44e35 __cftoe_l 9 API calls 20234->20235 20235->20233 20237 2d489f4 __malloc_crt 59 API calls 20236->20237 20238 2d4f8ba 20237->20238 20238->20219 20240 2d49da1 __mtinitlocknum 20239->20240 20241 2d49dc5 20240->20241 20242 2d49dae 20240->20242 20243 2d49e64 20241->20243 20245 2d49dd9 20241->20245 20244 2d45d67 __dosmaperr 59 API calls 20242->20244 20246 2d45d67 __dosmaperr 59 API calls 20243->20246 20247 2d49db3 20244->20247 20248 2d49df7 20245->20248 20249 2d49e01 20245->20249 20250 2d49dfc 20246->20250 20251 2d45d9b __dosmaperr 59 API calls 20247->20251 20252 2d45d67 __dosmaperr 59 API calls 20248->20252 20292 2d50bc7 20249->20292 20255 2d45d9b __dosmaperr 59 API calls 20250->20255 20262 2d49dba __mtinitlocknum 20251->20262 20252->20250 20254 2d49e07 20256 2d49e2d 20254->20256 20257 2d49e1a 20254->20257 20258 2d49e70 20255->20258 20261 2d45d9b __dosmaperr 59 API calls 20256->20261 20301 2d49e84 20257->20301 20260 2d44e35 __cftoe_l 9 API calls 20258->20260 20260->20262 20264 2d49e32 20261->20264 20262->20206 20263 2d49e26 20360 2d49e5c 20263->20360 20265 2d45d67 __dosmaperr 59 API calls 20264->20265 20265->20263 20268 2d4f742 __mtinitlocknum 20267->20268 20269 2d4f753 20268->20269 20270 2d4f76b 20268->20270 20271 2d45d67 __dosmaperr 59 API calls 20269->20271 20272 2d4f810 20270->20272 20276 2d4f7a0 20270->20276 20274 2d4f758 20271->20274 20273 2d45d67 __dosmaperr 59 API calls 20272->20273 20275 2d4f815 20273->20275 20277 2d45d9b __dosmaperr 59 API calls 20274->20277 20278 2d45d9b __dosmaperr 59 API calls 20275->20278 20279 2d50bc7 ___lock_fhandle 60 API calls 20276->20279 20280 2d4f760 __mtinitlocknum 20277->20280 20281 2d4f81d 20278->20281 20282 2d4f7a6 20279->20282 20280->20206 20283 2d44e35 __cftoe_l 9 API calls 20281->20283 20284 2d4f7d4 20282->20284 20285 2d4f7bc 20282->20285 20283->20280 20287 2d45d9b __dosmaperr 59 API calls 20284->20287 20286 2d4f832 __lseeki64_nolock 61 API calls 20285->20286 20290 2d4f7cb 20286->20290 20288 2d4f7d9 20287->20288 20289 2d45d67 __dosmaperr 59 API calls 20288->20289 20289->20290 20396 2d4f808 20290->20396 20293 2d50bd3 __mtinitlocknum 20292->20293 20294 2d50c22 RtlEnterCriticalSection 20293->20294 20295 2d4882d __lock 59 API calls 20293->20295 20296 2d50c48 __mtinitlocknum 20294->20296 20297 2d50bf8 20295->20297 20296->20254 20298 2d4914c __mtinitlocknum InitializeCriticalSectionAndSpinCount 20297->20298 20300 2d50c10 20297->20300 20298->20300 20363 2d50c4c 20300->20363 20302 2d49e91 __write_nolock 20301->20302 20303 2d49ed0 20302->20303 20304 2d49eef 20302->20304 20333 2d49ec5 20302->20333 20306 2d45d67 __dosmaperr 59 API calls 20303->20306 20307 2d49f47 20304->20307 20308 2d49f2b 20304->20308 20305 2d4448b __cftoe_l 6 API calls 20309 2d4a6e5 20305->20309 20310 2d49ed5 20306->20310 20312 2d49f60 20307->20312 20367 2d4f832 20307->20367 20311 2d45d67 __dosmaperr 59 API calls 20308->20311 20309->20263 20313 2d45d9b __dosmaperr 59 API calls 20310->20313 20315 2d49f30 20311->20315 20314 2d4f6e2 __read_nolock 59 API calls 20312->20314 20317 2d49edc 20313->20317 20319 2d49f6e 20314->20319 20320 2d45d9b __dosmaperr 59 API calls 20315->20320 20318 2d44e35 __cftoe_l 9 API calls 20317->20318 20318->20333 20321 2d4a2c7 20319->20321 20326 2d45b9a __CreateFrameInfo 59 API calls 20319->20326 20322 2d49f37 20320->20322 20323 2d4a2e5 20321->20323 20324 2d4a65a WriteFile 20321->20324 20325 2d44e35 __cftoe_l 9 API calls 20322->20325 20327 2d4a409 20323->20327 20336 2d4a2fb 20323->20336 20328 2d4a2ba GetLastError 20324->20328 20334 2d4a287 20324->20334 20325->20333 20329 2d49f9a GetConsoleMode 20326->20329 20340 2d4a414 20327->20340 20352 2d4a4fe 20327->20352 20328->20334 20329->20321 20331 2d49fd9 20329->20331 20330 2d4a693 20332 2d45d9b __dosmaperr 59 API calls 20330->20332 20330->20333 20331->20321 20335 2d49fe9 GetConsoleCP 20331->20335 20338 2d4a6c1 20332->20338 20333->20305 20334->20330 20334->20333 20339 2d4a3e7 20334->20339 20335->20330 20358 2d4a018 20335->20358 20336->20330 20336->20334 20337 2d4a36a WriteFile 20336->20337 20337->20328 20337->20336 20342 2d45d67 __dosmaperr 59 API calls 20338->20342 20343 2d4a3f2 20339->20343 20344 2d4a68a 20339->20344 20340->20330 20340->20334 20341 2d4a479 WriteFile 20340->20341 20341->20328 20341->20340 20342->20333 20346 2d45d9b __dosmaperr 59 API calls 20343->20346 20347 2d45d7a __dosmaperr 59 API calls 20344->20347 20345 2d4a573 WideCharToMultiByte 20345->20328 20345->20352 20349 2d4a3f7 20346->20349 20347->20333 20348 2d4a5c2 WriteFile 20351 2d4a615 GetLastError 20348->20351 20348->20352 20353 2d45d67 __dosmaperr 59 API calls 20349->20353 20351->20352 20352->20330 20352->20334 20352->20345 20352->20348 20353->20333 20354 2d4ff4a 61 API calls __write_nolock 20354->20358 20355 2d50f93 WriteConsoleW CreateFileW __putwch_nolock 20355->20358 20356 2d4a101 WideCharToMultiByte 20356->20334 20357 2d4a13c WriteFile 20356->20357 20357->20328 20357->20358 20358->20328 20358->20334 20358->20354 20358->20355 20358->20356 20359 2d4a196 WriteFile 20358->20359 20376 2d4dc88 20358->20376 20359->20328 20359->20358 20395 2d50f6d RtlLeaveCriticalSection 20360->20395 20362 2d49e62 20362->20262 20366 2d48997 RtlLeaveCriticalSection 20363->20366 20365 2d50c53 20365->20294 20366->20365 20379 2d50e84 20367->20379 20369 2d4f842 20370 2d4f84a 20369->20370 20371 2d4f85b SetFilePointerEx 20369->20371 20372 2d45d9b __dosmaperr 59 API calls 20370->20372 20373 2d4f873 GetLastError 20371->20373 20374 2d4f84f 20371->20374 20372->20374 20375 2d45d7a __dosmaperr 59 API calls 20373->20375 20374->20312 20375->20374 20392 2d4dc4e 20376->20392 20380 2d50e8f 20379->20380 20382 2d50ea4 20379->20382 20381 2d45d67 __dosmaperr 59 API calls 20380->20381 20384 2d50e94 20381->20384 20383 2d45d67 __dosmaperr 59 API calls 20382->20383 20385 2d50ec9 20382->20385 20386 2d50ed3 20383->20386 20387 2d45d9b __dosmaperr 59 API calls 20384->20387 20385->20369 20388 2d45d9b __dosmaperr 59 API calls 20386->20388 20389 2d50e9c 20387->20389 20390 2d50edb 20388->20390 20389->20369 20391 2d44e35 __cftoe_l 9 API calls 20390->20391 20391->20389 20393 2d421bb _LocaleUpdate::_LocaleUpdate 59 API calls 20392->20393 20394 2d4dc5f 20393->20394 20394->20358 20395->20362 20399 2d50f6d RtlLeaveCriticalSection 20396->20399 20398 2d4f80e 20398->20280 20399->20398 20400->19477 20402 2d3e26d __EH_prolog 20401->20402 20403 2d43a8f _Allocate 60 API calls 20402->20403 20404 2d3e276 20403->20404 20405 2d31bfa RtlEnterCriticalSection 20404->20405 20407 2d3e484 20404->20407 20405->19481 20408 2d3e48e __EH_prolog 20407->20408 20411 2d326db RtlEnterCriticalSection 20408->20411 20410 2d3e4e4 20410->20405 20412 2d32728 CreateWaitableTimerA 20411->20412 20413 2d3277e 20411->20413 20414 2d3275b SetWaitableTimer 20412->20414 20415 2d32738 GetLastError 20412->20415 20416 2d327d5 RtlLeaveCriticalSection 20413->20416 20418 2d43a8f _Allocate 60 API calls 20413->20418 20414->20413 20417 2d40a50 Mailbox 68 API calls 20415->20417 20416->20410 20420 2d32745 20417->20420 20419 2d3278a 20418->20419 20422 2d43a8f _Allocate 60 API calls 20419->20422 20423 2d327c8 20419->20423 20455 2d31712 20420->20455 20424 2d327a9 20422->20424 20461 2d37d36 20423->20461 20427 2d31cf8 CreateEventA 20424->20427 20428 2d31d23 GetLastError 20427->20428 20429 2d31d52 CreateEventA 20427->20429 20433 2d31d33 20428->20433 20430 2d31d6b GetLastError 20429->20430 20431 2d31d96 20429->20431 20434 2d31d7b 20430->20434 20432 2d432fc __beginthreadex 201 API calls 20431->20432 20435 2d31db6 20432->20435 20436 2d40a50 Mailbox 68 API calls 20433->20436 20437 2d40a50 Mailbox 68 API calls 20434->20437 20438 2d31dc6 GetLastError 20435->20438 20439 2d31e0d 20435->20439 20440 2d31d3c 20436->20440 20441 2d31d84 20437->20441 20446 2d31dd8 20438->20446 20442 2d31e11 WaitForSingleObject CloseHandle 20439->20442 20443 2d31e1d 20439->20443 20444 2d31712 60 API calls 20440->20444 20445 2d31712 60 API calls 20441->20445 20442->20443 20443->20423 20447 2d31d4e 20444->20447 20445->20431 20448 2d31ddf 20446->20448 20449 2d31ddc CloseHandle 20446->20449 20447->20429 20450 2d31de9 CloseHandle 20448->20450 20451 2d31dee 20448->20451 20449->20448 20450->20451 20452 2d40a50 Mailbox 68 API calls 20451->20452 20453 2d31dfb 20452->20453 20454 2d31712 60 API calls 20453->20454 20454->20439 20456 2d3171c __EH_prolog 20455->20456 20457 2d3173e 20456->20457 20458 2d31815 Mailbox 59 API calls 20456->20458 20457->20414 20459 2d31732 20458->20459 20464 2d3a3d5 20459->20464 20462 2d37d52 20461->20462 20463 2d37d43 CloseHandle 20461->20463 20462->20416 20463->20462 20465 2d3a3df __EH_prolog 20464->20465 20472 2d3c93a 20465->20472 20469 2d3a400 20470 2d4449a __CxxThrowException@8 RaiseException 20469->20470 20471 2d3a40e 20470->20471 20473 2d3b161 std::bad_exception::bad_exception 60 API calls 20472->20473 20474 2d3a3f2 20473->20474 20475 2d3c976 20474->20475 20476 2d3c980 __EH_prolog 20475->20476 20479 2d3b110 20476->20479 20478 2d3c9af Mailbox 20478->20469 20480 2d3b11a __EH_prolog 20479->20480 20481 2d3b161 std::bad_exception::bad_exception 60 API calls 20480->20481 20482 2d3b12b Mailbox 20481->20482 20482->20478 20494 2d330ae WSASetLastError 20483->20494 20486 2d330ae 71 API calls 20487 2d33c90 20486->20487 20488 2d316ae 20487->20488 20489 2d316b8 __EH_prolog 20488->20489 20490 2d31701 20489->20490 20491 2d42413 std::exception::exception 59 API calls 20489->20491 20490->19358 20492 2d316dc 20491->20492 20493 2d3a3d5 60 API calls 20492->20493 20493->20490 20495 2d330ce 20494->20495 20496 2d330ec WSAStringToAddressA 20494->20496 20495->20496 20497 2d330d3 20495->20497 20498 2d3a43c 69 API calls 20496->20498 20499 2d40a50 Mailbox 68 API calls 20497->20499 20500 2d33114 20498->20500 20503 2d330d8 20499->20503 20501 2d33154 20500->20501 20506 2d3311e _memcmp 20500->20506 20502 2d33135 20501->20502 20507 2d40a50 Mailbox 68 API calls 20501->20507 20504 2d33193 20502->20504 20508 2d40a50 Mailbox 68 API calls 20502->20508 20503->20486 20503->20487 20504->20503 20509 2d40a50 Mailbox 68 API calls 20504->20509 20505 2d40a50 Mailbox 68 API calls 20505->20502 20506->20502 20506->20505 20507->20502 20508->20504 20509->20503 20511 2d33bdd __EH_prolog 20510->20511 20512 2d33bfe htonl htonl 20511->20512 20522 2d423f7 20511->20522 20512->19497 20517 2d33c20 __EH_prolog 20516->20517 20518 2d33c41 20517->20518 20519 2d423f7 std::bad_exception::bad_exception 59 API calls 20517->20519 20518->19497 20520 2d33c35 20519->20520 20521 2d3a58a 60 API calls 20520->20521 20521->20518 20523 2d42413 std::exception::exception 59 API calls 20522->20523 20524 2d33bf2 20523->20524 20525 2d3a58a 20524->20525 20526 2d3a594 __EH_prolog 20525->20526 20533 2d3caad 20526->20533 20530 2d3a5af 20531 2d4449a __CxxThrowException@8 RaiseException 20530->20531 20532 2d3a5bd 20531->20532 20540 2d423dc 20533->20540 20536 2d3cae9 20537 2d3caf3 __EH_prolog 20536->20537 20543 2d3b47f 20537->20543 20539 2d3cb22 Mailbox 20539->20530 20541 2d42453 std::exception::exception 59 API calls 20540->20541 20542 2d3a5a1 20541->20542 20542->20536 20544 2d3b489 __EH_prolog 20543->20544 20545 2d423dc std::bad_exception::bad_exception 59 API calls 20544->20545 20546 2d3b49a Mailbox 20545->20546 20546->20539 20548 2d33770 20547->20548 20549 2d33755 InterlockedCompareExchange 20547->20549 20550 2d40a50 Mailbox 68 API calls 20548->20550 20549->20548 20551 2d33765 20549->20551 20552 2d33779 20550->20552 20553 2d332ab 78 API calls 20551->20553 20554 2d329ee 76 API calls 20552->20554 20553->20548 20555 2d3378e 20554->20555 20555->19501 20585 2d435f0 20556->20585 20558 2d353c8 20558->19511 20559 2d43849 20558->20559 20560 2d43855 __mtinitlocknum 20559->20560 20561 2d43873 20560->20561 20562 2d4388b 20560->20562 20564 2d43883 __mtinitlocknum 20560->20564 20563 2d45d9b __dosmaperr 59 API calls 20561->20563 20727 2d49732 20562->20727 20567 2d43878 20563->20567 20564->19513 20569 2d44e35 __cftoe_l 9 API calls 20567->20569 20569->20564 20573 2d439d3 __mtinitlocknum 20572->20573 20574 2d439e7 20573->20574 20575 2d439ff 20573->20575 20576 2d45d9b __dosmaperr 59 API calls 20574->20576 20578 2d49732 __lock_file 60 API calls 20575->20578 20580 2d439f7 __mtinitlocknum 20575->20580 20577 2d439ec 20576->20577 20579 2d44e35 __cftoe_l 9 API calls 20577->20579 20581 2d43a11 20578->20581 20579->20580 20580->19511 20754 2d4395b 20581->20754 20587 2d435fc __mtinitlocknum 20585->20587 20586 2d4360e 20588 2d45d9b __dosmaperr 59 API calls 20586->20588 20587->20586 20590 2d4363b 20587->20590 20589 2d43613 20588->20589 20591 2d44e35 __cftoe_l 9 API calls 20589->20591 20604 2d49808 20590->20604 20600 2d4361e __mtinitlocknum @_EH4_CallFilterFunc@8 20591->20600 20593 2d43640 20594 2d43656 20593->20594 20595 2d43649 20593->20595 20597 2d4367f 20594->20597 20598 2d4365f 20594->20598 20596 2d45d9b __dosmaperr 59 API calls 20595->20596 20596->20600 20619 2d49927 20597->20619 20601 2d45d9b __dosmaperr 59 API calls 20598->20601 20600->20558 20601->20600 20605 2d49814 __mtinitlocknum 20604->20605 20606 2d4882d __lock 59 API calls 20605->20606 20617 2d49822 20606->20617 20607 2d49896 20649 2d4991e 20607->20649 20608 2d4989d 20610 2d489f4 __malloc_crt 59 API calls 20608->20610 20612 2d498a4 20610->20612 20611 2d49913 __mtinitlocknum 20611->20593 20612->20607 20613 2d4914c __mtinitlocknum InitializeCriticalSectionAndSpinCount 20612->20613 20616 2d498ca RtlEnterCriticalSection 20613->20616 20614 2d488b5 __mtinitlocknum 59 API calls 20614->20617 20616->20607 20617->20607 20617->20608 20617->20614 20639 2d49771 20617->20639 20644 2d497db 20617->20644 20621 2d49944 20619->20621 20620 2d49958 20622 2d45d9b __dosmaperr 59 API calls 20620->20622 20621->20620 20635 2d49aff 20621->20635 20654 2d5078e 20621->20654 20623 2d4995d 20622->20623 20625 2d44e35 __cftoe_l 9 API calls 20623->20625 20624 2d49b5b 20660 2d50770 20624->20660 20627 2d4368a 20625->20627 20636 2d436ac 20627->20636 20632 2d508bd __openfile 59 API calls 20633 2d49b17 20632->20633 20634 2d508bd __openfile 59 API calls 20633->20634 20633->20635 20634->20635 20635->20620 20635->20624 20720 2d497a1 20636->20720 20638 2d436b2 20638->20600 20640 2d49792 RtlEnterCriticalSection 20639->20640 20641 2d4977c 20639->20641 20640->20617 20642 2d4882d __lock 59 API calls 20641->20642 20643 2d49785 20642->20643 20643->20617 20645 2d497fc RtlLeaveCriticalSection 20644->20645 20646 2d497e9 20644->20646 20645->20617 20652 2d48997 RtlLeaveCriticalSection 20646->20652 20648 2d497f9 20648->20617 20653 2d48997 RtlLeaveCriticalSection 20649->20653 20651 2d49925 20651->20611 20652->20648 20653->20651 20663 2d507a6 20654->20663 20656 2d49ac5 20656->20620 20657 2d508bd 20656->20657 20671 2d508d5 20657->20671 20659 2d49af8 20659->20632 20659->20635 20678 2d50659 20660->20678 20662 2d50789 20662->20627 20664 2d507bb 20663->20664 20667 2d507b4 20663->20667 20665 2d421bb _LocaleUpdate::_LocaleUpdate 59 API calls 20664->20665 20666 2d507c8 20665->20666 20666->20667 20668 2d45d9b __dosmaperr 59 API calls 20666->20668 20667->20656 20669 2d507fb 20668->20669 20670 2d44e35 __cftoe_l 9 API calls 20669->20670 20670->20667 20672 2d421bb _LocaleUpdate::_LocaleUpdate 59 API calls 20671->20672 20673 2d508e8 20672->20673 20674 2d45d9b __dosmaperr 59 API calls 20673->20674 20677 2d508fd 20673->20677 20675 2d50929 20674->20675 20676 2d44e35 __cftoe_l 9 API calls 20675->20676 20676->20677 20677->20659 20680 2d50665 __mtinitlocknum 20678->20680 20679 2d5067b 20681 2d45d9b __dosmaperr 59 API calls 20679->20681 20680->20679 20682 2d506b1 20680->20682 20683 2d50680 20681->20683 20689 2d50722 20682->20689 20685 2d44e35 __cftoe_l 9 API calls 20683->20685 20688 2d5068a __mtinitlocknum 20685->20688 20688->20662 20698 2d48176 20689->20698 20691 2d506cd 20694 2d506f6 20691->20694 20692 2d50736 20692->20691 20693 2d42eb4 _free 59 API calls 20692->20693 20693->20691 20695 2d506fc 20694->20695 20697 2d50720 20694->20697 20719 2d50f6d RtlLeaveCriticalSection 20695->20719 20697->20688 20699 2d48183 20698->20699 20700 2d48199 20698->20700 20701 2d45d9b __dosmaperr 59 API calls 20699->20701 20700->20699 20702 2d481a0 ___crtIsPackagedApp 20700->20702 20703 2d48188 20701->20703 20705 2d481b6 MultiByteToWideChar 20702->20705 20706 2d481a9 AreFileApisANSI 20702->20706 20704 2d44e35 __cftoe_l 9 API calls 20703->20704 20713 2d48192 20704->20713 20708 2d481d0 GetLastError 20705->20708 20709 2d481e1 20705->20709 20706->20705 20707 2d481b3 20706->20707 20707->20705 20710 2d45d7a __dosmaperr 59 API calls 20708->20710 20711 2d489f4 __malloc_crt 59 API calls 20709->20711 20710->20713 20712 2d481e9 20711->20712 20712->20713 20714 2d481f0 MultiByteToWideChar 20712->20714 20713->20692 20714->20713 20715 2d48206 GetLastError 20714->20715 20716 2d45d7a __dosmaperr 59 API calls 20715->20716 20717 2d48212 20716->20717 20718 2d42eb4 _free 59 API calls 20717->20718 20718->20713 20719->20697 20721 2d497b0 20720->20721 20722 2d497cf RtlLeaveCriticalSection 20720->20722 20721->20722 20723 2d497b7 20721->20723 20722->20638 20726 2d48997 RtlLeaveCriticalSection 20723->20726 20725 2d497cc 20725->20638 20726->20725 20728 2d49764 RtlEnterCriticalSection 20727->20728 20729 2d49742 20727->20729 20731 2d43891 20728->20731 20729->20728 20730 2d4974a 20729->20730 20732 2d4882d __lock 59 API calls 20730->20732 20733 2d436f0 20731->20733 20732->20731 20735 2d436ff 20733->20735 20740 2d4371d 20733->20740 20734 2d4370d 20736 2d45d9b __dosmaperr 59 API calls 20734->20736 20735->20734 20735->20740 20742 2d43737 _memmove 20735->20742 20737 2d43712 20736->20737 20738 2d44e35 __cftoe_l 9 API calls 20737->20738 20738->20740 20739 2d45e41 __flsbuf 79 API calls 20739->20742 20745 2d438c3 20740->20745 20742->20739 20742->20740 20743 2d49d71 __flush 59 API calls 20742->20743 20744 2d49d95 __write 79 API calls 20742->20744 20748 2d4a72f 20742->20748 20743->20742 20744->20742 20746 2d497a1 __fsopen 2 API calls 20745->20746 20747 2d438c9 20746->20747 20747->20564 20749 2d4a742 20748->20749 20750 2d4a766 20748->20750 20749->20750 20751 2d49d71 __flush 59 API calls 20749->20751 20750->20742 20752 2d4a75f 20751->20752 20753 2d49d95 __write 79 API calls 20752->20753 20753->20750 20755 2d4397e 20754->20755 20756 2d4396a 20754->20756 20758 2d4397a 20755->20758 20759 2d4a72f __flush 79 API calls 20755->20759 20757 2d45d9b __dosmaperr 59 API calls 20756->20757 20760 2d4396f 20757->20760 20770 2d43a36 20758->20770 20761 2d4398a 20759->20761 20762 2d44e35 __cftoe_l 9 API calls 20760->20762 20773 2d4b1db 20761->20773 20762->20758 20765 2d49d71 __flush 59 API calls 20766 2d43998 20765->20766 20777 2d4b066 20766->20777 20768 2d4399e 20768->20758 20769 2d42eb4 _free 59 API calls 20768->20769 20769->20758 20771 2d497a1 __fsopen 2 API calls 20770->20771 20772 2d43a3c 20771->20772 20772->20580 20774 2d4b1e8 20773->20774 20776 2d43992 20773->20776 20775 2d42eb4 _free 59 API calls 20774->20775 20774->20776 20775->20776 20776->20765 20778 2d4b072 __mtinitlocknum 20777->20778 20779 2d4b096 20778->20779 20780 2d4b07f 20778->20780 20782 2d4b121 20779->20782 20784 2d4b0a6 20779->20784 20781 2d45d67 __dosmaperr 59 API calls 20780->20781 20783 2d4b084 20781->20783 20785 2d45d67 __dosmaperr 59 API calls 20782->20785 20786 2d45d9b __dosmaperr 59 API calls 20783->20786 20787 2d4b0c4 20784->20787 20788 2d4b0ce 20784->20788 20791 2d4b0c9 20785->20791 20801 2d4b08b __mtinitlocknum 20786->20801 20789 2d45d67 __dosmaperr 59 API calls 20787->20789 20790 2d50bc7 ___lock_fhandle 60 API calls 20788->20790 20789->20791 20793 2d4b0d4 20790->20793 20792 2d45d9b __dosmaperr 59 API calls 20791->20792 20794 2d4b12d 20792->20794 20795 2d4b0e7 20793->20795 20796 2d4b0f2 20793->20796 20799 2d44e35 __cftoe_l 9 API calls 20794->20799 20803 2d4b141 20795->20803 20798 2d45d9b __dosmaperr 59 API calls 20796->20798 20800 2d4b0ed 20798->20800 20799->20801 20818 2d4b119 20800->20818 20801->20768 20804 2d50e84 __lseeki64_nolock 59 API calls 20803->20804 20806 2d4b14f 20804->20806 20805 2d4b1a5 20821 2d50dfe 20805->20821 20806->20805 20808 2d50e84 __lseeki64_nolock 59 API calls 20806->20808 20817 2d4b183 20806->20817 20811 2d4b17a 20808->20811 20809 2d50e84 __lseeki64_nolock 59 API calls 20812 2d4b18f CloseHandle 20809->20812 20812->20805 20817->20805 20817->20809 20830 2d50f6d RtlLeaveCriticalSection 20818->20830 20820 2d4b11f 20820->20801 20822 2d50e6a 20821->20822 20823 2d50e0a 20821->20823 20823->20822 20830->20820 20831 40b67c RegCloseKey 20832 40b682 20831->20832 20833 2d971e7 20834 2d9bb98 WriteFile 20833->20834 20836 2db24d7 20834->20836

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 2d372ab-2d372c3 InternetOpenA 1 2d37389-2d3738f 0->1 2 2d372c9-2d3731d InternetSetOptionA * 3 call 2d44a30 0->2 3 2d37391-2d37397 1->3 4 2d373ab-2d373b9 1->4 10 2d37322-2d37340 InternetOpenUrlA 2->10 6 2d37399-2d3739b 3->6 7 2d3739d-2d373aa call 2d353ec 3->7 8 2d366f4-2d366f6 4->8 9 2d373bf-2d373e3 call 2d44a30 call 2d3439c 4->9 6->4 7->4 11 2d366f8-2d366fd 8->11 12 2d366ff-2d36701 8->12 9->8 31 2d373e9-2d37417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d4227c 9->31 13 2d37382-2d37383 InternetCloseHandle 10->13 14 2d37342 10->14 17 2d36708 Sleep 11->17 19 2d36703 12->19 20 2d3670e-2d36742 RtlEnterCriticalSection RtlLeaveCriticalSection 12->20 13->1 18 2d37346-2d3736c InternetReadFile 14->18 17->20 23 2d37377-2d3737e InternetCloseHandle 18->23 24 2d3736e-2d37375 18->24 19->17 25 2d36792 20->25 26 2d36744-2d36750 20->26 23->13 24->18 30 2d36796 25->30 26->25 29 2d36752-2d3675f 26->29 32 2d36761-2d36765 29->32 33 2d36767-2d36768 29->33 30->0 38 2d37419-2d3742b call 2d4227c 31->38 39 2d3746d-2d37488 call 2d4227c 31->39 34 2d3676c-2d36790 call 2d44a30 * 2 32->34 33->34 34->30 38->39 49 2d3742d-2d3743f call 2d4227c 38->49 47 2d37742-2d37754 call 2d4227c 39->47 48 2d3748e-2d37490 39->48 56 2d37756-2d37758 47->56 57 2d3779d-2d377a6 call 2d4227c 47->57 48->47 51 2d37496-2d37548 call 2d42eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2d44a30 * 5 call 2d3439c * 2 48->51 49->39 59 2d37441-2d37453 call 2d4227c 49->59 114 2d37585 51->114 115 2d3754a-2d3754c 51->115 56->57 60 2d3775a-2d37798 call 2d44a30 RtlEnterCriticalSection RtlLeaveCriticalSection 56->60 66 2d377ab-2d377af 57->66 59->39 72 2d37455-2d37467 call 2d4227c 59->72 60->8 70 2d377b1-2d377bf call 2d361f5 call 2d36303 66->70 71 2d377d0-2d377e2 call 2d4227c 66->71 85 2d377c4-2d377cb call 2d3640e 70->85 82 2d37b00-2d37b12 call 2d4227c 71->82 83 2d377e8-2d377ea 71->83 72->8 72->39 82->8 94 2d37b18-2d37b46 call 2d42eec call 2d44a30 call 2d3439c 82->94 83->82 87 2d377f0-2d37807 call 2d3439c 83->87 85->8 87->8 99 2d3780d-2d378db call 2d42358 call 2d31ba7 87->99 121 2d37b48-2d37b4a call 2d3534d 94->121 122 2d37b4f-2d37b56 call 2d42eb4 94->122 112 2d378e2-2d37903 RtlEnterCriticalSection 99->112 113 2d378dd call 2d3143f 99->113 118 2d37905-2d3790c 112->118 119 2d3790f-2d37945 RtlLeaveCriticalSection call 2d33c67 call 2d33d7e 112->119 113->112 123 2d37589-2d375b7 call 2d42eec call 2d44a30 call 2d3439c 114->123 115->114 120 2d3754e-2d37560 call 2d4227c 115->120 118->119 137 2d3794a-2d37967 call 2d3826e 119->137 120->114 135 2d37562-2d37583 call 2d3439c 120->135 121->122 122->8 144 2d375b9-2d375c8 call 2d43529 123->144 145 2d375f8-2d37601 call 2d42eb4 123->145 135->123 143 2d3796c-2d37973 137->143 146 2d37ae7-2d37afb call 2d38f36 143->146 147 2d37979-2d379b3 call 2d3a658 143->147 144->145 158 2d375ca 144->158 156 2d37607-2d3761f call 2d43a8f 145->156 157 2d37738-2d3773b 145->157 146->8 155 2d379b8-2d379c1 147->155 159 2d37ab1-2d37ae2 call 2d3831d call 2d333b2 155->159 160 2d379c7-2d379ce 155->160 170 2d37621-2d37629 call 2d3966a 156->170 171 2d3762b 156->171 157->47 162 2d375cf-2d375e1 call 2d42790 158->162 159->146 164 2d379d1-2d379d6 160->164 177 2d375e3 162->177 178 2d375e6-2d375f6 call 2d43529 162->178 164->164 165 2d379d8-2d37a15 call 2d3a658 164->165 174 2d37a1a-2d37a23 165->174 176 2d3762d-2d37661 call 2d3a782 call 2d33863 170->176 171->176 174->159 179 2d37a29-2d37a2f 174->179 189 2d37666-2d37682 call 2d35119 176->189 177->178 178->145 178->162 183 2d37a32-2d37a37 179->183 183->183 186 2d37a39-2d37a74 call 2d3a658 183->186 186->159 192 2d37a76-2d37aaa call 2d3d04a 186->192 193 2d37687-2d376b8 call 2d33863 call 2d3aa28 189->193 197 2d37aaf-2d37ab0 192->197 199 2d376bd-2d376cf call 2d3ab42 193->199 197->159 201 2d376d4-2d376e5 199->201 202 2d376e7 call 2d3380b 201->202 203 2d376ec-2d376fb Sleep 201->203 202->203 205 2d37703-2d37717 call 2d41830 203->205 207 2d37723-2d37731 205->207 208 2d37719-2d37722 call 2d34100 205->208 207->157 210 2d37733 call 2d3380b 207->210 208->207 210->157
                                                                          APIs
                                                                          • Sleep.KERNELBASE(0000EA60), ref: 02D36708
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D36713
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D36724
                                                                          • InternetOpenA.WININET(?), ref: 02D372B5
                                                                          • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02D372DD
                                                                          • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02D372F5
                                                                          • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02D3730D
                                                                          • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02D37336
                                                                          • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02D37358
                                                                          • InternetCloseHandle.WININET(00000000), ref: 02D37378
                                                                          • InternetCloseHandle.WININET(00000000), ref: 02D37383
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D373EE
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D373FF
                                                                          • _malloc.LIBCMT ref: 02D37498
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D374AA
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D374B6
                                                                          • _malloc.LIBCMT ref: 02D3758E
                                                                          • _strtok.LIBCMT ref: 02D375BF
                                                                          • _swscanf.LIBCMT ref: 02D375D6
                                                                          • _strtok.LIBCMT ref: 02D375ED
                                                                          • _free.LIBCMT ref: 02D375F9
                                                                          • Sleep.KERNEL32(000007D0), ref: 02D376F1
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D37772
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D37784
                                                                          • _sprintf.LIBCMT ref: 02D37822
                                                                          • RtlEnterCriticalSection.NTDLL(00000020), ref: 02D378E6
                                                                          • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02D3791A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                                          • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                                          • API String ID: 1657546717-1839899575
                                                                          • Opcode ID: 65aa3aba4e482be7225f73956863e99b6fcd503b3407183f569507a049e5fcb1
                                                                          • Instruction ID: 722570680627b105b35643493916aa3270ca5ec0ca7b392a729e7e9b1ed43d4f
                                                                          • Opcode Fuzzy Hash: 65aa3aba4e482be7225f73956863e99b6fcd503b3407183f569507a049e5fcb1
                                                                          • Instruction Fuzzy Hash: 5F32D471548381AFE736AB24D845BAFB7E6EF85314F10481DF98997391DBB09C04CBA2

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 473 2d3648b-2d366f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2d342c7 GetTickCount call 2d3605a GetVersionExA call 2d44a30 call 2d42eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2d44a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d42eec * 4 QueryPerformanceCounter Sleep call 2d42eec * 2 call 2d44a30 * 2 518 2d366f4-2d366f6 473->518 519 2d366f8-2d366fd 518->519 520 2d366ff-2d36701 518->520 521 2d36708 Sleep 519->521 522 2d36703 520->522 523 2d3670e-2d36742 RtlEnterCriticalSection RtlLeaveCriticalSection 520->523 521->523 522->521 524 2d36792 523->524 525 2d36744-2d36750 523->525 527 2d36796-2d372c3 InternetOpenA 524->527 525->524 526 2d36752-2d3675f 525->526 528 2d36761-2d36765 526->528 529 2d36767-2d36768 526->529 532 2d37389-2d3738f 527->532 533 2d372c9-2d37340 InternetSetOptionA * 3 call 2d44a30 InternetOpenUrlA 527->533 531 2d3676c-2d36790 call 2d44a30 * 2 528->531 529->531 531->527 534 2d37391-2d37397 532->534 535 2d373ab-2d373b9 532->535 543 2d37382-2d37383 InternetCloseHandle 533->543 544 2d37342 533->544 538 2d37399-2d3739b 534->538 539 2d3739d-2d373aa call 2d353ec 534->539 535->518 541 2d373bf-2d373e3 call 2d44a30 call 2d3439c 535->541 538->535 539->535 541->518 556 2d373e9-2d37417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d4227c 541->556 543->532 548 2d37346-2d3736c InternetReadFile 544->548 552 2d37377-2d3737e InternetCloseHandle 548->552 553 2d3736e-2d37375 548->553 552->543 553->548 559 2d37419-2d3742b call 2d4227c 556->559 560 2d3746d-2d37488 call 2d4227c 556->560 559->560 567 2d3742d-2d3743f call 2d4227c 559->567 565 2d37742-2d37754 call 2d4227c 560->565 566 2d3748e-2d37490 560->566 574 2d37756-2d37758 565->574 575 2d3779d-2d377af call 2d4227c 565->575 566->565 569 2d37496-2d37548 call 2d42eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2d44a30 * 5 call 2d3439c * 2 566->569 567->560 577 2d37441-2d37453 call 2d4227c 567->577 632 2d37585 569->632 633 2d3754a-2d3754c 569->633 574->575 578 2d3775a-2d37798 call 2d44a30 RtlEnterCriticalSection RtlLeaveCriticalSection 574->578 588 2d377b1-2d377bf call 2d361f5 call 2d36303 575->588 589 2d377d0-2d377e2 call 2d4227c 575->589 577->560 590 2d37455-2d37467 call 2d4227c 577->590 578->518 603 2d377c4-2d377cb call 2d3640e 588->603 600 2d37b00-2d37b12 call 2d4227c 589->600 601 2d377e8-2d377ea 589->601 590->518 590->560 600->518 612 2d37b18-2d37b46 call 2d42eec call 2d44a30 call 2d3439c 600->612 601->600 605 2d377f0-2d37807 call 2d3439c 601->605 603->518 605->518 617 2d3780d-2d378db call 2d42358 call 2d31ba7 605->617 639 2d37b48-2d37b4a call 2d3534d 612->639 640 2d37b4f-2d37b56 call 2d42eb4 612->640 630 2d378e2-2d37903 RtlEnterCriticalSection 617->630 631 2d378dd call 2d3143f 617->631 636 2d37905-2d3790c 630->636 637 2d3790f-2d37973 RtlLeaveCriticalSection call 2d33c67 call 2d33d7e call 2d3826e 630->637 631->630 641 2d37589-2d375b7 call 2d42eec call 2d44a30 call 2d3439c 632->641 633->632 638 2d3754e-2d37560 call 2d4227c 633->638 636->637 664 2d37ae7-2d37afb call 2d38f36 637->664 665 2d37979-2d379c1 call 2d3a658 637->665 638->632 653 2d37562-2d37583 call 2d3439c 638->653 639->640 640->518 662 2d375b9-2d375c8 call 2d43529 641->662 663 2d375f8-2d37601 call 2d42eb4 641->663 653->641 662->663 676 2d375ca 662->676 674 2d37607-2d3761f call 2d43a8f 663->674 675 2d37738-2d3773b 663->675 664->518 677 2d37ab1-2d37ae2 call 2d3831d call 2d333b2 665->677 678 2d379c7-2d379ce 665->678 688 2d37621-2d37629 call 2d3966a 674->688 689 2d3762b 674->689 675->565 680 2d375cf-2d375e1 call 2d42790 676->680 677->664 682 2d379d1-2d379d6 678->682 695 2d375e3 680->695 696 2d375e6-2d375f6 call 2d43529 680->696 682->682 683 2d379d8-2d37a23 call 2d3a658 682->683 683->677 697 2d37a29-2d37a2f 683->697 694 2d3762d-2d376cf call 2d3a782 call 2d33863 call 2d35119 call 2d33863 call 2d3aa28 call 2d3ab42 688->694 689->694 719 2d376d4-2d376e5 694->719 695->696 696->663 696->680 701 2d37a32-2d37a37 697->701 701->701 704 2d37a39-2d37a74 call 2d3a658 701->704 704->677 710 2d37a76-2d37aaa call 2d3d04a 704->710 715 2d37aaf-2d37ab0 710->715 715->677 720 2d376e7 call 2d3380b 719->720 721 2d376ec-2d37717 Sleep call 2d41830 719->721 720->721 725 2d37723-2d37731 721->725 726 2d37719-2d37722 call 2d34100 721->726 725->675 728 2d37733 call 2d3380b 725->728 726->725 728->675
                                                                          APIs
                                                                          • RtlInitializeCriticalSection.NTDLL(02D671B8), ref: 02D364BA
                                                                          • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02D364D1
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 02D364DA
                                                                          • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02D364E9
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 02D364EC
                                                                          • GetTickCount.KERNEL32 ref: 02D364F8
                                                                            • Part of subcall function 02D3605A: _malloc.LIBCMT ref: 02D36068
                                                                          • GetVersionExA.KERNEL32(02D67010), ref: 02D36525
                                                                          • _malloc.LIBCMT ref: 02D36551
                                                                            • Part of subcall function 02D42EEC: __FF_MSGBANNER.LIBCMT ref: 02D42F03
                                                                            • Part of subcall function 02D42EEC: __NMSG_WRITE.LIBCMT ref: 02D42F0A
                                                                            • Part of subcall function 02D42EEC: RtlAllocateHeap.NTDLL(00AA0000,00000000,00000001), ref: 02D42F2F
                                                                          • _malloc.LIBCMT ref: 02D36561
                                                                          • _malloc.LIBCMT ref: 02D3656C
                                                                          • _malloc.LIBCMT ref: 02D36577
                                                                          • _malloc.LIBCMT ref: 02D36582
                                                                          • _malloc.LIBCMT ref: 02D3658D
                                                                          • _malloc.LIBCMT ref: 02D36598
                                                                          • _malloc.LIBCMT ref: 02D365A7
                                                                          • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02D365BE
                                                                          • RtlAllocateHeap.NTDLL(00000000), ref: 02D365C7
                                                                          • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02D365D6
                                                                          • RtlAllocateHeap.NTDLL(00000000), ref: 02D365D9
                                                                          • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02D365E4
                                                                          • RtlAllocateHeap.NTDLL(00000000), ref: 02D365E7
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D36621
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D3662E
                                                                          • _malloc.LIBCMT ref: 02D36652
                                                                          • _malloc.LIBCMT ref: 02D36660
                                                                          • _malloc.LIBCMT ref: 02D36667
                                                                          • _malloc.LIBCMT ref: 02D3668D
                                                                          • QueryPerformanceCounter.KERNEL32(00000200), ref: 02D366A0
                                                                          • Sleep.KERNELBASE ref: 02D366AE
                                                                          • _malloc.LIBCMT ref: 02D366BA
                                                                          • _malloc.LIBCMT ref: 02D366C7
                                                                          • Sleep.KERNELBASE(0000EA60), ref: 02D36708
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D36713
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D36724
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _malloc$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                          • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                          • API String ID: 4273019447-2678694477
                                                                          • Opcode ID: a55017abddc6c64631015ef4d30ff094546bbeb69b7cbc3062b2878a42f7e96a
                                                                          • Instruction ID: 1b5a5f07b8e2646afcd39c996d69e991c4a85774cdca646512147710c2910e3d
                                                                          • Opcode Fuzzy Hash: a55017abddc6c64631015ef4d30ff094546bbeb69b7cbc3062b2878a42f7e96a
                                                                          • Instruction Fuzzy Hash: 3B7177B1D48350AFE310AF759C49B5BBBE9EF45714F10082AF99597380DAB49C40CFA6

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 832 401b4b-401b68 LoadLibraryA 833 401c21-401c25 832->833 834 401b6e-401b7f GetProcAddress 832->834 835 401b85-401b8e 834->835 836 401c18-401c1b FreeLibrary 834->836 837 401b95-401ba5 GetAdaptersInfo 835->837 836->833 838 401ba7-401bb0 837->838 839 401bdb-401be3 837->839 842 401bc1-401bd7 call 402bc0 call 4018cc 838->842 843 401bb2-401bb6 838->843 840 401be5-401beb call 402ba6 839->840 841 401bec-401bf0 839->841 840->841 845 401bf2-401bf6 841->845 846 401c15-401c17 841->846 842->839 843->839 847 401bb8-401bbf 843->847 845->846 850 401bf8-401bfb 845->850 846->836 847->842 847->843 852 401c06-401c13 call 402b98 850->852 853 401bfd-401c03 850->853 852->837 852->846 853->852
                                                                          APIs
                                                                          • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                                          • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                          • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                          • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                          • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                          • API String ID: 514930453-3667123677
                                                                          • Opcode ID: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                                          • Instruction ID: 9300e3b8f0653b0f10764aaa79a1f2494f67c894d04353eb45b18fdb2f867aae
                                                                          • Opcode Fuzzy Hash: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                                          • Instruction Fuzzy Hash: 9621B870944109AFEF11DF65C944BEF7BB8EF41344F1440BAE504B22E1E778A985CB69

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 906 2d3f8da-2d3f8fd LoadLibraryA 907 2d3f903-2d3f911 GetProcAddress 906->907 908 2d3f9bd-2d3f9c4 906->908 909 2d3f917-2d3f927 907->909 910 2d3f9b6-2d3f9b7 FreeLibrary 907->910 911 2d3f929-2d3f935 GetAdaptersInfo 909->911 910->908 912 2d3f937 911->912 913 2d3f96d-2d3f975 911->913 916 2d3f939-2d3f940 912->916 914 2d3f977-2d3f97d call 2d436eb 913->914 915 2d3f97e-2d3f983 913->915 914->915 918 2d3f9b1-2d3f9b5 915->918 919 2d3f985-2d3f988 915->919 920 2d3f942-2d3f946 916->920 921 2d3f94a-2d3f952 916->921 918->910 919->918 923 2d3f98a-2d3f98f 919->923 920->916 924 2d3f948 920->924 925 2d3f955-2d3f95a 921->925 926 2d3f991-2d3f999 923->926 927 2d3f99c-2d3f9a7 call 2d43a8f 923->927 924->913 925->925 928 2d3f95c-2d3f969 call 2d3f629 925->928 926->927 927->918 933 2d3f9a9-2d3f9ac 927->933 928->913 933->911
                                                                          APIs
                                                                          • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02D3F8F0
                                                                          • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02D3F909
                                                                          • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02D3F92E
                                                                          • FreeLibrary.KERNEL32(00000000), ref: 02D3F9B7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                          • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                          • API String ID: 514930453-3114217049
                                                                          • Opcode ID: 63d9f2897b07a62e632813cdbe0ef41ddce6f37dd2bba2a880a3be05ccfcb698
                                                                          • Instruction ID: f011d49839d168e657f5b073831a1c8a70197ef31e4051c41a60f7cf3ceba389
                                                                          • Opcode Fuzzy Hash: 63d9f2897b07a62e632813cdbe0ef41ddce6f37dd2bba2a880a3be05ccfcb698
                                                                          • Instruction Fuzzy Hash: 5621A031E0421DAFDB12DBA8D8806EEBBB9EF05350F1440AAD949E7701D7709D85CBB0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 991 2d3f7d6-2d3f801 CreateFileA 992 2d3f8d2-2d3f8d9 991->992 993 2d3f807-2d3f81c 991->993 994 2d3f81f-2d3f841 DeviceIoControl 993->994 995 2d3f843-2d3f84b 994->995 996 2d3f87a-2d3f882 994->996 997 2d3f854-2d3f859 995->997 998 2d3f84d-2d3f852 995->998 999 2d3f884-2d3f88a call 2d436eb 996->999 1000 2d3f88b-2d3f88d 996->1000 997->996 1001 2d3f85b-2d3f863 997->1001 998->996 999->1000 1003 2d3f8c8-2d3f8d1 CloseHandle 1000->1003 1004 2d3f88f-2d3f892 1000->1004 1005 2d3f866-2d3f86b 1001->1005 1003->992 1007 2d3f894-2d3f89d GetLastError 1004->1007 1008 2d3f8ae-2d3f8bb call 2d43a8f 1004->1008 1005->1005 1011 2d3f86d-2d3f879 call 2d3f629 1005->1011 1007->1003 1009 2d3f89f-2d3f8a2 1007->1009 1008->1003 1015 2d3f8bd-2d3f8c3 1008->1015 1009->1008 1012 2d3f8a4-2d3f8ab 1009->1012 1011->996 1012->1008 1015->994
                                                                          APIs
                                                                          • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02D3F7F5
                                                                          • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02D3F833
                                                                          • GetLastError.KERNEL32 ref: 02D3F894
                                                                          • CloseHandle.KERNELBASE(?), ref: 02D3F8CB
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                          • String ID: \\.\PhysicalDrive0
                                                                          • API String ID: 4026078076-1180397377
                                                                          • Opcode ID: 2407884e94e09cfa8a25cee78131b724a0c2a9130db1ae478269e56d1ba687e9
                                                                          • Instruction ID: 7b9b479fef1834fe7a8463b4c203a9472dc729706b5bc36ee33412d6e61e693e
                                                                          • Opcode Fuzzy Hash: 2407884e94e09cfa8a25cee78131b724a0c2a9130db1ae478269e56d1ba687e9
                                                                          • Instruction Fuzzy Hash: 7B31A0B1D0022AAFDB19CF99D884BAEBBB9EF05754F30416AE505A3780D7705E04CBA0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1017 401a4f-401a77 CreateFileA 1018 401b45-401b4a 1017->1018 1019 401a7d-401a91 1017->1019 1020 401a98-401ac0 DeviceIoControl 1019->1020 1021 401ac2-401aca 1020->1021 1022 401af3-401afb 1020->1022 1023 401ad4-401ad9 1021->1023 1024 401acc-401ad2 1021->1024 1025 401b04-401b07 1022->1025 1026 401afd-401b03 call 402ba6 1022->1026 1023->1022 1029 401adb-401af1 call 402bc0 call 4018cc 1023->1029 1024->1022 1027 401b09-401b0c 1025->1027 1028 401b3a-401b44 CloseHandle 1025->1028 1026->1025 1031 401b27-401b34 call 402b98 1027->1031 1032 401b0e-401b17 GetLastError 1027->1032 1028->1018 1029->1022 1031->1020 1031->1028 1032->1028 1035 401b19-401b1c 1032->1035 1035->1031 1038 401b1e-401b24 1035->1038 1038->1031
                                                                          APIs
                                                                          • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                          • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                          • GetLastError.KERNEL32 ref: 00401B0E
                                                                          • CloseHandle.KERNELBASE(?), ref: 00401B3D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                          • String ID: \\.\PhysicalDrive0
                                                                          • API String ID: 4026078076-1180397377
                                                                          • Opcode ID: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                                          • Instruction ID: c07866d4b4e887281577b2397114bebd63d98cfae9bba907e2345ee80fd6f57b
                                                                          • Opcode Fuzzy Hash: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                                          • Instruction Fuzzy Hash: 00316D71D01118EACB21EFA5CD849EFBBB9FF41750F20417AE515B22A0E3786E45CB98

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 213 2d36429-2d3643f 214 2d36441-2d36444 213->214 215 2d364a9-2d364ec RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 213->215 214->215 216 2d364f3-2d366f1 GetTickCount call 2d3605a GetVersionExA call 2d44a30 call 2d42eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2d44a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d42eec * 4 QueryPerformanceCounter Sleep call 2d42eec * 2 call 2d44a30 * 2 215->216 217 2d364ee call 2d342c7 215->217 260 2d366f4-2d366f6 216->260 217->216 261 2d366f8-2d366fd 260->261 262 2d366ff-2d36701 260->262 263 2d36708 Sleep 261->263 264 2d36703 262->264 265 2d3670e-2d36742 RtlEnterCriticalSection RtlLeaveCriticalSection 262->265 263->265 264->263 266 2d36792 265->266 267 2d36744-2d36750 265->267 269 2d36796-2d372c3 InternetOpenA 266->269 267->266 268 2d36752-2d3675f 267->268 270 2d36761-2d36765 268->270 271 2d36767-2d36768 268->271 274 2d37389-2d3738f 269->274 275 2d372c9-2d37340 InternetSetOptionA * 3 call 2d44a30 InternetOpenUrlA 269->275 273 2d3676c-2d36790 call 2d44a30 * 2 270->273 271->273 273->269 276 2d37391-2d37397 274->276 277 2d373ab-2d373b9 274->277 285 2d37382-2d37383 InternetCloseHandle 275->285 286 2d37342 275->286 280 2d37399-2d3739b 276->280 281 2d3739d-2d373aa call 2d353ec 276->281 277->260 283 2d373bf-2d373e3 call 2d44a30 call 2d3439c 277->283 280->277 281->277 283->260 298 2d373e9-2d37417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d4227c 283->298 285->274 290 2d37346-2d3736c InternetReadFile 286->290 294 2d37377-2d3737e InternetCloseHandle 290->294 295 2d3736e-2d37375 290->295 294->285 295->290 301 2d37419-2d3742b call 2d4227c 298->301 302 2d3746d-2d37488 call 2d4227c 298->302 301->302 309 2d3742d-2d3743f call 2d4227c 301->309 307 2d37742-2d37754 call 2d4227c 302->307 308 2d3748e-2d37490 302->308 316 2d37756-2d37758 307->316 317 2d3779d-2d377af call 2d4227c 307->317 308->307 311 2d37496-2d37548 call 2d42eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2d44a30 * 5 call 2d3439c * 2 308->311 309->302 319 2d37441-2d37453 call 2d4227c 309->319 374 2d37585 311->374 375 2d3754a-2d3754c 311->375 316->317 320 2d3775a-2d37798 call 2d44a30 RtlEnterCriticalSection RtlLeaveCriticalSection 316->320 330 2d377b1-2d377cb call 2d361f5 call 2d36303 call 2d3640e 317->330 331 2d377d0-2d377e2 call 2d4227c 317->331 319->302 332 2d37455-2d37467 call 2d4227c 319->332 320->260 330->260 342 2d37b00-2d37b12 call 2d4227c 331->342 343 2d377e8-2d377ea 331->343 332->260 332->302 342->260 354 2d37b18-2d37b46 call 2d42eec call 2d44a30 call 2d3439c 342->354 343->342 347 2d377f0-2d37807 call 2d3439c 343->347 347->260 359 2d3780d-2d378db call 2d42358 call 2d31ba7 347->359 381 2d37b48-2d37b4a call 2d3534d 354->381 382 2d37b4f-2d37b56 call 2d42eb4 354->382 372 2d378e2-2d37903 RtlEnterCriticalSection 359->372 373 2d378dd call 2d3143f 359->373 378 2d37905-2d3790c 372->378 379 2d3790f-2d37973 RtlLeaveCriticalSection call 2d33c67 call 2d33d7e call 2d3826e 372->379 373->372 383 2d37589-2d375b7 call 2d42eec call 2d44a30 call 2d3439c 374->383 375->374 380 2d3754e-2d37560 call 2d4227c 375->380 378->379 406 2d37ae7-2d37afb call 2d38f36 379->406 407 2d37979-2d379c1 call 2d3a658 379->407 380->374 395 2d37562-2d37583 call 2d3439c 380->395 381->382 382->260 404 2d375b9-2d375c8 call 2d43529 383->404 405 2d375f8-2d37601 call 2d42eb4 383->405 395->383 404->405 418 2d375ca 404->418 416 2d37607-2d3761f call 2d43a8f 405->416 417 2d37738-2d3773b 405->417 406->260 419 2d37ab1-2d37ae2 call 2d3831d call 2d333b2 407->419 420 2d379c7-2d379ce 407->420 430 2d37621-2d37629 call 2d3966a 416->430 431 2d3762b 416->431 417->307 422 2d375cf-2d375e1 call 2d42790 418->422 419->406 424 2d379d1-2d379d6 420->424 437 2d375e3 422->437 438 2d375e6-2d375f6 call 2d43529 422->438 424->424 425 2d379d8-2d37a23 call 2d3a658 424->425 425->419 439 2d37a29-2d37a2f 425->439 436 2d3762d-2d376e5 call 2d3a782 call 2d33863 call 2d35119 call 2d33863 call 2d3aa28 call 2d3ab42 430->436 431->436 462 2d376e7 call 2d3380b 436->462 463 2d376ec-2d37717 Sleep call 2d41830 436->463 437->438 438->405 438->422 443 2d37a32-2d37a37 439->443 443->443 446 2d37a39-2d37a74 call 2d3a658 443->446 446->419 452 2d37a76-2d37ab0 call 2d3d04a 446->452 452->419 462->463 467 2d37723-2d37731 463->467 468 2d37719-2d37722 call 2d34100 463->468 467->417 470 2d37733 call 2d3380b 467->470 468->467 470->417
                                                                          APIs
                                                                          • RtlInitializeCriticalSection.NTDLL(02D671B8), ref: 02D364BA
                                                                          • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02D364D1
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 02D364DA
                                                                          • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02D364E9
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 02D364EC
                                                                          • GetTickCount.KERNEL32 ref: 02D364F8
                                                                          • GetVersionExA.KERNEL32(02D67010), ref: 02D36525
                                                                          • _malloc.LIBCMT ref: 02D36551
                                                                          • _malloc.LIBCMT ref: 02D36561
                                                                          • _malloc.LIBCMT ref: 02D3656C
                                                                          • _malloc.LIBCMT ref: 02D36577
                                                                          • _malloc.LIBCMT ref: 02D36582
                                                                          • _malloc.LIBCMT ref: 02D3658D
                                                                          • _malloc.LIBCMT ref: 02D36598
                                                                          • _malloc.LIBCMT ref: 02D365A7
                                                                          • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02D365BE
                                                                          • RtlAllocateHeap.NTDLL(00000000), ref: 02D365C7
                                                                          • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02D365D6
                                                                          • RtlAllocateHeap.NTDLL(00000000), ref: 02D365D9
                                                                          • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02D365E4
                                                                          • RtlAllocateHeap.NTDLL(00000000), ref: 02D365E7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _malloc$Heap$AllocateProcess$AddressHandleModuleProc$CountCriticalInitializeSectionTickVersion
                                                                          • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                          • API String ID: 2374473808-2678694477
                                                                          • Opcode ID: be8c7133ba8222d7e6e671f5bcee1cafcc98105e93c042506a9a76fc1368ccaf
                                                                          • Instruction ID: 3f139c3f6697a766ccb7fc5e001a93b64519b060652266900625e1d34b34c85d
                                                                          • Opcode Fuzzy Hash: be8c7133ba8222d7e6e671f5bcee1cafcc98105e93c042506a9a76fc1368ccaf
                                                                          • Instruction Fuzzy Hash: E77196B1D48350AFE310AF759C49B6BBBE9EF45714F20482AF94597341DAB49C00CFA6

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02D31D11
                                                                          • GetLastError.KERNEL32 ref: 02D31D23
                                                                            • Part of subcall function 02D31712: __EH_prolog.LIBCMT ref: 02D31717
                                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02D31D59
                                                                          • GetLastError.KERNEL32 ref: 02D31D6B
                                                                          • __beginthreadex.LIBCMT ref: 02D31DB1
                                                                          • GetLastError.KERNEL32 ref: 02D31DC6
                                                                          • CloseHandle.KERNEL32(00000000), ref: 02D31DDD
                                                                          • CloseHandle.KERNEL32(00000000), ref: 02D31DEC
                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02D31E14
                                                                          • CloseHandle.KERNELBASE(00000000), ref: 02D31E1B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                          • String ID: thread$thread.entry_event$thread.exit_event
                                                                          • API String ID: 831262434-3017686385
                                                                          • Opcode ID: d9f2e3e2d052f22d93ebbd9230c837d186ea3dfe3a0fa453a2b8abf2fb2d5061
                                                                          • Instruction ID: 2c645e12218fe6386c03afe417c76ebe9a3a3d3dbaac8088ccd47e6ce13f76db
                                                                          • Opcode Fuzzy Hash: d9f2e3e2d052f22d93ebbd9230c837d186ea3dfe3a0fa453a2b8abf2fb2d5061
                                                                          • Instruction Fuzzy Hash: CE3159719043119FE701EF24C848B2BBBE5EF84754F204969F9599B390DB70DC49CBA2

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D34D8B
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D34DB7
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D34DC3
                                                                            • Part of subcall function 02D34BED: __EH_prolog.LIBCMT ref: 02D34BF2
                                                                            • Part of subcall function 02D34BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02D34CF2
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D34E93
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D34E99
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D34EA0
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D34EA6
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D350A7
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D350AD
                                                                          • RtlEnterCriticalSection.NTDLL(02D671B8), ref: 02D350B8
                                                                          • RtlLeaveCriticalSection.NTDLL(02D671B8), ref: 02D350C1
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                          • String ID:
                                                                          • API String ID: 2062355503-0
                                                                          • Opcode ID: e134d00302915c22fd2d2fc34d4d51acf9b46bafe6e9195025eb3c782dadf120
                                                                          • Instruction ID: de1f9cd6a59dda35c1c55b6ca5870763fdce671141dc5bd804a3126a793e4086
                                                                          • Opcode Fuzzy Hash: e134d00302915c22fd2d2fc34d4d51acf9b46bafe6e9195025eb3c782dadf120
                                                                          • Instruction Fuzzy Hash: D6B11871D0025D9FEF16DFA4D844BEEBBB5EF04314F24409AE805B6280DBB95A49CFA1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 858 401f64-401f84 FindResourceA 859 401f86-401f9d GetLastError SizeofResource 858->859 860 401f9f-401fa1 858->860 859->860 861 401fa6-401fec LoadResource LockResource GlobalAlloc call 402800 * 2 859->861 862 402096-40209a 860->862 867 401fee-401ff9 861->867 867->867 868 401ffb-402003 GetTickCount 867->868 869 402032-402038 868->869 870 402005-402007 868->870 871 402053-402083 GlobalAlloc call 401c26 869->871 872 40203a-40204a 869->872 870->871 873 402009-40200f 870->873 878 402088-402093 871->878 874 40204c 872->874 875 40204e-402051 872->875 873->871 877 402011-402023 873->877 874->875 875->871 875->872 879 402025 877->879 880 402027-40202a 877->880 878->862 879->880 880->877 881 40202c-40202e 880->881 881->873 882 402030 881->882 882->871
                                                                          APIs
                                                                          • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                          • GetLastError.KERNEL32 ref: 00401F86
                                                                          • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                          • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                          • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                          • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                                          • GetTickCount.KERNEL32 ref: 00401FFB
                                                                          • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                          • String ID:
                                                                          • API String ID: 564119183-0
                                                                          • Opcode ID: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                                          • Instruction ID: 3f373f2fe47a9e58058ec223940fe379f908771e1a31376a549d0366c6000c22
                                                                          • Opcode Fuzzy Hash: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                                          • Instruction Fuzzy Hash: D0314C32A402516FDB109FB99E889AF7FB8EF45344B10807AFA46F7291D6748841C7A8

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • RtlEnterCriticalSection.NTDLL(?), ref: 02D32706
                                                                          • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02D3272B
                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02D55A93), ref: 02D32738
                                                                            • Part of subcall function 02D31712: __EH_prolog.LIBCMT ref: 02D31717
                                                                          • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02D32778
                                                                          • RtlLeaveCriticalSection.NTDLL(?), ref: 02D327D9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                          • String ID: timer
                                                                          • API String ID: 4293676635-1792073242
                                                                          • Opcode ID: 48e246ca50baac5c0f74cea3e9a894b29994b67211634a898c86cc8c370e5c2b
                                                                          • Instruction ID: 4dc07bde5107b0ea5f69d484ad6a789cac070a6012b0c40fe6e33421c040dcd4
                                                                          • Opcode Fuzzy Hash: 48e246ca50baac5c0f74cea3e9a894b29994b67211634a898c86cc8c370e5c2b
                                                                          • Instruction Fuzzy Hash: D2318FB1904712AFD311DF29D948B66BBE8FB48725F104A2EF85582780D7B0DC14CFA1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 934 2d32b95-2d32baf 935 2d32bb1-2d32bb9 call 2d40a50 934->935 936 2d32bc7-2d32bcb 934->936 943 2d32bbf-2d32bc2 935->943 937 2d32bdf 936->937 938 2d32bcd-2d32bd0 936->938 942 2d32be2-2d32c11 WSASetLastError WSARecv call 2d3a43c 937->942 938->937 941 2d32bd2-2d32bdd call 2d40a50 938->941 941->943 948 2d32c16-2d32c1d 942->948 946 2d32d30 943->946 949 2d32d32-2d32d38 946->949 950 2d32c1f-2d32c2a call 2d40a50 948->950 951 2d32c2c-2d32c32 948->951 962 2d32c3f-2d32c42 950->962 953 2d32c46-2d32c48 951->953 954 2d32c34-2d32c39 call 2d40a50 951->954 956 2d32c4a-2d32c4d 953->956 957 2d32c4f-2d32c60 call 2d40a50 953->957 954->962 960 2d32c66-2d32c69 956->960 957->949 957->960 964 2d32c73-2d32c76 960->964 965 2d32c6b-2d32c6d 960->965 962->953 964->946 967 2d32c7c-2d32c9a call 2d40a50 call 2d3166f 964->967 965->964 966 2d32d22-2d32d2d call 2d31996 965->966 966->946 974 2d32cbc-2d32cfa WSASetLastError select call 2d3a43c 967->974 975 2d32c9c-2d32cba call 2d40a50 call 2d3166f 967->975 981 2d32d08 974->981 982 2d32cfc-2d32d06 call 2d40a50 974->982 975->946 975->974 985 2d32d15-2d32d17 981->985 986 2d32d0a-2d32d12 call 2d40a50 981->986 987 2d32d19-2d32d1d 982->987 985->946 985->987 986->985 987->942
                                                                          APIs
                                                                          • WSASetLastError.WS2_32(00000000), ref: 02D32BE4
                                                                          • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02D32C07
                                                                            • Part of subcall function 02D3A43C: WSAGetLastError.WS2_32(00000000,?,?,02D32A51), ref: 02D3A44A
                                                                          • WSASetLastError.WS2_32 ref: 02D32CD3
                                                                          • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02D32CE7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$Recvselect
                                                                          • String ID: 3'
                                                                          • API String ID: 886190287-280543908
                                                                          • Opcode ID: e85c39802bcc57b4a9dab463535f496c1d227bc33a6071125629d2d276f19b67
                                                                          • Instruction ID: 1b59721e8dbca938737caf3f86d260ebdc14f38492a387150713a2ccbc5decca
                                                                          • Opcode Fuzzy Hash: e85c39802bcc57b4a9dab463535f496c1d227bc33a6071125629d2d276f19b67
                                                                          • Instruction Fuzzy Hash: 8C414CB19083019FD7129F64D8087ABBBE9EF84365F10491EE9D987380EB74DD40CBA2

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1042 2d329ee-2d32a06 1043 2d32ab3-2d32abb call 2d40a50 1042->1043 1044 2d32a0c-2d32a10 1042->1044 1052 2d32abe-2d32ac6 1043->1052 1046 2d32a12-2d32a15 1044->1046 1047 2d32a39-2d32a4c WSASetLastError closesocket call 2d3a43c 1044->1047 1046->1047 1048 2d32a17-2d32a36 call 2d40a50 call 2d32f50 1046->1048 1053 2d32a51-2d32a55 1047->1053 1048->1047 1053->1043 1055 2d32a57-2d32a5f call 2d40a50 1053->1055 1060 2d32a61-2d32a67 1055->1060 1061 2d32a69-2d32a71 call 2d40a50 1055->1061 1060->1061 1062 2d32a7b-2d32aad ioctlsocket WSASetLastError closesocket call 2d3a43c 1060->1062 1067 2d32a73-2d32a79 1061->1067 1068 2d32aaf-2d32ab1 1061->1068 1062->1068 1067->1062 1067->1068 1068->1043 1068->1052
                                                                          APIs
                                                                          • WSASetLastError.WS2_32(00000000), ref: 02D32A3B
                                                                          • closesocket.WS2_32 ref: 02D32A42
                                                                          • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02D32A89
                                                                          • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02D32A97
                                                                          • closesocket.WS2_32 ref: 02D32A9E
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLastclosesocket$ioctlsocket
                                                                          • String ID:
                                                                          • API String ID: 1561005644-0
                                                                          • Opcode ID: 9a7acd3b20c57c09b22ce3931ed5665fe1f0c5f56fb85e5883a575f497743864
                                                                          • Instruction ID: d3a67914398c71751365b27630a783ccc6eafb0e7cc1f114243afc02e929d3a9
                                                                          • Opcode Fuzzy Hash: 9a7acd3b20c57c09b22ce3931ed5665fe1f0c5f56fb85e5883a575f497743864
                                                                          • Instruction Fuzzy Hash: FE21F771E04205ABEB259BB8C808B6AB7E9EF44315F10496AE945C3380EBB0CD40CB61

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1069 2d31ba7-2d31bcf call 2d55330 RtlEnterCriticalSection 1072 2d31bd1 1069->1072 1073 2d31be9-2d31bf7 RtlLeaveCriticalSection call 2d3e263 1069->1073 1074 2d31bd4-2d31be0 call 2d31b79 1072->1074 1076 2d31bfa-2d31c20 RtlEnterCriticalSection 1073->1076 1081 2d31be2-2d31be7 1074->1081 1082 2d31c55-2d31c6e RtlLeaveCriticalSection 1074->1082 1078 2d31c34-2d31c36 1076->1078 1079 2d31c22-2d31c2f call 2d31b79 1078->1079 1080 2d31c38-2d31c43 1078->1080 1083 2d31c45-2d31c4b 1079->1083 1087 2d31c31 1079->1087 1080->1083 1081->1073 1081->1074 1083->1082 1085 2d31c4d-2d31c51 1083->1085 1085->1082 1087->1078
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D31BAC
                                                                          • RtlEnterCriticalSection.NTDLL ref: 02D31BBC
                                                                          • RtlLeaveCriticalSection.NTDLL ref: 02D31BEA
                                                                          • RtlEnterCriticalSection.NTDLL ref: 02D31C13
                                                                          • RtlLeaveCriticalSection.NTDLL ref: 02D31C56
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$EnterLeave$H_prolog
                                                                          • String ID:
                                                                          • API String ID: 1633115879-0
                                                                          • Opcode ID: d9e1bfc3986ff1bcfe7bc07cd285cf81fda3d91848ca480c5c5f15c9931454c7
                                                                          • Instruction ID: 4d1ba59e48b8e906283bf044c1de155c8b2b3316f15f21a02bb2d49f980a9653
                                                                          • Opcode Fuzzy Hash: d9e1bfc3986ff1bcfe7bc07cd285cf81fda3d91848ca480c5c5f15c9931454c7
                                                                          • Instruction Fuzzy Hash: 1921AB75A002159FDB16CF68C44479AFBB5FF48310F208589EC5997301DBB4ED01CBA0

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetVersion.KERNEL32 ref: 00402D86
                                                                            • Part of subcall function 004039F0: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                                            • Part of subcall function 004039F0: HeapDestroy.KERNEL32 ref: 00403A40
                                                                          • GetCommandLineA.KERNEL32 ref: 00402DD4
                                                                          • GetStartupInfoA.KERNEL32(?), ref: 00402DFF
                                                                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402E22
                                                                            • Part of subcall function 00402E7B: ExitProcess.KERNEL32 ref: 00402E98
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                          • String ID:
                                                                          • API String ID: 2057626494-0
                                                                          • Opcode ID: 9e286e5f9a377e3797ece88135c359dedbbb575cc14907a13f37508a60b21901
                                                                          • Instruction ID: f31f1ce04d2051e6b9e8acf883bbbbaa5bd69f55a1c9941ff1c46623f1a3e60c
                                                                          • Opcode Fuzzy Hash: 9e286e5f9a377e3797ece88135c359dedbbb575cc14907a13f37508a60b21901
                                                                          • Instruction Fuzzy Hash: AD219FB0840715AADB04EFA6DE09A6E7BB8EB04704F10413FF502B72E2DB388510CB59
                                                                          APIs
                                                                          • WSASetLastError.WS2_32(00000000), ref: 02D32EEE
                                                                          • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02D32EFD
                                                                          • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02D32F0C
                                                                          • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02D32F36
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$Socketsetsockopt
                                                                          • String ID:
                                                                          • API String ID: 2093263913-0
                                                                          • Opcode ID: 9030b6d99b430a88a9f8c4ab62466bcaba5da3b7fc7beb166ce1481e63489777
                                                                          • Instruction ID: c09d2bc81841ae7b156f6168645935a143e659907f0b47d3be7b34339767e70b
                                                                          • Opcode Fuzzy Hash: 9030b6d99b430a88a9f8c4ab62466bcaba5da3b7fc7beb166ce1481e63489777
                                                                          • Instruction Fuzzy Hash: BA018871A40314BBDB205F66DC49F5ABBA9EB89761F00C565FA19CB381D7B08D00CBB1
                                                                          APIs
                                                                            • Part of subcall function 02D32D39: WSASetLastError.WS2_32(00000000), ref: 02D32D47
                                                                            • Part of subcall function 02D32D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02D32D5C
                                                                          • WSASetLastError.WS2_32(00000000), ref: 02D32E6D
                                                                          • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02D32E83
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$Sendselect
                                                                          • String ID: 3'
                                                                          • API String ID: 2958345159-280543908
                                                                          • Opcode ID: ea99034ec5e44ea2f57c8bbc820e4b4a73cb56f659c60d245e1e93a3bf10984c
                                                                          • Instruction ID: ac3bc6cd31c2514aa2d8e2e165d53fdc39db2f55a56b3f791b856ef769b01e6a
                                                                          • Opcode Fuzzy Hash: ea99034ec5e44ea2f57c8bbc820e4b4a73cb56f659c60d245e1e93a3bf10984c
                                                                          • Instruction Fuzzy Hash: 18319CB1E012099BDB169FA0D809BEE7BEAEF04314F00455ADD0997340EBB49D50CBE0
                                                                          APIs
                                                                          • WSASetLastError.WS2_32(00000000), ref: 02D32AEA
                                                                          • connect.WS2_32(?,?,?), ref: 02D32AF5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLastconnect
                                                                          • String ID: 3'
                                                                          • API String ID: 374722065-280543908
                                                                          • Opcode ID: ce71f8adb5e91d4c1a8d493e4f9eafa9e2253290256fd7e4597942fa875c4813
                                                                          • Instruction ID: 70c1067369349822a1619d507b01bdd8ddc8001b084212867196aad262525694
                                                                          • Opcode Fuzzy Hash: ce71f8adb5e91d4c1a8d493e4f9eafa9e2253290256fd7e4597942fa875c4813
                                                                          • Instruction Fuzzy Hash: FF21A470E04204ABDF15AFB4C408AEEBBBAEF44325F10859ADD1993384DB749E01CFA1
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog
                                                                          • String ID:
                                                                          • API String ID: 3519838083-0
                                                                          • Opcode ID: d80834fbb7e3ea1aaa314d5e713d577559c28166c3a2f9b7246d2e550aad5f2c
                                                                          • Instruction ID: 600712ed0925558a749edd4537ae3f06104f740f5618d911542cb433a2354f5d
                                                                          • Opcode Fuzzy Hash: d80834fbb7e3ea1aaa314d5e713d577559c28166c3a2f9b7246d2e550aad5f2c
                                                                          • Instruction Fuzzy Hash: F8512AB1905256DFCB4ADF68D541AAABBB1FF08320F14819EE8699B380D774DD10CFA1
                                                                          APIs
                                                                          • InterlockedIncrement.KERNEL32(?), ref: 02D336A7
                                                                            • Part of subcall function 02D32420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02D32432
                                                                            • Part of subcall function 02D32420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02D32445
                                                                            • Part of subcall function 02D32420: RtlEnterCriticalSection.NTDLL(?), ref: 02D32454
                                                                            • Part of subcall function 02D32420: InterlockedExchange.KERNEL32(?,00000001), ref: 02D32469
                                                                            • Part of subcall function 02D32420: RtlLeaveCriticalSection.NTDLL(?), ref: 02D32470
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                          • String ID:
                                                                          • API String ID: 1601054111-0
                                                                          • Opcode ID: 7059f7619d557463ee34dd07f27c2f2db4c741ebd2bd5d8b9630654782a14e38
                                                                          • Instruction ID: 2111e3bf51f4ce83165a3ea8f1e0a79611d06d8f63578f77472d10259f7046a6
                                                                          • Opcode Fuzzy Hash: 7059f7619d557463ee34dd07f27c2f2db4c741ebd2bd5d8b9630654782a14e38
                                                                          • Instruction Fuzzy Hash: 6811C1B5500209ABDF229F18CD85FAA3BAAEF007A4F104556FD52CA390CB74DC60CBE4
                                                                          APIs
                                                                          • __beginthreadex.LIBCMT ref: 02D42046
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02D3A8BC,00000000), ref: 02D42077
                                                                          • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,02D3A8BC,00000000), ref: 02D42085
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseHandleResumeThread__beginthreadex
                                                                          • String ID:
                                                                          • API String ID: 1685284544-0
                                                                          • Opcode ID: aaf142659a5674ea6103cb3c4802057198b784c54d173f76efa14e4c8f48446a
                                                                          • Instruction ID: aa528c6c6b1fd2ebc634308c9250d09701df2b57729409df1ff0976df23e52ff
                                                                          • Opcode Fuzzy Hash: aaf142659a5674ea6103cb3c4802057198b784c54d173f76efa14e4c8f48446a
                                                                          • Instruction Fuzzy Hash: A6F068712402115BE7209E5CDC84F91B3E8EF48725F34455AF558D7394C7B1EC92DA90
                                                                          APIs
                                                                          • GetCommandLineW.KERNEL32(00000000), ref: 0040B0A5
                                                                          • CommandLineToArgvW.SHELL32(00000000), ref: 0040B0AC
                                                                          • GetLocalTime.KERNEL32(00409F90), ref: 0040B9B8
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: CommandLine$ArgvLocalTime
                                                                          • String ID:
                                                                          • API String ID: 3768950922-0
                                                                          • Opcode ID: 59b01a3e4a33034627a38184ad815265f60c57ad8a608ecca20853071ff8fe32
                                                                          • Instruction ID: 23e07588f498f8c5e05d00d86472bf9795cdc6e0188d96b461cacdec3fdbfefd
                                                                          • Opcode Fuzzy Hash: 59b01a3e4a33034627a38184ad815265f60c57ad8a608ecca20853071ff8fe32
                                                                          • Instruction Fuzzy Hash: 13F0A072800102EFCB046BA1DE4A42A37E4EA04359316897BD163FA0E5DF3D4846CB8E
                                                                          APIs
                                                                          • GetCommandLineW.KERNEL32(00000000), ref: 0040B0A5
                                                                          • CommandLineToArgvW.SHELL32(00000000), ref: 0040B0AC
                                                                          • GetLocalTime.KERNEL32(00409F90), ref: 0040B9B8
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: CommandLine$ArgvLocalTime
                                                                          • String ID:
                                                                          • API String ID: 3768950922-0
                                                                          • Opcode ID: 667fd779a13e85c584df1a8408aba4467e109f6cd77dd669f4557402a3646338
                                                                          • Instruction ID: 54adafcf78584c863c1ddd2f0e90149891305aa143cab3a49da3de5fd3a430ba
                                                                          • Opcode Fuzzy Hash: 667fd779a13e85c584df1a8408aba4467e109f6cd77dd669f4557402a3646338
                                                                          • Instruction Fuzzy Hash: 9EE04F72904102EFCB04ABE1AA4D46E37E8E604346321843BE113F60E1CB3C88559B5E
                                                                          APIs
                                                                          • InterlockedIncrement.KERNEL32(02D6727C), ref: 02D31ABA
                                                                          • WSAStartup.WS2_32(00000002,00000000), ref: 02D31ACB
                                                                          • InterlockedExchange.KERNEL32(02D67280,00000000), ref: 02D31AD7
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Interlocked$ExchangeIncrementStartup
                                                                          • String ID:
                                                                          • API String ID: 1856147945-0
                                                                          • Opcode ID: 06b5884fb44b8cedac7f9734ccb0e6ba6e5004e656012a77c8321314cd484e20
                                                                          • Instruction ID: 67758d57b49cf70c3439c5ec749b35b865804b3c29c19632a6a4ff4b868aa088
                                                                          • Opcode Fuzzy Hash: 06b5884fb44b8cedac7f9734ccb0e6ba6e5004e656012a77c8321314cd484e20
                                                                          • Instruction Fuzzy Hash: 44D05E319953185BF62066A4BD0EA79F76CEB09A15F200651FC6AC13C0EB915D2885A6
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D6A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D6A000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d6a000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID: `io
                                                                          • API String ID: 823142352-3782016954
                                                                          • Opcode ID: c66bfb17d22e9a73eaf76904825a0151b949ee0b8ac11d407b7e68403085a44a
                                                                          • Instruction ID: cf146c3d669f5c1aa471eb3dd523ccc9c57421df0b69759cb379221e64a80af8
                                                                          • Opcode Fuzzy Hash: c66bfb17d22e9a73eaf76904825a0151b949ee0b8ac11d407b7e68403085a44a
                                                                          • Instruction Fuzzy Hash: 90418AF150C600AFE709BF09EC8177AB7E5EF84310F06882DE6C587740EA39A8548B97
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D34BF2
                                                                            • Part of subcall function 02D31BA7: __EH_prolog.LIBCMT ref: 02D31BAC
                                                                            • Part of subcall function 02D31BA7: RtlEnterCriticalSection.NTDLL ref: 02D31BBC
                                                                            • Part of subcall function 02D31BA7: RtlLeaveCriticalSection.NTDLL ref: 02D31BEA
                                                                            • Part of subcall function 02D31BA7: RtlEnterCriticalSection.NTDLL ref: 02D31C13
                                                                            • Part of subcall function 02D31BA7: RtlLeaveCriticalSection.NTDLL ref: 02D31C56
                                                                            • Part of subcall function 02D3E02B: __EH_prolog.LIBCMT ref: 02D3E030
                                                                            • Part of subcall function 02D3E02B: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D3E0AF
                                                                          • InterlockedExchange.KERNEL32(?,00000000), ref: 02D34CF2
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                          • String ID:
                                                                          • API String ID: 1927618982-0
                                                                          • Opcode ID: 2583887912ed41fb135efd05eabf65dd508197119a7a871a3f977c63c506b63f
                                                                          • Instruction ID: 9944090ee134aae09360daf852fab6dfec2d9498fd7b4a75af85ea674c76aa36
                                                                          • Opcode Fuzzy Hash: 2583887912ed41fb135efd05eabf65dd508197119a7a871a3f977c63c506b63f
                                                                          • Instruction Fuzzy Hash: C2510771D04248DFDB16DFA8D484AEEBBB5EF08314F14816AE905AB351DB709E44CFA0
                                                                          APIs
                                                                          • WSASetLastError.WS2_32(00000000), ref: 02D32D47
                                                                          • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02D32D5C
                                                                            • Part of subcall function 02D3A43C: WSAGetLastError.WS2_32(00000000,?,?,02D32A51), ref: 02D3A44A
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$Send
                                                                          • String ID:
                                                                          • API String ID: 1282938840-0
                                                                          • Opcode ID: ad48a25e3d2410b51553516320742eedce1c4498d08dbfd0b3c26e78acb033f7
                                                                          • Instruction ID: c313c1f7bc71a1b41d86839b988094141aca31828eec1c1f097575e211293d9b
                                                                          • Opcode Fuzzy Hash: ad48a25e3d2410b51553516320742eedce1c4498d08dbfd0b3c26e78acb033f7
                                                                          • Instruction Fuzzy Hash: 50017CB5904209EFD7219FA4D88886BBBEDFB45365B20452FED9983340EB709D00CBA1
                                                                          APIs
                                                                          • WSASetLastError.WS2_32(00000000), ref: 02D3833A
                                                                          • shutdown.WS2_32(?,00000002), ref: 02D38343
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLastshutdown
                                                                          • String ID:
                                                                          • API String ID: 1920494066-0
                                                                          • Opcode ID: 337e3794c6c8892ae1c6e78e4f062effe698f61c411fc45074a151e49b7dbc88
                                                                          • Instruction ID: b1b23b25943a50c90b6016a32efc2fde00da605a28b428675b3b4e26bd7b87a4
                                                                          • Opcode Fuzzy Hash: 337e3794c6c8892ae1c6e78e4f062effe698f61c411fc45074a151e49b7dbc88
                                                                          • Instruction Fuzzy Hash: 32F01771A04314CFD725AF68D445B5AB7E5FF09321F108819E9AA97380DB70AC10CBA1
                                                                          APIs
                                                                          • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                                            • Part of subcall function 004038A8: GetVersionExA.KERNEL32 ref: 004038C7
                                                                          • HeapDestroy.KERNEL32 ref: 00403A40
                                                                            • Part of subcall function 00403DC7: HeapAlloc.KERNEL32(00000000,00000140,00403A29,000003F8), ref: 00403DD4
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Heap$AllocCreateDestroyVersion
                                                                          • String ID:
                                                                          • API String ID: 2507506473-0
                                                                          • Opcode ID: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                          • Instruction ID: 5dadef9d12e489db140da5c14b34350ea54a5b880f3286d9e4ff1a1591b79aa3
                                                                          • Opcode Fuzzy Hash: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                          • Instruction Fuzzy Hash: 04F065707553016ADB24EF705E4676B3DD8AB80B53F10443BF541F41E0EB7C8690991A
                                                                          APIs
                                                                          • lstrcmpiW.KERNELBASE(?,/chk), ref: 0040B95C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: lstrcmpi
                                                                          • String ID: /chk
                                                                          • API String ID: 1586166983-3837807730
                                                                          • Opcode ID: af6fa81dad960db4c1e64f221b36a3390aa195560f18da386ed3a98d31594a07
                                                                          • Instruction ID: 495c3e075edc24a6fcc213445aa4e79cffea7e25fd33ba9b7d8bb21698b3df4f
                                                                          • Opcode Fuzzy Hash: af6fa81dad960db4c1e64f221b36a3390aa195560f18da386ed3a98d31594a07
                                                                          • Instruction Fuzzy Hash: ECB092B0288B02FAD6022B624E086117A70AA147013218136E813B42E4C7BAA421F6AE
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D3511E
                                                                            • Part of subcall function 02D33D7E: htons.WS2_32(?), ref: 02D33DA2
                                                                            • Part of subcall function 02D33D7E: htonl.WS2_32(00000000), ref: 02D33DB9
                                                                            • Part of subcall function 02D33D7E: htonl.WS2_32(00000000), ref: 02D33DC0
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: htonl$H_prologhtons
                                                                          • String ID:
                                                                          • API String ID: 4039807196-0
                                                                          • Opcode ID: 088e495aaaab5a364dbb7e96f722d29ea7e210d7aca2233b2f8ed50762c77571
                                                                          • Instruction ID: 946e27555d15348f845cebf06f7b18300a04a05e8d1b374279bf01120a7bdb78
                                                                          • Opcode Fuzzy Hash: 088e495aaaab5a364dbb7e96f722d29ea7e210d7aca2233b2f8ed50762c77571
                                                                          • Instruction Fuzzy Hash: 408136B5D0424E8ECF06DFA8E180AEEBBB5EF48214F10819AD855B7340EB755A05CFB5
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D6A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D6A000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d6a000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: FileRead
                                                                          • String ID:
                                                                          • API String ID: 2738559852-0
                                                                          • Opcode ID: b5812e5ed9718f7b2744ddd4a609bd4fa9c280ffeda6609f3d5a7a267b578321
                                                                          • Instruction ID: 8eec693c20ea201455f58cc19a1703b1c0b8318bcede7b5e8512f23d088d7e7c
                                                                          • Opcode Fuzzy Hash: b5812e5ed9718f7b2744ddd4a609bd4fa9c280ffeda6609f3d5a7a267b578321
                                                                          • Instruction Fuzzy Hash: 45416FB250C610AFE7156E19DC81BAABBE9EF98720F16492DEBC883740D63558408BD7
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D6A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D6A000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d6a000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: DeleteFile
                                                                          • String ID:
                                                                          • API String ID: 4033686569-0
                                                                          • Opcode ID: f3ef28c9098564d07ae337382e149d342a29a769a9454d9c368cd47cc928549e
                                                                          • Instruction ID: 4ae033471feb4a1f39fba5a8066a6867df5a782449226673d926a7d2fa1cdfca
                                                                          • Opcode Fuzzy Hash: f3ef28c9098564d07ae337382e149d342a29a769a9454d9c368cd47cc928549e
                                                                          • Instruction Fuzzy Hash: F12148F260C600AFE305AF19ED457BEFBE9EF94720F16492EE1C5C2710D67548408A97
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D3E8F9
                                                                            • Part of subcall function 02D31A01: TlsGetValue.KERNEL32 ref: 02D31A0A
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prologValue
                                                                          • String ID:
                                                                          • API String ID: 3700342317-0
                                                                          • Opcode ID: 6e44beab46495fd2a1a8619760426480318595889bfa6598383c275d7c023827
                                                                          • Instruction ID: 55bf5a0fc35abf6dda3a035570e73f02ab4a56b6ead6518e4da424c9fd10615e
                                                                          • Opcode Fuzzy Hash: 6e44beab46495fd2a1a8619760426480318595889bfa6598383c275d7c023827
                                                                          • Instruction Fuzzy Hash: 17214FB1904209AFDB01DF94D940AEEBBF9EF48310F14411AE918A7380D771AD00CBB1
                                                                          APIs
                                                                          • WriteFile.KERNELBASE(79E8203A), ref: 02DA7B95
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D6A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D6A000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d6a000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite
                                                                          • String ID:
                                                                          • API String ID: 3934441357-0
                                                                          • Opcode ID: 3915b25f501adda37701ba45b5e6d7c6b3f418245b0caa6f629379af37b0af09
                                                                          • Instruction ID: 4b359b215262f273a42948ea0d1630d1549971b369dc2ff5a8807bc8925253df
                                                                          • Opcode Fuzzy Hash: 3915b25f501adda37701ba45b5e6d7c6b3f418245b0caa6f629379af37b0af09
                                                                          • Instruction Fuzzy Hash: 2A1133F250C7009BE305BF09E881A7AFBE4EF54720F02492DE7C843B40E635A8408A97
                                                                          APIs
                                                                          • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02D333CC
                                                                            • Part of subcall function 02D332AB: __EH_prolog.LIBCMT ref: 02D332B0
                                                                            • Part of subcall function 02D332AB: RtlEnterCriticalSection.NTDLL(?), ref: 02D332C3
                                                                            • Part of subcall function 02D332AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02D332EF
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                                          • String ID:
                                                                          • API String ID: 1518410164-0
                                                                          • Opcode ID: 3e632739f3891bb1ec08cb48dfc2c8de6c6eed53744b55502a422a1542515c94
                                                                          • Instruction ID: 10fbc436fb823c28f3b89be75b38d2d3145fc7251fa7a4b33ffe1878ff8325d3
                                                                          • Opcode Fuzzy Hash: 3e632739f3891bb1ec08cb48dfc2c8de6c6eed53744b55502a422a1542515c94
                                                                          • Instruction Fuzzy Hash: 0C016D71614606AFD7058F59D885B55FBA9FF44330F24835AE828873C0EB70EC21CBA0
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D3E489
                                                                            • Part of subcall function 02D326DB: RtlEnterCriticalSection.NTDLL(?), ref: 02D32706
                                                                            • Part of subcall function 02D326DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02D3272B
                                                                            • Part of subcall function 02D326DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02D55A93), ref: 02D32738
                                                                            • Part of subcall function 02D326DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02D32778
                                                                            • Part of subcall function 02D326DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02D327D9
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                          • String ID:
                                                                          • API String ID: 4293676635-0
                                                                          • Opcode ID: a063f96e3444d3c011575260fabac7bcf4c9ecd802f7a0c340c98acc54eef87a
                                                                          • Instruction ID: 4f505da5713b57aceda9194a466d914b29ccbd4ea70a4fb6e0dcb3c7c62a0ba1
                                                                          • Opcode Fuzzy Hash: a063f96e3444d3c011575260fabac7bcf4c9ecd802f7a0c340c98acc54eef87a
                                                                          • Instruction Fuzzy Hash: 1D0190B1911B149FCB18CF5AC544986FBF5EF88314B15C5AE98498B721E7B1EA40CFA0
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D3E268
                                                                            • Part of subcall function 02D43A8F: _malloc.LIBCMT ref: 02D43AA7
                                                                            • Part of subcall function 02D3E484: __EH_prolog.LIBCMT ref: 02D3E489
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog$_malloc
                                                                          • String ID:
                                                                          • API String ID: 4254904621-0
                                                                          • Opcode ID: f9924c73de7cb1fdd20bd28ebc359dc3b667db810778ef141afa483230425168
                                                                          • Instruction ID: 3d0f6880509e50a83a8dc63b0c4269302b57c76a0d8a5ed5acba23f901b177af
                                                                          • Opcode Fuzzy Hash: f9924c73de7cb1fdd20bd28ebc359dc3b667db810778ef141afa483230425168
                                                                          • Instruction Fuzzy Hash: 9EE0C271A04105ABDF4EDFA8E80177D77A6EF08300F0082AEB808D2780DFB0DD00CA61
                                                                          APIs
                                                                            • Part of subcall function 02D45B9A: __getptd_noexit.LIBCMT ref: 02D45B9B
                                                                            • Part of subcall function 02D45B9A: __amsg_exit.LIBCMT ref: 02D45BA8
                                                                            • Part of subcall function 02D433D6: __getptd_noexit.LIBCMT ref: 02D433DA
                                                                            • Part of subcall function 02D433D6: __freeptd.LIBCMT ref: 02D433F4
                                                                            • Part of subcall function 02D433D6: RtlExitUserThread.NTDLL(?,00000000,?,02D433B6,00000000), ref: 02D433FD
                                                                          • __XcptFilter.LIBCMT ref: 02D433C2
                                                                            • Part of subcall function 02D48CD4: __getptd_noexit.LIBCMT ref: 02D48CD8
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                          • String ID:
                                                                          • API String ID: 1405322794-0
                                                                          • Opcode ID: 3a396228367c487aaa947f2c05fe98fb384ad524e05412377545b932f3984070
                                                                          • Instruction ID: df36d2f2d2252b853963d662f60673183ba4c0e94ca464eb2b827cba9d5e5b78
                                                                          • Opcode Fuzzy Hash: 3a396228367c487aaa947f2c05fe98fb384ad524e05412377545b932f3984070
                                                                          • Instruction Fuzzy Hash: DFE0ECB19456059FEB08BBA4D909F6E77B6EF44302F200189E1029B760DEB5AD40AF30
                                                                          APIs
                                                                          • WriteFile.KERNELBASE(168B68CD), ref: 02D9D270
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D6A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D6A000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d6a000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite
                                                                          • String ID:
                                                                          • API String ID: 3934441357-0
                                                                          • Opcode ID: ba0120dea6040682c711fb528a34c4293d4fbea60e8080d3759344d749e7a377
                                                                          • Instruction ID: f7c941c792d0bce7d83d99bd57eab463ad6ea6f6af4a67a1b76158c1aeb2301f
                                                                          • Opcode Fuzzy Hash: ba0120dea6040682c711fb528a34c4293d4fbea60e8080d3759344d749e7a377
                                                                          • Instruction Fuzzy Hash: ADD01CB008CB088BCB157F08DC84279FBF4AF00300F12081C92D182310EA748888CB86
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: ManagerOpen
                                                                          • String ID:
                                                                          • API String ID: 1889721586-0
                                                                          • Opcode ID: 8264c35b346934b1a34de84308aa6ba0c3dc43f738d8b3d182250907c2d0be6e
                                                                          • Instruction ID: cf44c9507d41d844d4e08f7d14fcdcefca16c4e82706d54fd6ba5a2fce2703a3
                                                                          • Opcode Fuzzy Hash: 8264c35b346934b1a34de84308aa6ba0c3dc43f738d8b3d182250907c2d0be6e
                                                                          • Instruction Fuzzy Hash: E2C012B004C302EAC2A08A200FE883A219CC124384B708837A207B91D6D37D091BB9BF
                                                                          APIs
                                                                          • LoadLibraryExA.KERNELBASE(?,00000000), ref: 0040B8EC
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 1029625771-0
                                                                          • Opcode ID: 11852e692feb5fc0fe2d537e4d4718d73ee6626a7552695eefc9478bb5382bb0
                                                                          • Instruction ID: ca2f13da04a3db2b3b4b96cdd5c8feaaa244f5f3b1ba8505971a5640bbb5702b
                                                                          • Opcode Fuzzy Hash: 11852e692feb5fc0fe2d537e4d4718d73ee6626a7552695eefc9478bb5382bb0
                                                                          • Instruction Fuzzy Hash: 50D02230200212DBCB005BB4CD68B6436B0FF427A0F008636FC12FC4D0C3B180027A0A
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Open
                                                                          • String ID:
                                                                          • API String ID: 71445658-0
                                                                          • Opcode ID: 23fe80eec49aeeb1678493c446eb42f43d3f12bada28fb0827316aa0324d5972
                                                                          • Instruction ID: 1c57bc09d8bf22a48340e4eb788f302c9c1bfc31f98e5d519a64d6cb0c2937c0
                                                                          • Opcode Fuzzy Hash: 23fe80eec49aeeb1678493c446eb42f43d3f12bada28fb0827316aa0324d5972
                                                                          • Instruction Fuzzy Hash: C6C00270504106EAD7448A928E5866D66A46708345F20457B8803B11C5D3B9C155592E
                                                                          APIs
                                                                          • GetLocalTime.KERNEL32(00409F90), ref: 0040B9B8
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: LocalTime
                                                                          • String ID:
                                                                          • API String ID: 481472006-0
                                                                          • Opcode ID: ebd2a821f356bc171f27cbc6d7b5de8ef6eae71528622997e5226e3dbc7ec01b
                                                                          • Instruction ID: a7f967e1ebb2f7ebd95cfc360c7a78c232a595a08d73ceb3f1a41a67e7c67032
                                                                          • Opcode Fuzzy Hash: ebd2a821f356bc171f27cbc6d7b5de8ef6eae71528622997e5226e3dbc7ec01b
                                                                          • Instruction Fuzzy Hash: 4BC08CB1808402EECB00AB62894602932E4DA58386321803BC003F30A0D73C8402DF9F
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: CopyFile
                                                                          • String ID:
                                                                          • API String ID: 1304948518-0
                                                                          • Opcode ID: 9941e5161190b93204a8f50b1f4f5bc0fef5feafe68d5a0c3e5b2582f36667c7
                                                                          • Instruction ID: 92994eed6788655cd6e8b5697041bbc974fe699f59b47debdc455bcc225c985b
                                                                          • Opcode Fuzzy Hash: 9941e5161190b93204a8f50b1f4f5bc0fef5feafe68d5a0c3e5b2582f36667c7
                                                                          • Instruction Fuzzy Hash: AEB01294148012FED1000E155EC8F37221CD8483D532504723003F00C0D37C444275BF
                                                                          APIs
                                                                          • CreateDirectoryA.KERNELBASE ref: 004025F9
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: CreateDirectory
                                                                          • String ID:
                                                                          • API String ID: 4241100979-0
                                                                          • Opcode ID: dd21338a10475b92d35c91b6d7a1eb9cdff4975aba9547ccf27c8b6d8e9fca1c
                                                                          • Instruction ID: 6c2bb403a29e9a4daca0c7564591e9dc5a5c57b0ea50bd6513e4dc3229f0b2d4
                                                                          • Opcode Fuzzy Hash: dd21338a10475b92d35c91b6d7a1eb9cdff4975aba9547ccf27c8b6d8e9fca1c
                                                                          • Instruction Fuzzy Hash: 04B0926448A120E3C00112501E18D6A6818A81974172040B33203700D042B9004232AF
                                                                          APIs
                                                                          • RegSetValueExA.KERNELBASE(?), ref: 0040BAD2
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Value
                                                                          • String ID:
                                                                          • API String ID: 3702945584-0
                                                                          • Opcode ID: f0798ced970cd0eee09a48c3301d522f9189595879b829ecdb2c50a8d54bb03d
                                                                          • Instruction ID: dcbd4d72fe35a2031074dc5c123e8ed0107a6bbbcb0a95934b4016e8c6f2847c
                                                                          • Opcode Fuzzy Hash: f0798ced970cd0eee09a48c3301d522f9189595879b829ecdb2c50a8d54bb03d
                                                                          • Instruction Fuzzy Hash: 69B09270448004FACB050B808C04A7C7E39EB08308F2008A6E003704A0C33A1662BAAF
                                                                          APIs
                                                                          • RegCloseKey.KERNELBASE(?), ref: 0040BAB8
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Close
                                                                          • String ID:
                                                                          • API String ID: 3535843008-0
                                                                          • Opcode ID: 74fdc1d825e6b9643e33f7b1b15225b0ab1e21605966e4fe9622bb3e7052b3ff
                                                                          • Instruction ID: e7ce10565d94f2d6b5d79441531ae5dedac754878596eced195b0ecab70b45c4
                                                                          • Opcode Fuzzy Hash: 74fdc1d825e6b9643e33f7b1b15225b0ab1e21605966e4fe9622bb3e7052b3ff
                                                                          • Instruction Fuzzy Hash: 41B01230D48000D6C60007848E04C5D3E70EE043003204073A323300D0833E60126B4F
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Close
                                                                          • String ID:
                                                                          • API String ID: 3535843008-0
                                                                          • Opcode ID: 53827522284af458aa1ab5c18d52477b93fa4c5ed2fdaecd456359178508f89c
                                                                          • Instruction ID: 7835f287b7ac2ec363220ad89fda173408b54a468dd99bcfa8236ab55ce49fe7
                                                                          • Opcode Fuzzy Hash: 53827522284af458aa1ab5c18d52477b93fa4c5ed2fdaecd456359178508f89c
                                                                          • Instruction Fuzzy Hash: 3EA00231848001EBC6054B60EF084143EB1E7093013114131E30B705B6C7756575AB4E
                                                                          APIs
                                                                          • RegQueryValueExA.KERNELBASE ref: 00402772
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue
                                                                          • String ID:
                                                                          • API String ID: 3660427363-0
                                                                          • Opcode ID: dd30d86c2cb366e9c13c8ea6a3dceef0d370df1b95f0ba6f3b87dfe9bf79d56a
                                                                          • Instruction ID: db611a556c80a4156a95494c6baac6c809ed63d2f65f8c354959cc7a17010b18
                                                                          • Opcode Fuzzy Hash: dd30d86c2cb366e9c13c8ea6a3dceef0d370df1b95f0ba6f3b87dfe9bf79d56a
                                                                          • Instruction Fuzzy Hash: CB900220254501AED2108E315E1C3152594654464132288355857E5091EA748051692D
                                                                          APIs
                                                                            • Part of subcall function 02D41550: OpenEventA.KERNEL32(00100002,00000000,00000000,B4D04043), ref: 02D415F0
                                                                            • Part of subcall function 02D41550: CloseHandle.KERNEL32(00000000), ref: 02D41605
                                                                            • Part of subcall function 02D41550: ResetEvent.KERNEL32(00000000,B4D04043), ref: 02D4160F
                                                                            • Part of subcall function 02D41550: CloseHandle.KERNEL32(00000000,B4D04043), ref: 02D41644
                                                                          • TlsSetValue.KERNEL32(0000002A,?), ref: 02D420EA
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseEventHandle$OpenResetValue
                                                                          • String ID:
                                                                          • API String ID: 1556185888-0
                                                                          • Opcode ID: 88b31bf6b150d18b737160bc50acd8af7f153852026d601aba0691547ebfb5dc
                                                                          • Instruction ID: 41ca115c9d16b01bb5166d222c8aa8fdd37d739c40b3838259c4fa159204b52d
                                                                          • Opcode Fuzzy Hash: 88b31bf6b150d18b737160bc50acd8af7f153852026d601aba0691547ebfb5dc
                                                                          • Instruction Fuzzy Hash: 6A016271A44214AFD710CF59DC49B5ABBF8FB05B71F20476AF829D3380DB75AD148AA0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: lstrcmpi
                                                                          • String ID:
                                                                          • API String ID: 1586166983-0
                                                                          • Opcode ID: d108c22fc2e37e3caf674346fda2c78ea9e8020dd7fe3d8767b3de86e3e1df8b
                                                                          • Instruction ID: ee11f810c3cfba0e7caa508147121e7600cb08dd9aaa16b000fde8ec8f334829
                                                                          • Opcode Fuzzy Hash: d108c22fc2e37e3caf674346fda2c78ea9e8020dd7fe3d8767b3de86e3e1df8b
                                                                          • Instruction Fuzzy Hash: E2D01230A05105EAD714DF61DE5557A3774EE043407314433D807F01E1E33D9A12A99F
                                                                          APIs
                                                                          • VirtualAlloc.KERNELBASE(00000000), ref: 0040BA39
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 8cf77ba56312f54d1de7b4e86e86cbe2d3fc3d75dfff5ed5d6e23ae7d353bf3e
                                                                          • Instruction ID: 8baab39f79222ad69af9f7c184d24bad087c08ac3741b2477b829d7ccf767dca
                                                                          • Opcode Fuzzy Hash: 8cf77ba56312f54d1de7b4e86e86cbe2d3fc3d75dfff5ed5d6e23ae7d353bf3e
                                                                          • Instruction Fuzzy Hash: B4C09B75544211DFD7014F944D057797A64FB08700F150032B607B51D0C3B40459DBDA
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Sleep
                                                                          • String ID:
                                                                          • API String ID: 3472027048-0
                                                                          • Opcode ID: 7fb4213547574f66c02ff0f43809cfe0ee43891f6a3f8159c78aa0a70bd72f64
                                                                          • Instruction ID: 1c164ee476cb8379e7514de9a49bea1d2529bdc8e948ab7d787de939f3fa2199
                                                                          • Opcode Fuzzy Hash: 7fb4213547574f66c02ff0f43809cfe0ee43891f6a3f8159c78aa0a70bd72f64
                                                                          • Instruction Fuzzy Hash: 1FB01270084501F7C70017105D0CB207B30F300305F128022A303300D083390022A78E
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Sleep
                                                                          • String ID:
                                                                          • API String ID: 3472027048-0
                                                                          • Opcode ID: 560f6e5b77014ce9311d8275f1ebcf9d822d17cd6fca2ff53e7c27d995d99283
                                                                          • Instruction ID: a4846ccc1d67bb746d88fd63910e671ade73014cd24cf15cf678f30609dd6dec
                                                                          • Opcode Fuzzy Hash: 560f6e5b77014ce9311d8275f1ebcf9d822d17cd6fca2ff53e7c27d995d99283
                                                                          • Instruction Fuzzy Hash: 30B001B1988500EAD6054B60AE09F343A31F305719F254636A70B746E1CB7B18A6AA8F
                                                                          APIs
                                                                          • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02D408E2
                                                                          • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02D408EA
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorFormatLastMessage
                                                                          • String ID:
                                                                          • API String ID: 3479602957-0
                                                                          • Opcode ID: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                                          • Instruction ID: aecc006e4a83c7ad2fc98727af667fc90e0c7ef1db0060251ebbfff66f11a404
                                                                          • Opcode Fuzzy Hash: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                                          • Instruction Fuzzy Hash: EEF0B430308301CFEB18CE25C851F2EB7E4AB9C745F54092CF695A2291D770D541CF56
                                                                          APIs
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02D44DD6,?,?,?,00000001), ref: 02D4946D
                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02D49476
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled
                                                                          • String ID:
                                                                          • API String ID: 3192549508-0
                                                                          • Opcode ID: 792d1615718b620ed4e0aaa34a44d8787b84ea0ae123fa84216e4cc3ada23778
                                                                          • Instruction ID: f9fb2e57e8d9cf14c1d4347c0dd795fb017d256586f40cc1f91ee31567b81073
                                                                          • Opcode Fuzzy Hash: 792d1615718b620ed4e0aaa34a44d8787b84ea0ae123fa84216e4cc3ada23778
                                                                          • Instruction Fuzzy Hash: A5B09231484318EBEB012B99EC09B8ABFB8EF04662F604810F60D44250CBA258209AA1
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: CreateService
                                                                          • String ID:
                                                                          • API String ID: 1592570254-0
                                                                          • Opcode ID: 1d38772bc1ace6aa1b07cd755cd4630d2b7614a248986e062ee3cea099dcb878
                                                                          • Instruction ID: f7d3c8d18ae334c858f8c4169a54dec7e29353bdc6d6116ea5f4fa24518e5ba3
                                                                          • Opcode Fuzzy Hash: 1d38772bc1ace6aa1b07cd755cd4630d2b7614a248986e062ee3cea099dcb878
                                                                          • Instruction Fuzzy Hash: 43B01250288101F9C1000A101C548251038D1417443B004769003F00D0D33C02867DFF
                                                                          APIs
                                                                          • StartServiceCtrlDispatcherA.ADVAPI32 ref: 004027BE
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: CtrlDispatcherServiceStart
                                                                          • String ID:
                                                                          • API String ID: 3789849863-0
                                                                          • Opcode ID: 6492b282c70fd13d5cbb1222aad192a51b611fb48b1ee967596fe98ef600a279
                                                                          • Instruction ID: 241407c2588b1c3ee9bf3d258d8a139c16ddca8ca6f6fd059ddab97a4f2a1dda
                                                                          • Opcode Fuzzy Hash: 6492b282c70fd13d5cbb1222aad192a51b611fb48b1ee967596fe98ef600a279
                                                                          • Instruction Fuzzy Hash: E690027004D200C6D94446109E0C4786518E24F7167215033D00F728D5877C0456655F
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                                          • Instruction ID: c9c24dbf26c491d7dcebf372a746de87ee6b4a94704efeffb210257f008b3436
                                                                          • Opcode Fuzzy Hash: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                                          • Instruction Fuzzy Hash: E8F082B190430DBFD700DF95D942B9DFBB8EB84314F20816AD508A7340E6707E118B94
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D324E6
                                                                          • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02D324FC
                                                                          • RtlEnterCriticalSection.NTDLL(?), ref: 02D3250E
                                                                          • RtlLeaveCriticalSection.NTDLL(?), ref: 02D3256D
                                                                          • SetLastError.KERNEL32(00000000,?,74DEDFB0), ref: 02D3257F
                                                                          • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,74DEDFB0), ref: 02D32599
                                                                          • GetLastError.KERNEL32(?,74DEDFB0), ref: 02D325A2
                                                                          • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02D325F0
                                                                          • InterlockedDecrement.KERNEL32(00000002), ref: 02D3262F
                                                                          • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02D3268E
                                                                          • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D32699
                                                                          • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02D326AD
                                                                          • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,74DEDFB0), ref: 02D326BD
                                                                          • GetLastError.KERNEL32(?,74DEDFB0), ref: 02D326C7
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                          • String ID:
                                                                          • API String ID: 1213838671-0
                                                                          • Opcode ID: 0361a1c598f33243f0445fd9ec3da529cdd6244625b48f36177a9fbb1d5de259
                                                                          • Instruction ID: 4ebb4a69a0c1db030ea09e869b4e3965a9fd6d9c9642f85eecbb2fb4808c5a9b
                                                                          • Opcode Fuzzy Hash: 0361a1c598f33243f0445fd9ec3da529cdd6244625b48f36177a9fbb1d5de259
                                                                          • Instruction Fuzzy Hash: E7610C71D00219AFDB11DFA8D988AAEBBF9FF08314F20456AE956E3340D7749D54CB60
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D34608
                                                                            • Part of subcall function 02D43A8F: _malloc.LIBCMT ref: 02D43AA7
                                                                          • htons.WS2_32(?), ref: 02D34669
                                                                          • htonl.WS2_32(?), ref: 02D3468C
                                                                          • htonl.WS2_32(00000000), ref: 02D34693
                                                                          • htons.WS2_32(00000000), ref: 02D34747
                                                                          • _sprintf.LIBCMT ref: 02D3475D
                                                                            • Part of subcall function 02D388BF: _memmove.LIBCMT ref: 02D388DF
                                                                          • htons.WS2_32(?), ref: 02D346B0
                                                                            • Part of subcall function 02D3966A: __EH_prolog.LIBCMT ref: 02D3966F
                                                                            • Part of subcall function 02D3966A: RtlEnterCriticalSection.NTDLL(00000020), ref: 02D396EA
                                                                            • Part of subcall function 02D3966A: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02D39708
                                                                            • Part of subcall function 02D31BA7: __EH_prolog.LIBCMT ref: 02D31BAC
                                                                            • Part of subcall function 02D31BA7: RtlEnterCriticalSection.NTDLL ref: 02D31BBC
                                                                            • Part of subcall function 02D31BA7: RtlLeaveCriticalSection.NTDLL ref: 02D31BEA
                                                                            • Part of subcall function 02D31BA7: RtlEnterCriticalSection.NTDLL ref: 02D31C13
                                                                            • Part of subcall function 02D31BA7: RtlLeaveCriticalSection.NTDLL ref: 02D31C56
                                                                            • Part of subcall function 02D3DE26: __EH_prolog.LIBCMT ref: 02D3DE2B
                                                                          • htonl.WS2_32(?), ref: 02D3497C
                                                                          • htonl.WS2_32(00000000), ref: 02D34983
                                                                          • htonl.WS2_32(00000000), ref: 02D349C8
                                                                          • htonl.WS2_32(00000000), ref: 02D349CF
                                                                          • htons.WS2_32(?), ref: 02D349EF
                                                                          • htons.WS2_32(?), ref: 02D349F9
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                                          • String ID:
                                                                          • API String ID: 1645262487-0
                                                                          • Opcode ID: 1be7a1d7004829facf22768cf867b9e0084f5a6d84b3e3fa03d816e503734259
                                                                          • Instruction ID: d1bcd79de096f8dde3a3f9606ac6943245a687c888c31de6198855f20cbb6735
                                                                          • Opcode Fuzzy Hash: 1be7a1d7004829facf22768cf867b9e0084f5a6d84b3e3fa03d816e503734259
                                                                          • Instruction Fuzzy Hash: 10022671D01259AFEF16DBA4D844BEEBBB9EF08304F10415AE545A7380DBB45E88CFA1
                                                                          APIs
                                                                          • RegisterServiceCtrlHandlerA.ADVAPI32(ET Ammeter Side 10.7.45,0040235E), ref: 004023C1
                                                                          • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402420
                                                                          • GetLastError.KERNEL32 ref: 00402422
                                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                                          • GetLastError.KERNEL32 ref: 00402450
                                                                          • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402480
                                                                          • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                                          • CloseHandle.KERNEL32 ref: 004024A1
                                                                          • SetServiceStatus.ADVAPI32(0040A0E0), ref: 004024CA
                                                                          Strings
                                                                          • ET Ammeter Side 10.7.45, xrefs: 004023BC
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                          • String ID: ET Ammeter Side 10.7.45
                                                                          • API String ID: 3346042915-2295085586
                                                                          • Opcode ID: 0bac2955eb8625cf60f76f4bbfe82ce878a41a6c6cb59ed4d7ea205cd266c3a3
                                                                          • Instruction ID: e607d343a15970cd44bf33002b1e5153504bc9bcaf452d951a8c8a09ef4d4640
                                                                          • Opcode Fuzzy Hash: 0bac2955eb8625cf60f76f4bbfe82ce878a41a6c6cb59ed4d7ea205cd266c3a3
                                                                          • Instruction Fuzzy Hash: 56211970441309EBD210DF16EF49E567FB8EB85754710C03BE206B22B1D7BA0465EB2E
                                                                          APIs
                                                                          • RtlDecodePointer.NTDLL(?), ref: 02D4827A
                                                                          • _free.LIBCMT ref: 02D48293
                                                                            • Part of subcall function 02D42EB4: HeapFree.KERNEL32(00000000,00000000,?,02D45C12,00000000,00000104,74DF0A60), ref: 02D42EC8
                                                                            • Part of subcall function 02D42EB4: GetLastError.KERNEL32(00000000,?,02D45C12,00000000,00000104,74DF0A60), ref: 02D42EDA
                                                                          • _free.LIBCMT ref: 02D482A6
                                                                          • _free.LIBCMT ref: 02D482C4
                                                                          • _free.LIBCMT ref: 02D482D6
                                                                          • _free.LIBCMT ref: 02D482E7
                                                                          • _free.LIBCMT ref: 02D482F2
                                                                          • _free.LIBCMT ref: 02D48316
                                                                          • RtlEncodePointer.NTDLL(00ABC4E0), ref: 02D4831D
                                                                          • _free.LIBCMT ref: 02D48332
                                                                          • _free.LIBCMT ref: 02D48348
                                                                          • _free.LIBCMT ref: 02D48370
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                                          • String ID:
                                                                          • API String ID: 3064303923-0
                                                                          • Opcode ID: 2eb9433fb84fb18046ac3997bbcbf0d82be438cb469516121c88b69526734447
                                                                          • Instruction ID: 065af835998c975637670d7aa4737d845a8202bcc3ffbf847eb4782f4b38dd77
                                                                          • Opcode Fuzzy Hash: 2eb9433fb84fb18046ac3997bbcbf0d82be438cb469516121c88b69526734447
                                                                          • Instruction Fuzzy Hash: D6214832D412509BDB25AF15EC8C5167B69EB05BA4729483AED44D7300CF399C65DFB0
                                                                          APIs
                                                                          • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035B9
                                                                          • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035CD
                                                                          • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035F9
                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403631
                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403653
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402DE4), ref: 0040366C
                                                                          • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 0040367F
                                                                          • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004036BD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                          • String ID: -@
                                                                          • API String ID: 1823725401-2999422947
                                                                          • Opcode ID: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                                          • Instruction ID: a052efc5f8264b04540ba139265ff63877c4dc4e75c0ae38b6650f7b3518fcca
                                                                          • Opcode Fuzzy Hash: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                                          • Instruction Fuzzy Hash: 7A31F0B24042217EDB303F785C8883B7E9CE64574A7120D3BF542E3390E67A8E814AAD
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D33428
                                                                          • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02D3346B
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 02D33472
                                                                          • GetLastError.KERNEL32 ref: 02D33486
                                                                          • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02D334D7
                                                                          • RtlEnterCriticalSection.NTDLL(00000018), ref: 02D334ED
                                                                          • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02D33518
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                          • String ID: CancelIoEx$KERNEL32
                                                                          • API String ID: 2902213904-434325024
                                                                          • Opcode ID: 981ac6d86ffe258928b742e45f1c6689e029aaa840345077cf02bc5336cb5ad0
                                                                          • Instruction ID: c4806732aba79907e7941d13a061aa91ce64e77fdec18e72f9ee09756f3213bc
                                                                          • Opcode Fuzzy Hash: 981ac6d86ffe258928b742e45f1c6689e029aaa840345077cf02bc5336cb5ad0
                                                                          • Instruction Fuzzy Hash: 33316A75904315DFEB029F68C944AAABBF9FF48321F1084AAE9159B340CBB0DD10CBA1
                                                                          APIs
                                                                          • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00403D7D,?,Microsoft Visual C++ Runtime Library,00012010,?,00406528,?,00406578,?,?,?,Runtime Error!Program: ), ref: 0040541A
                                                                          • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00405432
                                                                          • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00405443
                                                                          • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00405450
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$LibraryLoad
                                                                          • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll$xe@
                                                                          • API String ID: 2238633743-4073082454
                                                                          • Opcode ID: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                                          • Instruction ID: 002c49bf34bfddc632f277928187d9a53126bd14f393e8a72b926efab3457658
                                                                          • Opcode Fuzzy Hash: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                                          • Instruction Fuzzy Hash: E1018431740705AFC7109FB4AD80E6B7AE9FB48791309843BB955F22A1D778C860CF69
                                                                          APIs
                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00403CC6
                                                                          • GetStdHandle.KERNEL32(000000F4,00406528,00000000,?,00000000,00000000), ref: 00403D9C
                                                                          • WriteFile.KERNEL32(00000000), ref: 00403DA3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: File$HandleModuleNameWrite
                                                                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $r@
                                                                          • API String ID: 3784150691-1191147370
                                                                          • Opcode ID: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                                          • Instruction ID: 901e413bd7d296cb1b0b97d790854a8d5494ec17f79a926850544caa0371b074
                                                                          • Opcode Fuzzy Hash: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                                          • Instruction Fuzzy Hash: F831C772A04208AEEF20EF60DE49F9A776CEF45304F1004BBF545F61C1D6B8AA858A59
                                                                          APIs
                                                                          • LCMapStringW.KERNEL32(00000000,00000100,004065F4,00000001,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 00405917
                                                                          • LCMapStringA.KERNEL32(00000000,00000100,004065F0,00000001,00000000,00000000,?,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405933
                                                                          • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,004051A5,?,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 0040597C
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 004059B4
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A0C
                                                                          • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A22
                                                                          • LCMapStringW.KERNEL32(00000000,?,004051A5,00000000,004051A5,?,?,004051A5,00200020,00000000,?,00000000), ref: 00405A55
                                                                          • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405ABD
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: String$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 352835431-0
                                                                          • Opcode ID: 6e7e0904aad4ffb7df7fa70090622cd283316a6a4d1fe7c3c07164d91eefa06b
                                                                          • Instruction ID: ad677ee5f46337090c489763c5b1535e0d4a7e7cc2f37d679e5ddd81b555dfe6
                                                                          • Opcode Fuzzy Hash: 6e7e0904aad4ffb7df7fa70090622cd283316a6a4d1fe7c3c07164d91eefa06b
                                                                          • Instruction Fuzzy Hash: 8B516C71A00609EFCF218FA5DD85A9F7FB5FB48750F14422AF911B21A0D3398921DF69
                                                                          APIs
                                                                          • OpenEventA.KERNEL32(00100002,00000000,00000000,B4D04043), ref: 02D415F0
                                                                          • CloseHandle.KERNEL32(00000000), ref: 02D41605
                                                                          • ResetEvent.KERNEL32(00000000,B4D04043), ref: 02D4160F
                                                                          • CloseHandle.KERNEL32(00000000,B4D04043), ref: 02D41644
                                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,B4D04043), ref: 02D416BA
                                                                          • CloseHandle.KERNEL32(00000000), ref: 02D416CF
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseEventHandle$CreateOpenReset
                                                                          • String ID:
                                                                          • API String ID: 1285874450-0
                                                                          • Opcode ID: 59affd6f9b4fc3432963fe19855ae2a6ca438ebe606f51642fc6fc9eaad9bac5
                                                                          • Instruction ID: d9cc27ee21a9bc8d43809c2d195fbc366e7a71a422a8bb3352027781849c0c95
                                                                          • Opcode Fuzzy Hash: 59affd6f9b4fc3432963fe19855ae2a6ca438ebe606f51642fc6fc9eaad9bac5
                                                                          • Instruction Fuzzy Hash: EB412C70D04398ABDF20CFA5C844BADBBB8EF05724F244219E819AB380DB70DD45CBA0
                                                                          APIs
                                                                          • InterlockedExchange.KERNEL32(?,00000001), ref: 02D320AC
                                                                          • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02D320CD
                                                                          • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D320D8
                                                                          • InterlockedDecrement.KERNEL32(?), ref: 02D3213E
                                                                          • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02D3217A
                                                                          • InterlockedDecrement.KERNEL32(?), ref: 02D32187
                                                                          • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D321A6
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                          • String ID:
                                                                          • API String ID: 1171374749-0
                                                                          • Opcode ID: 68bad6e72cbe8eacfd4f01b4815cd7c9a46cc056ef61a718f8caa43a50bfb8ed
                                                                          • Instruction ID: 6ce8afd2e011d0d430a8024a05c334c17643f2baa7673db2293e7d32744f6c86
                                                                          • Opcode Fuzzy Hash: 68bad6e72cbe8eacfd4f01b4815cd7c9a46cc056ef61a718f8caa43a50bfb8ed
                                                                          • Instruction Fuzzy Hash: BD410B719047059FD312DF25D888A6BBBF9EFC8754F104A1EB89A82650D770E909CFA1
                                                                          APIs
                                                                            • Part of subcall function 02D41E10: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02D4166E,?,?), ref: 02D41E3F
                                                                            • Part of subcall function 02D41E10: CloseHandle.KERNEL32(00000000,?,?,02D4166E,?,?), ref: 02D41E54
                                                                            • Part of subcall function 02D41E10: SetEvent.KERNEL32(00000000,02D4166E,?,?), ref: 02D41E67
                                                                          • OpenEventA.KERNEL32(00100002,00000000,00000000,B4D04043), ref: 02D415F0
                                                                          • CloseHandle.KERNEL32(00000000), ref: 02D41605
                                                                          • ResetEvent.KERNEL32(00000000,B4D04043), ref: 02D4160F
                                                                          • CloseHandle.KERNEL32(00000000,B4D04043), ref: 02D41644
                                                                          • __CxxThrowException@8.LIBCMT ref: 02D41675
                                                                            • Part of subcall function 02D4449A: RaiseException.KERNEL32(?,?,02D3FA92,?,?,?,?,?,?,?,02D3FA92,?,02D60F78,?), ref: 02D444EF
                                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,B4D04043), ref: 02D416BA
                                                                          • CloseHandle.KERNEL32(00000000), ref: 02D416CF
                                                                            • Part of subcall function 02D41B50: GetCurrentProcessId.KERNEL32(?), ref: 02D41BA9
                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,B4D04043), ref: 02D416DF
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                          • String ID:
                                                                          • API String ID: 2227236058-0
                                                                          • Opcode ID: 9519c1e49951befd382d0989f914beb43829aa118219a1ea4c7b75d0d730d9e6
                                                                          • Instruction ID: 7c592f9c7f0b52acfe9b7f07e6aeab9cd162323968d843c5ee8f622222d609df
                                                                          • Opcode Fuzzy Hash: 9519c1e49951befd382d0989f914beb43829aa118219a1ea4c7b75d0d730d9e6
                                                                          • Instruction Fuzzy Hash: 9C314C75D003999BDF20CBA4D844BADB7B9AF05315F180119E81DEB380EB60DD85CB61
                                                                          APIs
                                                                          • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00403A36), ref: 00404639
                                                                          • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00403A36), ref: 0040465D
                                                                          • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00403A36), ref: 00404677
                                                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00403A36), ref: 00404738
                                                                          • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00403A36), ref: 0040474F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual$FreeHeap
                                                                          • String ID: r@$r@
                                                                          • API String ID: 714016831-1712950306
                                                                          • Opcode ID: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                                          • Instruction ID: 6d2ae56a8b2e66d9b660bb9c1c671dd7469dd609f739855ae4ec176a3c74651c
                                                                          • Opcode Fuzzy Hash: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                                          • Instruction Fuzzy Hash: 3531BEB0940702ABD3309F24DD44B66B7A4EB86755F11463BF265BB2D0E7B8A8418B4D
                                                                          APIs
                                                                          • __init_pointers.LIBCMT ref: 02D45CD4
                                                                            • Part of subcall function 02D48442: RtlEncodePointer.NTDLL(00000000), ref: 02D48445
                                                                            • Part of subcall function 02D48442: __initp_misc_winsig.LIBCMT ref: 02D48460
                                                                            • Part of subcall function 02D48442: GetModuleHandleW.KERNEL32(kernel32.dll,?,02D61578,00000008,00000003,02D60F5C,?,00000001), ref: 02D491C1
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02D491D5
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02D491E8
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02D491FB
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02D4920E
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02D49221
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02D49234
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02D49247
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02D4925A
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02D4926D
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02D49280
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02D49293
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02D492A6
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02D492B9
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02D492CC
                                                                            • Part of subcall function 02D48442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02D492DF
                                                                          • __mtinitlocks.LIBCMT ref: 02D45CD9
                                                                          • __mtterm.LIBCMT ref: 02D45CE2
                                                                            • Part of subcall function 02D45D4A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02D48878
                                                                            • Part of subcall function 02D45D4A: _free.LIBCMT ref: 02D4887F
                                                                            • Part of subcall function 02D45D4A: RtlDeleteCriticalSection.NTDLL(02D63978), ref: 02D488A1
                                                                          • __calloc_crt.LIBCMT ref: 02D45D07
                                                                          • __initptd.LIBCMT ref: 02D45D29
                                                                          • GetCurrentThreadId.KERNEL32 ref: 02D45D30
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                          • String ID:
                                                                          • API String ID: 3567560977-0
                                                                          • Opcode ID: f8407ce038c0054fe348f62bb9827fc39ca444aacd49744b9d93b29f47886996
                                                                          • Instruction ID: 118d820a87122622cdec9e072ed9f038cc7d5fe4c89daa080867749143194d43
                                                                          • Opcode Fuzzy Hash: f8407ce038c0054fe348f62bb9827fc39ca444aacd49744b9d93b29f47886996
                                                                          • Instruction Fuzzy Hash: F9F0B4329587211FE66876B57C0E64A2786DF12B74F600A5AF455EA3C0FF11DC418971
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02D433B6,00000000), ref: 02D4341E
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 02D43425
                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 02D43431
                                                                          • RtlDecodePointer.NTDLL(00000001), ref: 02D4344E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                          • String ID: RoInitialize$combase.dll
                                                                          • API String ID: 3489934621-340411864
                                                                          • Opcode ID: 862de5bb066fa1391f4a321d5dfc642c0fcdd331de67b4efc61c48407d95ede6
                                                                          • Instruction ID: 310c052c67d1d317107cf43b98d12283cd590e7fe212a76b8e1fde900d544921
                                                                          • Opcode Fuzzy Hash: 862de5bb066fa1391f4a321d5dfc642c0fcdd331de67b4efc61c48407d95ede6
                                                                          • Instruction Fuzzy Hash: A2E0C270ED0321ABFB605B74AC4EB463769BB00B47F705860F416E1384CBF988689A60
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02D433F3), ref: 02D434F3
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 02D434FA
                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 02D43505
                                                                          • RtlDecodePointer.NTDLL(02D433F3), ref: 02D43520
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                          • String ID: RoUninitialize$combase.dll
                                                                          • API String ID: 3489934621-2819208100
                                                                          • Opcode ID: f8ed693f9ba1e0f6b64711adea4f6e859f10d4d5d8ce7f11f0e86104ffb91f4e
                                                                          • Instruction ID: 128017184dbcd2904f66589cd236ce7fbba33e5d814dff4299fb415eec1968e3
                                                                          • Opcode Fuzzy Hash: f8ed693f9ba1e0f6b64711adea4f6e859f10d4d5d8ce7f11f0e86104ffb91f4e
                                                                          • Instruction Fuzzy Hash: 99E07E70DD0320EBEB605F64EC0DB067BA9F714606F301864E506E1384CBB89D649AA4
                                                                          APIs
                                                                          • TlsGetValue.KERNEL32(0000002A,B4D04043,?,?,?,?,00000000,02D569F8,000000FF,02D4210A), ref: 02D41EAA
                                                                          • TlsSetValue.KERNEL32(0000002A,02D4210A,?,?,00000000), ref: 02D41F17
                                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02D41F41
                                                                          • HeapFree.KERNEL32(00000000), ref: 02D41F44
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: HeapValue$FreeProcess
                                                                          • String ID:
                                                                          • API String ID: 1812714009-0
                                                                          • Opcode ID: 4ccc1914fb0909a44b64dbc73c18517ea6f832e7b7501257c3507d150a338143
                                                                          • Instruction ID: d76e28ec864bb948095daf05c7a946268d1302d01d0ac834515b0f9d6d85f4ee
                                                                          • Opcode Fuzzy Hash: 4ccc1914fb0909a44b64dbc73c18517ea6f832e7b7501257c3507d150a338143
                                                                          • Instruction Fuzzy Hash: 1A519C36A043549FD720CF29D848B16BBE4FB45664F198669F86D97380DB70EC81CB90
                                                                          APIs
                                                                          • _ValidateScopeTableHandlers.LIBCMT ref: 02D556D0
                                                                          • __FindPESection.LIBCMT ref: 02D556EA
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: FindHandlersScopeSectionTableValidate
                                                                          • String ID:
                                                                          • API String ID: 876702719-0
                                                                          • Opcode ID: 5845aa5230f6cadb34ee8f8729ad1601b9813006326bd3ee2115d449bb32805f
                                                                          • Instruction ID: 81741dec40c04a12e14dc335719ee759a92ec90db23e7168dd1e6a78e49935e6
                                                                          • Opcode Fuzzy Hash: 5845aa5230f6cadb34ee8f8729ad1601b9813006326bd3ee2115d449bb32805f
                                                                          • Instruction Fuzzy Hash: B9A1BF75A002698FDF26CF58E8847ADB7E5FB08329F984669DC55A7350E774EC00CBA0
                                                                          APIs
                                                                          • GetStringTypeW.KERNEL32(00000001,004065F4,00000001,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405B63
                                                                          • GetStringTypeA.KERNEL32(00000000,00000001,004065F0,00000001,?,?,00000000,00000000,00000001), ref: 00405B7D
                                                                          • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BB1
                                                                          • MultiByteToWideChar.KERNEL32(004051A5,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BE9
                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C3F
                                                                          • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C51
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: StringType$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 3852931651-0
                                                                          • Opcode ID: d4209c6b3d3c9ca3d0b98124627720af5477d93fa3c81dc5f6dd6a722f71754a
                                                                          • Instruction ID: b73683cf29d179dc30ac0dacbc12c8afa3e963ef4805c6be7b54428ebd0f8a91
                                                                          • Opcode Fuzzy Hash: d4209c6b3d3c9ca3d0b98124627720af5477d93fa3c81dc5f6dd6a722f71754a
                                                                          • Instruction Fuzzy Hash: 1E417B71500609EFDF219F94DD86AAF7F79EB05750F10443AFA12B6290C339A960CBA9
                                                                          APIs
                                                                          • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02D31CB1
                                                                          • CloseHandle.KERNEL32(?), ref: 02D31CBA
                                                                          • InterlockedExchangeAdd.KERNEL32(02D67244,00000000), ref: 02D31CC6
                                                                          • TerminateThread.KERNEL32(?,00000000), ref: 02D31CD4
                                                                          • QueueUserAPC.KERNEL32(02D31E7C,?,00000000), ref: 02D31CE1
                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02D31CEC
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                          • String ID:
                                                                          • API String ID: 1946104331-0
                                                                          • Opcode ID: 943de3b5c1d7a50a5e78fe6e687556656ec013a391f020ad12ea88f6097f9652
                                                                          • Instruction ID: 8829a797bb2c237c5d8e1728840cc510f23bc112acfa678b1dc863893f0467c0
                                                                          • Opcode Fuzzy Hash: 943de3b5c1d7a50a5e78fe6e687556656ec013a391f020ad12ea88f6097f9652
                                                                          • Instruction Fuzzy Hash: 97F08131940325BFE7104B9AEC0DC5BFBFCEF49720B204659F52A82290DBB09D10CB20
                                                                          APIs
                                                                          • GetVersionExA.KERNEL32 ref: 004038C7
                                                                          • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004038FC
                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040395C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: EnvironmentFileModuleNameVariableVersion
                                                                          • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                          • API String ID: 1385375860-4131005785
                                                                          • Opcode ID: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                          • Instruction ID: dfbe321087950a958f1f5ebe55e663b38e75b845a74228cdfb1d658b51cb0ff2
                                                                          • Opcode Fuzzy Hash: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                          • Instruction Fuzzy Hash: A53127B29052446DEB319A705C46BDF3F6C9B02305F2400FBD185F52C2D2B99F85CB18
                                                                          APIs
                                                                          • std::exception::exception.LIBCMT ref: 02D418BF
                                                                            • Part of subcall function 02D42413: std::exception::_Copy_str.LIBCMT ref: 02D4242C
                                                                            • Part of subcall function 02D40C90: __CxxThrowException@8.LIBCMT ref: 02D40CEE
                                                                          • std::exception::exception.LIBCMT ref: 02D4191E
                                                                          Strings
                                                                          • boost unique_lock owns already the mutex, xrefs: 02D4190D
                                                                          • boost unique_lock has no mutex, xrefs: 02D418AE
                                                                          • $, xrefs: 02D41923
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                          • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                          • API String ID: 2140441600-46888669
                                                                          • Opcode ID: f6ece754334a568681bc42803f41d937177dc99a9f6d320ee14749bbd1e66ed6
                                                                          • Instruction ID: c48e2dad484d5c702682ffe5559f1c4af2556353a1c9ef3c5c2004d761da5c5d
                                                                          • Opcode Fuzzy Hash: f6ece754334a568681bc42803f41d937177dc99a9f6d320ee14749bbd1e66ed6
                                                                          • Instruction Fuzzy Hash: 4221F5B15083809FD724DF24C549B5BBBE9BB88B08F50495EF4A587380DBB5D848CFA2
                                                                          APIs
                                                                          • InterlockedExchange.KERNEL32(?,00000001), ref: 02D32350
                                                                          • InterlockedExchange.KERNEL32(?,00000001), ref: 02D32360
                                                                          • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D32370
                                                                          • GetLastError.KERNEL32 ref: 02D3237A
                                                                            • Part of subcall function 02D31712: __EH_prolog.LIBCMT ref: 02D31717
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                          • String ID: pqcs
                                                                          • API String ID: 1619523792-2559862021
                                                                          • Opcode ID: 27cc05588f4b8f6b3f25773d0b5832e7a8accd3be1bdfc24d7703f5ccc3dc38b
                                                                          • Instruction ID: 0f7c5066dc53c904f82863157210261fcab3489c5b131b456c78ba3c424ee043
                                                                          • Opcode Fuzzy Hash: 27cc05588f4b8f6b3f25773d0b5832e7a8accd3be1bdfc24d7703f5ccc3dc38b
                                                                          • Instruction Fuzzy Hash: BCF0BD71940315ABEB11AE78E809BABB7BCEF45701F20456AE949D3240EBB09D148BA1
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D34035
                                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 02D34042
                                                                          • RtlAllocateHeap.NTDLL(00000000), ref: 02D34049
                                                                          • std::exception::exception.LIBCMT ref: 02D34063
                                                                            • Part of subcall function 02D3A5FD: __EH_prolog.LIBCMT ref: 02D3A602
                                                                            • Part of subcall function 02D3A5FD: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02D3A611
                                                                            • Part of subcall function 02D3A5FD: __CxxThrowException@8.LIBCMT ref: 02D3A630
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                          • String ID: bad allocation
                                                                          • API String ID: 3112922283-2104205924
                                                                          • Opcode ID: 2f6328db0aecd378af4bb1e54c9fcb35e5ef09f93e8d5afb43a7a0b6ec85ffd4
                                                                          • Instruction ID: 906c084bd74c8341f7543d0b3c4bd4e5ef8b2bd5dbdb7422555c774abe74a2c9
                                                                          • Opcode Fuzzy Hash: 2f6328db0aecd378af4bb1e54c9fcb35e5ef09f93e8d5afb43a7a0b6ec85ffd4
                                                                          • Instruction Fuzzy Hash: B0F05E72E44219DBDF01EFE4D908BAFB778FF04300F904545E915A2340DBB45A14CB61
                                                                          APIs
                                                                          • GetStartupInfoA.KERNEL32(?), ref: 00403729
                                                                          • GetFileType.KERNEL32(00000800), ref: 004037CF
                                                                          • GetStdHandle.KERNEL32(-000000F6), ref: 00403828
                                                                          • GetFileType.KERNEL32(00000000), ref: 00403836
                                                                          • SetHandleCount.KERNEL32 ref: 0040386D
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: FileHandleType$CountInfoStartup
                                                                          • String ID:
                                                                          • API String ID: 1710529072-0
                                                                          • Opcode ID: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                          • Instruction ID: 340931fb5571d0dd89e9413526c141aa1936fc067e7847d678db743c6b9c99aa
                                                                          • Opcode Fuzzy Hash: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                          • Instruction Fuzzy Hash: A65136B25003508BD7209F28CD48B563FE8EB01336F19C67AE492EB2E1C738C955C75A
                                                                          APIs
                                                                            • Part of subcall function 02D41990: CloseHandle.KERNEL32(00000000,B4D04043), ref: 02D419E1
                                                                            • Part of subcall function 02D41990: WaitForSingleObject.KERNEL32(?,000000FF,B4D04043,?,?,?,?,B4D04043,02D41963,B4D04043), ref: 02D419F8
                                                                          • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02D41C5E
                                                                          • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02D41C7E
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02D41CB7
                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02D41D0B
                                                                          • SetEvent.KERNEL32(?), ref: 02D41D12
                                                                            • Part of subcall function 02D3418C: CloseHandle.KERNEL32(00000000,?,02D41C45), ref: 02D341B0
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                          • String ID:
                                                                          • API String ID: 4166353394-0
                                                                          • Opcode ID: 291db9864d812e028c9297c0317a28cbd88fda82c79921f40bcce4782c164a23
                                                                          • Instruction ID: 8781f545d2086c67fda59083abd77a5341ca3fcd6ab379ddc15ac075997bef40
                                                                          • Opcode Fuzzy Hash: 291db9864d812e028c9297c0317a28cbd88fda82c79921f40bcce4782c164a23
                                                                          • Instruction Fuzzy Hash: 4141DDB06403118BEB25CF28CC80B26B7E4EF45724F240668EC18EB395DB35DC91CBA5
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D3E030
                                                                            • Part of subcall function 02D31A01: TlsGetValue.KERNEL32 ref: 02D31A0A
                                                                          • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D3E0AF
                                                                          • RtlEnterCriticalSection.NTDLL(?), ref: 02D3E0CB
                                                                          • InterlockedIncrement.KERNEL32(02D65180), ref: 02D3E0F0
                                                                          • RtlLeaveCriticalSection.NTDLL(?), ref: 02D3E105
                                                                            • Part of subcall function 02D327F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02D3284E
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                          • String ID:
                                                                          • API String ID: 1578506061-0
                                                                          • Opcode ID: 08c3a4c83f6d01c0259d2c0ffd398d748d5697487ef5ed90355ad9118ba80b5f
                                                                          • Instruction ID: bcbeb18e5212ea731ec0607b5ad32142e8156c80c873c91ec43afe21abf70c02
                                                                          • Opcode Fuzzy Hash: 08c3a4c83f6d01c0259d2c0ffd398d748d5697487ef5ed90355ad9118ba80b5f
                                                                          • Instruction Fuzzy Hash: 443136B1901315AFDB51DFA8C544AAABBF9FF08310F24495AE849D7740E775AA04CFA0
                                                                          APIs
                                                                          • _malloc.LIBCMT ref: 02D502F0
                                                                            • Part of subcall function 02D42EEC: __FF_MSGBANNER.LIBCMT ref: 02D42F03
                                                                            • Part of subcall function 02D42EEC: __NMSG_WRITE.LIBCMT ref: 02D42F0A
                                                                            • Part of subcall function 02D42EEC: RtlAllocateHeap.NTDLL(00AA0000,00000000,00000001), ref: 02D42F2F
                                                                          • _free.LIBCMT ref: 02D50303
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocateHeap_free_malloc
                                                                          • String ID:
                                                                          • API String ID: 1020059152-0
                                                                          • Opcode ID: 2cc010243453b2d48530e856076639a48008d28cd86e9572d6fb89d1f1790eaa
                                                                          • Instruction ID: 937e7b28c69b4540cefb2d9f8ba93f5beeefa2a1e607c35882c63536bba9ac27
                                                                          • Opcode Fuzzy Hash: 2cc010243453b2d48530e856076639a48008d28cd86e9572d6fb89d1f1790eaa
                                                                          • Instruction Fuzzy Hash: 0511A332908635ABEF202F74B80875A3B99DF19362F104925FD899A350DFB4CC50CAA0
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D321DA
                                                                          • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D321ED
                                                                          • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02D32224
                                                                          • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02D32237
                                                                          • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02D32261
                                                                            • Part of subcall function 02D32341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D32350
                                                                            • Part of subcall function 02D32341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D32360
                                                                            • Part of subcall function 02D32341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D32370
                                                                            • Part of subcall function 02D32341: GetLastError.KERNEL32 ref: 02D3237A
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                          • String ID:
                                                                          • API String ID: 1856819132-0
                                                                          • Opcode ID: c915467358a6f0895783866063d690d97e82b89970bc828f3787c558adaf14d3
                                                                          • Instruction ID: b66abc67d27c3bd094ee6b08578f46f2eb57d102eb7fc7c07df4a70d5924adae
                                                                          • Opcode Fuzzy Hash: c915467358a6f0895783866063d690d97e82b89970bc828f3787c558adaf14d3
                                                                          • Instruction Fuzzy Hash: 15118175D04229DBDF02AFA9DC08AAEFBBAFF48310F10852AEC5592360D7714E55DB90
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D3229D
                                                                          • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D322B0
                                                                          • TlsGetValue.KERNEL32 ref: 02D322E7
                                                                          • TlsSetValue.KERNEL32(?), ref: 02D32300
                                                                          • TlsSetValue.KERNEL32(?,?,?), ref: 02D3231C
                                                                            • Part of subcall function 02D32341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D32350
                                                                            • Part of subcall function 02D32341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D32360
                                                                            • Part of subcall function 02D32341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D32370
                                                                            • Part of subcall function 02D32341: GetLastError.KERNEL32 ref: 02D3237A
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                          • String ID:
                                                                          • API String ID: 1856819132-0
                                                                          • Opcode ID: 70d974ac89ebc66be150f8255d97f434271ca55aa282066c871d6f6ab98416b6
                                                                          • Instruction ID: 66c22b169905fee146e0156de4f435c7a7e9ccb8d26ed08bd2ba4fc0544ee67f
                                                                          • Opcode Fuzzy Hash: 70d974ac89ebc66be150f8255d97f434271ca55aa282066c871d6f6ab98416b6
                                                                          • Instruction Fuzzy Hash: 99115E71D042299BDF02AFA9D8089AEFBBAFF48310F10456AE805A3310DB714D55DFA0
                                                                          APIs
                                                                            • Part of subcall function 02D3B098: __EH_prolog.LIBCMT ref: 02D3B09D
                                                                          • __CxxThrowException@8.LIBCMT ref: 02D3BC62
                                                                            • Part of subcall function 02D4449A: RaiseException.KERNEL32(?,?,02D3FA92,?,?,?,?,?,?,?,02D3FA92,?,02D60F78,?), ref: 02D444EF
                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02D61D94,?,00000001), ref: 02D3BC78
                                                                          • InterlockedExchange.KERNEL32(?,00000001), ref: 02D3BC8B
                                                                          • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02D61D94,?,00000001), ref: 02D3BC9B
                                                                          • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D3BCA9
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                          • String ID:
                                                                          • API String ID: 2725315915-0
                                                                          • Opcode ID: 451df522c04ce925aa488ba5a20774565a3a55e0776569a270b19b24f65abf3f
                                                                          • Instruction ID: 38d172814c5305651baf38c09d09bd0e461c7f74cd75faf1d5ddb9d01de69426
                                                                          • Opcode Fuzzy Hash: 451df522c04ce925aa488ba5a20774565a3a55e0776569a270b19b24f65abf3f
                                                                          • Instruction Fuzzy Hash: ED018672A40314AFEB109AB4DC89F9677BDEF04359F204515F625D7390DBA0EC458B20
                                                                          APIs
                                                                          • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02D32432
                                                                          • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02D32445
                                                                          • RtlEnterCriticalSection.NTDLL(?), ref: 02D32454
                                                                          • InterlockedExchange.KERNEL32(?,00000001), ref: 02D32469
                                                                          • RtlLeaveCriticalSection.NTDLL(?), ref: 02D32470
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                          • String ID:
                                                                          • API String ID: 747265849-0
                                                                          • Opcode ID: b12c698b56e828e25385bbb76dc1a87de1683569e4013d39789e97ed823a02e6
                                                                          • Instruction ID: 78997e5eb7453d1f0cc43a9c251849cb139b71d35088ef21bd9a7c7161453ab4
                                                                          • Opcode Fuzzy Hash: b12c698b56e828e25385bbb76dc1a87de1683569e4013d39789e97ed823a02e6
                                                                          • Instruction Fuzzy Hash: 4AF03072A40614BBE7119EA8ED49FDAB77CFF45711FA04411F701D6680D7B1AD20CBA1
                                                                          APIs
                                                                          • InterlockedIncrement.KERNEL32(?), ref: 02D31ED2
                                                                          • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02D31EEA
                                                                          • RtlEnterCriticalSection.NTDLL(?), ref: 02D31EF9
                                                                          • InterlockedExchange.KERNEL32(?,00000001), ref: 02D31F0E
                                                                          • RtlLeaveCriticalSection.NTDLL(?), ref: 02D31F15
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                          • String ID:
                                                                          • API String ID: 830998967-0
                                                                          • Opcode ID: 215c332186f39e32551d0e9adfa002bdd035c3c1cd129a2e93b877ddc1a9fdd4
                                                                          • Instruction ID: dcf18879982776b952a2b649fc47c6abd01727d04b33e7b43dcf2900ff3c6436
                                                                          • Opcode Fuzzy Hash: 215c332186f39e32551d0e9adfa002bdd035c3c1cd129a2e93b877ddc1a9fdd4
                                                                          • Instruction Fuzzy Hash: 33F01D72541615BBE701AFA5ED48FD6B77CFF14351F200415F60186641D7A1A925CBA0
                                                                          APIs
                                                                            • Part of subcall function 02D39A0C: __EH_prolog.LIBCMT ref: 02D39A11
                                                                            • Part of subcall function 02D39A0C: _Allocate.LIBCPMT ref: 02D39A68
                                                                            • Part of subcall function 02D39A0C: _memmove.LIBCMT ref: 02D39ABF
                                                                          • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02D408E2
                                                                          • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02D408EA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocateErrorFormatH_prologLastMessage_memmove
                                                                          • String ID: Unknown error$invalid string position
                                                                          • API String ID: 1017912131-1837348584
                                                                          • Opcode ID: 11a99e9522566e5d7a2df8c655b6c22168199b9030457ee069a1ca8e2f00559c
                                                                          • Instruction ID: 869f56731eb56fd931fd0c7655ca95b85c9fe5e6c62dab820cfda3fabca54427
                                                                          • Opcode Fuzzy Hash: 11a99e9522566e5d7a2df8c655b6c22168199b9030457ee069a1ca8e2f00559c
                                                                          • Instruction Fuzzy Hash: D751BD706083419FE718CF24C890B2EBBE4EB98749F54092EF58197791DB71E948CFA2
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _memmove
                                                                          • String ID: invalid string position$string too long
                                                                          • API String ID: 4104443479-4289949731
                                                                          • Opcode ID: 6f66413106837b4f257377c588830e587ae9f82c486863d8a26efe6f5f11e9ac
                                                                          • Instruction ID: 03dba720dc5c3b9bb4f5071c4eadcdff1e66e652104a4224a6a077cca9d57f97
                                                                          • Opcode Fuzzy Hash: 6f66413106837b4f257377c588830e587ae9f82c486863d8a26efe6f5f11e9ac
                                                                          • Instruction Fuzzy Hash: 6241B2B13003459FDB36DF69D894A5AB7ABEB41724B10092DF856CB781C7B0ED08DBA0
                                                                          APIs
                                                                          • WSASetLastError.WS2_32(00000000), ref: 02D330C3
                                                                          • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02D33102
                                                                          • _memcmp.LIBCMT ref: 02D33141
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressErrorLastString_memcmp
                                                                          • String ID: 255.255.255.255
                                                                          • API String ID: 1618111833-2422070025
                                                                          • Opcode ID: edb8e9ac15f2f8b69a527cbb1c518b29d19fd97a948f0a3ec17612841b701174
                                                                          • Instruction ID: 5d0d071e18e7bc5ad0fc599e684e7a644211116675161e631a3dfd92c72c0291
                                                                          • Opcode Fuzzy Hash: edb8e9ac15f2f8b69a527cbb1c518b29d19fd97a948f0a3ec17612841b701174
                                                                          • Instruction Fuzzy Hash: AE31D171A003049FDB229F64C980B6EB7A6FF45325F1085AAE9699B380DB729D41CBD0
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D31F5B
                                                                          • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02D31FC5
                                                                          • GetLastError.KERNEL32(?,00000000), ref: 02D31FD2
                                                                            • Part of subcall function 02D31712: __EH_prolog.LIBCMT ref: 02D31717
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                          • String ID: iocp
                                                                          • API String ID: 998023749-976528080
                                                                          • Opcode ID: e99446053be7fe31e9f641a4ebe6435ad818e3ad4c02db5100d1248001fabb12
                                                                          • Instruction ID: 4ac87ce52485bb389524c49b0cabd4429d2896eb86c0205d2e4cb4c0d4dc0d32
                                                                          • Opcode Fuzzy Hash: e99446053be7fe31e9f641a4ebe6435ad818e3ad4c02db5100d1248001fabb12
                                                                          • Instruction Fuzzy Hash: 8D21D8B18017559BC721DF6AD50055BFBF8FFA4720B108A1FD8A683B50D7B0AA04CFA1
                                                                          APIs
                                                                          • _malloc.LIBCMT ref: 02D43AA7
                                                                            • Part of subcall function 02D42EEC: __FF_MSGBANNER.LIBCMT ref: 02D42F03
                                                                            • Part of subcall function 02D42EEC: __NMSG_WRITE.LIBCMT ref: 02D42F0A
                                                                            • Part of subcall function 02D42EEC: RtlAllocateHeap.NTDLL(00AA0000,00000000,00000001), ref: 02D42F2F
                                                                          • std::exception::exception.LIBCMT ref: 02D43AC5
                                                                          • __CxxThrowException@8.LIBCMT ref: 02D43ADA
                                                                            • Part of subcall function 02D4449A: RaiseException.KERNEL32(?,?,02D3FA92,?,?,?,?,?,?,?,02D3FA92,?,02D60F78,?), ref: 02D444EF
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                          • String ID: bad allocation
                                                                          • API String ID: 3074076210-2104205924
                                                                          • Opcode ID: 80ad2307861e52b9a2ab5b46e52d29645bdbc8439f56dec5398323eca0fe6195
                                                                          • Instruction ID: 924f77701385b1c1095e9efd1ddf807ffb59efe25924a31ab9c31813ab0c0ac7
                                                                          • Opcode Fuzzy Hash: 80ad2307861e52b9a2ab5b46e52d29645bdbc8439f56dec5398323eca0fe6195
                                                                          • Instruction Fuzzy Hash: 73E0653054420EABDF00FF68DC099AFB769EF00355F600596BC14A5790EF71DE44D9A0
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D337B6
                                                                          • __localtime64.LIBCMT ref: 02D337C1
                                                                            • Part of subcall function 02D42540: __gmtime64_s.LIBCMT ref: 02D42553
                                                                          • std::exception::exception.LIBCMT ref: 02D337D9
                                                                            • Part of subcall function 02D42413: std::exception::_Copy_str.LIBCMT ref: 02D4242C
                                                                            • Part of subcall function 02D3A45B: __EH_prolog.LIBCMT ref: 02D3A460
                                                                            • Part of subcall function 02D3A45B: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02D3A46F
                                                                            • Part of subcall function 02D3A45B: __CxxThrowException@8.LIBCMT ref: 02D3A48E
                                                                          Strings
                                                                          • could not convert calendar time to UTC time, xrefs: 02D337CE
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                          • String ID: could not convert calendar time to UTC time
                                                                          • API String ID: 1963798777-2088861013
                                                                          • Opcode ID: 15230c51d86e555355122865851c3cef0036a82c251d7bd2b5fff201ca25d7b4
                                                                          • Instruction ID: c6cd79de4119fdb0ac5e52aa31d9a533237dfb53f8c02ba11a842075b8abe44f
                                                                          • Opcode Fuzzy Hash: 15230c51d86e555355122865851c3cef0036a82c251d7bd2b5fff201ca25d7b4
                                                                          • Instruction Fuzzy Hash: B6E06DB1D0021A9BCF01EF94D9087BEB779EF04300F404599EC29A2350EB745E06CFA4
                                                                          APIs
                                                                          • VirtualFree.KERNEL32(?,00008000,00004000,74DEDFF0,?,00000000), ref: 00404092
                                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004040ED
                                                                          • HeapFree.KERNEL32(00000000,?), ref: 004040FF
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Free$Virtual$Heap
                                                                          • String ID: -@
                                                                          • API String ID: 2016334554-2999422947
                                                                          • Opcode ID: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                          • Instruction ID: d55dda63c6158a3f001c35490e62a79414290c04420ce97baa52a0c06dad31a7
                                                                          • Opcode Fuzzy Hash: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                          • Instruction Fuzzy Hash: D1B16C75A00205DFDB24CF04CA90AA9BBB1FB88314F24C1AED9196F396C735EE41CB84
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AdjustPointer_memmove
                                                                          • String ID:
                                                                          • API String ID: 1721217611-0
                                                                          • Opcode ID: 5676fd3f79361ccf7d0990ad2997dd3380517e496643121f16015a3a0770f8e4
                                                                          • Instruction ID: 517e2365ef7f35e4184d30c133d70cf18ef5b0056d20eb0f4c08bac114a2514b
                                                                          • Opcode Fuzzy Hash: 5676fd3f79361ccf7d0990ad2997dd3380517e496643121f16015a3a0770f8e4
                                                                          • Instruction Fuzzy Hash: 2B418E362163029BEB285A64D940B7A37A6DF01718F25441EE88D863E1EF71ED80CE21
                                                                          APIs
                                                                          • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02D34149), ref: 02D412FF
                                                                            • Part of subcall function 02D33FDC: __EH_prolog.LIBCMT ref: 02D33FE1
                                                                            • Part of subcall function 02D33FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02D33FF3
                                                                          • CloseHandle.KERNEL32(00000000), ref: 02D412F4
                                                                          • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02D34149), ref: 02D41340
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02D34149), ref: 02D41411
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseHandle$Event$CreateH_prolog
                                                                          • String ID:
                                                                          • API String ID: 2825413587-0
                                                                          • Opcode ID: 0e91d1932b64338a9d5b67f45d764e78fc443143eafebb5165974e0febd6eccd
                                                                          • Instruction ID: 259a6cf38d47a28f769b6e0a8b150bb07a2ee307f105aa960a2df464f711bbe2
                                                                          • Opcode Fuzzy Hash: 0e91d1932b64338a9d5b67f45d764e78fc443143eafebb5165974e0febd6eccd
                                                                          • Instruction Fuzzy Hash: 45514D716047458BDB11DF28C88879A7BE5AF4832CF254628E8AD97390DB35EC45CB91
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                          • String ID:
                                                                          • API String ID: 2782032738-0
                                                                          • Opcode ID: 4b00bb2f2e8909ad1b25914f564552747ffa73792e7b52f6c639d3ed484d2925
                                                                          • Instruction ID: c576b0cca2b84b66e0016dca8e59c049607213d482a44b5e7b2c2cf6282f88cd
                                                                          • Opcode Fuzzy Hash: 4b00bb2f2e8909ad1b25914f564552747ffa73792e7b52f6c639d3ed484d2925
                                                                          • Instruction Fuzzy Hash: 534195B5A00705ABDB988F6DC8909AA7BA6EF44364B3481BDE895C7380DF71DD41CB50
                                                                          APIs
                                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02D4FE8B
                                                                          • __isleadbyte_l.LIBCMT ref: 02D4FEB9
                                                                          • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02D4FEE7
                                                                          • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02D4FF1D
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                          • String ID:
                                                                          • API String ID: 3058430110-0
                                                                          • Opcode ID: 28fd3c85c864b281ac254881562fc7280a035551899fa8fe6048dd110ac48753
                                                                          • Instruction ID: 10792a171f955a3268dac51161a8c685a2ec82b382a1b1d847f8b1585f32cc9e
                                                                          • Opcode Fuzzy Hash: 28fd3c85c864b281ac254881562fc7280a035551899fa8fe6048dd110ac48753
                                                                          • Instruction Fuzzy Hash: 8B31BE31600246AFDB218F79C844BAA7BEAFF41315F154568E86887AE1DB31EC51CBA0
                                                                          APIs
                                                                          • VirtualFree.KERNEL32(FFFFFFFF,00001000,00004000,74DEDFF0,?,00000000,?,-@,0040490E,00000010,00402FA3,?,?), ref: 004047F0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: FreeVirtual
                                                                          • String ID: -@$r@$r@
                                                                          • API String ID: 1263568516-1251997348
                                                                          • Opcode ID: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                                          • Instruction ID: a63ca1888fca441bf056fbcf5d5deb39584b298cc2094c54b415f4e68fc1e946
                                                                          • Opcode Fuzzy Hash: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                                          • Instruction Fuzzy Hash: EE21A1B66003419BDB20AB24DD4476633A4EB81379F24CA3BDB65B66D0D378E941CB58
                                                                          APIs
                                                                          • htons.WS2_32(?), ref: 02D33DA2
                                                                            • Part of subcall function 02D33BD3: __EH_prolog.LIBCMT ref: 02D33BD8
                                                                            • Part of subcall function 02D33BD3: std::bad_exception::bad_exception.LIBCMT ref: 02D33BED
                                                                          • htonl.WS2_32(00000000), ref: 02D33DB9
                                                                          • htonl.WS2_32(00000000), ref: 02D33DC0
                                                                          • htons.WS2_32(?), ref: 02D33DD4
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                          • String ID:
                                                                          • API String ID: 3882411702-0
                                                                          • Opcode ID: ad5772c793645261718db96de358d3378e64d163ef92197d49d1ff8b9335de32
                                                                          • Instruction ID: dc67cdc548b1a3ec02c9897c1fdf5c6286a364811b94938b967cbe6a7c8a335c
                                                                          • Opcode Fuzzy Hash: ad5772c793645261718db96de358d3378e64d163ef92197d49d1ff8b9335de32
                                                                          • Instruction Fuzzy Hash: D6117C36A00319EBDF029F64D985A9AB7B9EF09311F108496FC04DF305E6B19E14CBA1
                                                                          APIs
                                                                          • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02D323D0
                                                                          • RtlEnterCriticalSection.NTDLL(?), ref: 02D323DE
                                                                          • InterlockedExchange.KERNEL32(?,00000001), ref: 02D32401
                                                                          • RtlLeaveCriticalSection.NTDLL(?), ref: 02D32408
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                          • String ID:
                                                                          • API String ID: 4018804020-0
                                                                          • Opcode ID: b5e38edc6cfbe3a7af440902cc53c3e335906d4f3dd5aa96e57a83a468c4b97c
                                                                          • Instruction ID: 2c856ab75f17d49453414f96c3e26c01a16b4d0427588d5ce56598e5d6ad11cd
                                                                          • Opcode Fuzzy Hash: b5e38edc6cfbe3a7af440902cc53c3e335906d4f3dd5aa96e57a83a468c4b97c
                                                                          • Instruction Fuzzy Hash: C211CE71A00304ABEB119F64D888B6ABBB9FF50714F20446DF9019B240E7B1ED11CBA0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                          • String ID:
                                                                          • API String ID: 3016257755-0
                                                                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                          • Instruction ID: 22f671dbfb122269b55f286d538016ad1ab5f9c5d22c9d84d74aacf5dff907c1
                                                                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                          • Instruction Fuzzy Hash: 76010B7601114EBBCF126E84CC41CEE3F66BB18358F498416FA6899231DB36C9B1EF91
                                                                          APIs
                                                                          • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02D324A9
                                                                          • RtlEnterCriticalSection.NTDLL(?), ref: 02D324B8
                                                                          • InterlockedExchange.KERNEL32(?,00000001), ref: 02D324CD
                                                                          • RtlLeaveCriticalSection.NTDLL(?), ref: 02D324D4
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                          • String ID:
                                                                          • API String ID: 4018804020-0
                                                                          • Opcode ID: 33b0ccf6fcd204bb6e1fc5c462a3712ffeaa2030fa5f7d18a730ab0c795f4446
                                                                          • Instruction ID: 75c8662211f2a3229e66bb3daa84fca981b34a50618c0b3f3bcfb67812fa0ba8
                                                                          • Opcode Fuzzy Hash: 33b0ccf6fcd204bb6e1fc5c462a3712ffeaa2030fa5f7d18a730ab0c795f4446
                                                                          • Instruction Fuzzy Hash: D3F03C72540215AFEB009F69E844F9ABBBCFF55711F104419FA05C7241D7B1E960CFA0
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D32009
                                                                          • RtlDeleteCriticalSection.NTDLL(?), ref: 02D32028
                                                                          • CloseHandle.KERNEL32(00000000), ref: 02D32037
                                                                          • CloseHandle.KERNEL32(00000000), ref: 02D3204E
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                          • String ID:
                                                                          • API String ID: 2456309408-0
                                                                          • Opcode ID: 0b710774e54197ba58ce3f01d6aa6e7491bcfa2fe37e27f2f1a1bd1a15cf5340
                                                                          • Instruction ID: 7109433dba5df2aa212a5794d2b1eae65d34bd83550dd81e36559e828b4c456b
                                                                          • Opcode Fuzzy Hash: 0b710774e54197ba58ce3f01d6aa6e7491bcfa2fe37e27f2f1a1bd1a15cf5340
                                                                          • Instruction Fuzzy Hash: 7C0169718007249BDB2AAF68E9087AAFBF5FF04704F60495DE94692790CBB46D48CF64
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Event$H_prologSleep
                                                                          • String ID:
                                                                          • API String ID: 1765829285-0
                                                                          • Opcode ID: 8ccbf91bf59d6060e5e8fdfed216916fd8943e203a2f316901bec64ce252b247
                                                                          • Instruction ID: 1b92df7997e536da65723ad4a665bf498896999474933bccb8fe5703abdac4be
                                                                          • Opcode Fuzzy Hash: 8ccbf91bf59d6060e5e8fdfed216916fd8943e203a2f316901bec64ce252b247
                                                                          • Instruction Fuzzy Hash: C8F03035640120DFDF009F98E888B88BBB5FF09311F6081A9FA199B390CBB59C54CB61
                                                                          APIs
                                                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,r@,0040485C,r@,74DEDFF0,?,00000000,?,-@,0040490E,00000010,00402FA3), ref: 0040476B
                                                                          • HeapFree.KERNEL32(00000000,?), ref: 004047A1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Free$HeapVirtual
                                                                          • String ID: r@$r@
                                                                          • API String ID: 3783212868-1712950306
                                                                          • Opcode ID: 615be266f2133a35edff91ca5e545c140f31fce35e26d2f64644c01e7612d901
                                                                          • Instruction ID: 9f28707f468f96f8ba01f1c404cbd9d3f6c084a3717c71e7c0065962692db169
                                                                          • Opcode Fuzzy Hash: 615be266f2133a35edff91ca5e545c140f31fce35e26d2f64644c01e7612d901
                                                                          • Instruction Fuzzy Hash: C6F01774544210DFC3248F08EE08A427BA0FB88720B11867EF996672E1C371AC50CF88
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog_memmove
                                                                          • String ID: &'
                                                                          • API String ID: 3529519853-655172784
                                                                          • Opcode ID: e821d0b37fdaa56c1031a8a3c81fd6997c5101bc2c15f1da4248e394fe8d7c93
                                                                          • Instruction ID: 8060d0efbffee167c6a5bc7f648de3dcfae10017a16b6f3a309b9b6315c189cb
                                                                          • Opcode Fuzzy Hash: e821d0b37fdaa56c1031a8a3c81fd6997c5101bc2c15f1da4248e394fe8d7c93
                                                                          • Instruction Fuzzy Hash: DD615C71E00219DFDF22DFA4C991AEDBBB6EF48310F14416AE445EB290D7B09E45CBA1
                                                                          APIs
                                                                          • GetCPInfo.KERNEL32(?,00000000), ref: 00404ED1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: Info
                                                                          • String ID: $
                                                                          • API String ID: 1807457897-3032137957
                                                                          • Opcode ID: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                                          • Instruction ID: e64d793a5bd47a750bf71bc710b27f1b951018593c94bf49e3c2bba34da37a12
                                                                          • Opcode Fuzzy Hash: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                                          • Instruction Fuzzy Hash: 1D416B710142985EEB169714CE59FEB3FE8EB02704F1404F6DA49F61D2C2794924DBBB
                                                                          APIs
                                                                          • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02D38306,?,?,00000000), ref: 02D39603
                                                                          • getsockname.WS2_32(?,?,?), ref: 02D39619
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLastgetsockname
                                                                          • String ID: &'
                                                                          • API String ID: 566540725-655172784
                                                                          • Opcode ID: 322414b3fcdcd2e3ac1809139a75e26bc0711ac18d01486efc4ee6f7bbe91aca
                                                                          • Instruction ID: 7ab670f6664a59dc1c934805faa4eaba60d83f13021b5864d4c4a52e6651bca8
                                                                          • Opcode Fuzzy Hash: 322414b3fcdcd2e3ac1809139a75e26bc0711ac18d01486efc4ee6f7bbe91aca
                                                                          • Instruction Fuzzy Hash: C1214C72A04248DBDB11DF68D845ACEB7F5FF48324F11856AE919EB380DB70AD458BA0
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D3CBE7
                                                                            • Part of subcall function 02D3D1C3: std::exception::exception.LIBCMT ref: 02D3D1F2
                                                                            • Part of subcall function 02D3D979: __EH_prolog.LIBCMT ref: 02D3D97E
                                                                            • Part of subcall function 02D43A8F: _malloc.LIBCMT ref: 02D43AA7
                                                                            • Part of subcall function 02D3D222: __EH_prolog.LIBCMT ref: 02D3D227
                                                                          Strings
                                                                          • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02D3CC1D
                                                                          • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02D3CC24
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog$_mallocstd::exception::exception
                                                                          • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                          • API String ID: 1953324306-1943798000
                                                                          • Opcode ID: 34f534aa1ef13b84dda95f023d4a1385b8d414db597196dc737be436e1add726
                                                                          • Instruction ID: c1382a025146819cbab800419c0ab8d4e94eea0efea090e1f465e6c91c03df6f
                                                                          • Opcode Fuzzy Hash: 34f534aa1ef13b84dda95f023d4a1385b8d414db597196dc737be436e1add726
                                                                          • Instruction Fuzzy Hash: 3B21A071D042589BEB15EFE8E954AAEBBB6EF14704F00415EE845A7340DBB05E44CFA1
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D3CCDC
                                                                            • Part of subcall function 02D3D29A: std::exception::exception.LIBCMT ref: 02D3D2C7
                                                                            • Part of subcall function 02D3DAB0: __EH_prolog.LIBCMT ref: 02D3DAB5
                                                                            • Part of subcall function 02D43A8F: _malloc.LIBCMT ref: 02D43AA7
                                                                            • Part of subcall function 02D3D2F7: __EH_prolog.LIBCMT ref: 02D3D2FC
                                                                          Strings
                                                                          • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02D3CD19
                                                                          • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02D3CD12
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog$_mallocstd::exception::exception
                                                                          • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                          • API String ID: 1953324306-412195191
                                                                          • Opcode ID: ba0331a0ec07e564e5727a79259c5e40051d213d2345c82e0eec06b4e3c129fc
                                                                          • Instruction ID: 7293bc2c4026c811383366bc9aa4a1730739735934c0407d866db0ed604efda1
                                                                          • Opcode Fuzzy Hash: ba0331a0ec07e564e5727a79259c5e40051d213d2345c82e0eec06b4e3c129fc
                                                                          • Instruction Fuzzy Hash: D9218071E042589BEB05EFE8E554AADBBB6EF15304F10415DE905A7340DBB09E44CFB1
                                                                          APIs
                                                                          • _malloc.LIBCMT ref: 02D3535D
                                                                            • Part of subcall function 02D42EEC: __FF_MSGBANNER.LIBCMT ref: 02D42F03
                                                                            • Part of subcall function 02D42EEC: __NMSG_WRITE.LIBCMT ref: 02D42F0A
                                                                            • Part of subcall function 02D42EEC: RtlAllocateHeap.NTDLL(00AA0000,00000000,00000001), ref: 02D42F2F
                                                                          • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02D3536F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                          • String ID: \save.dat
                                                                          • API String ID: 4128168839-3580179773
                                                                          • Opcode ID: 2ccbc8410dd0bde95cc973f0fb7816e28c4d6c07595b85590e0cd51882bcf84d
                                                                          • Instruction ID: 1776084038debf93d4443066927d206425f19b4dacb6c0666dd5d231ac4ca9fd
                                                                          • Opcode Fuzzy Hash: 2ccbc8410dd0bde95cc973f0fb7816e28c4d6c07595b85590e0cd51882bcf84d
                                                                          • Instruction Fuzzy Hash: 50113A729042556BDF229E69DC80E6FFF6BDF87650B6401A9EC8567302DAE20D02C6B0
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D3396A
                                                                          • std::runtime_error::runtime_error.LIBCPMT ref: 02D339C1
                                                                            • Part of subcall function 02D31410: std::exception::exception.LIBCMT ref: 02D31428
                                                                            • Part of subcall function 02D3A551: __EH_prolog.LIBCMT ref: 02D3A556
                                                                            • Part of subcall function 02D3A551: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02D3A565
                                                                            • Part of subcall function 02D3A551: __CxxThrowException@8.LIBCMT ref: 02D3A584
                                                                          Strings
                                                                          • Day of month is not valid for year, xrefs: 02D339AC
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                          • String ID: Day of month is not valid for year
                                                                          • API String ID: 1404951899-1521898139
                                                                          • Opcode ID: fcdc64e7d6bf952ff7553f1a56c5855902ad46aa973c4cc8c76bed456ffa1ccf
                                                                          • Instruction ID: dff5be8a300879ec1886d69d2c82e49d87691769dc91cd2e65f84545af8714ff
                                                                          • Opcode Fuzzy Hash: fcdc64e7d6bf952ff7553f1a56c5855902ad46aa973c4cc8c76bed456ffa1ccf
                                                                          • Instruction Fuzzy Hash: CD01D476910209EADF06EFA8D805AEEB779FF14720F40801AEC0493340EB748E55CBB5
                                                                          APIs
                                                                          • std::exception::exception.LIBCMT ref: 02D3FA4A
                                                                          • __CxxThrowException@8.LIBCMT ref: 02D3FA5F
                                                                            • Part of subcall function 02D43A8F: _malloc.LIBCMT ref: 02D43AA7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                          • String ID: bad allocation
                                                                          • API String ID: 4063778783-2104205924
                                                                          • Opcode ID: 0315b754abf1bec9cde2a0fbe91d96f9d6ec7940ef441b000d85880dbfcc6015
                                                                          • Instruction ID: 4a8dcd1da85a3927b6290ae4740613ed051e2006b6ee14c33c9e1644dd44b86c
                                                                          • Opcode Fuzzy Hash: 0315b754abf1bec9cde2a0fbe91d96f9d6ec7940ef441b000d85880dbfcc6015
                                                                          • Instruction Fuzzy Hash: A1F0827060830D6BDF05EAA8D8559AF73ACEB04215FA0056BB925E2780EFB0EE04C5A4
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D33C1B
                                                                          • std::bad_exception::bad_exception.LIBCMT ref: 02D33C30
                                                                            • Part of subcall function 02D423F7: std::exception::exception.LIBCMT ref: 02D42401
                                                                            • Part of subcall function 02D3A58A: __EH_prolog.LIBCMT ref: 02D3A58F
                                                                            • Part of subcall function 02D3A58A: __CxxThrowException@8.LIBCMT ref: 02D3A5B8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                          • String ID: bad cast
                                                                          • API String ID: 1300498068-3145022300
                                                                          • Opcode ID: 7493cef258aabf468f038c6deb95e2f7b6d8328d31f610357673534e0de411dd
                                                                          • Instruction ID: b1f6020a32be9e113cfebf533b93628a669ec60d5c8cc25e8ec154638a636b8f
                                                                          • Opcode Fuzzy Hash: 7493cef258aabf468f038c6deb95e2f7b6d8328d31f610357673534e0de411dd
                                                                          • Instruction Fuzzy Hash: 3FF0E572A005048BCB0ADF58E544AEAB776EF51311F5040AEEE095B350CBB2DE4ACFE1
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D338D2
                                                                          • std::runtime_error::runtime_error.LIBCPMT ref: 02D338F1
                                                                            • Part of subcall function 02D31410: std::exception::exception.LIBCMT ref: 02D31428
                                                                            • Part of subcall function 02D388BF: _memmove.LIBCMT ref: 02D388DF
                                                                          Strings
                                                                          • Year is out of valid range: 1400..10000, xrefs: 02D338E0
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                          • String ID: Year is out of valid range: 1400..10000
                                                                          • API String ID: 3258419250-2344417016
                                                                          • Opcode ID: 239f75e1a06282d45d010d3460c8a3eaaa109893db7a26c9f4defeb8770bf426
                                                                          • Instruction ID: e908922c428ea56022228eadb119094a791a3d0c38e2136272cb10b1bb734178
                                                                          • Opcode Fuzzy Hash: 239f75e1a06282d45d010d3460c8a3eaaa109893db7a26c9f4defeb8770bf426
                                                                          • Instruction Fuzzy Hash: 3DE09272A4012497EF15EB98D811BDDB765DB08720F00045AE805A7380DAF12D44CBA1
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D33886
                                                                          • std::runtime_error::runtime_error.LIBCPMT ref: 02D338A5
                                                                            • Part of subcall function 02D31410: std::exception::exception.LIBCMT ref: 02D31428
                                                                            • Part of subcall function 02D388BF: _memmove.LIBCMT ref: 02D388DF
                                                                          Strings
                                                                          • Day of month value is out of range 1..31, xrefs: 02D33894
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                          • String ID: Day of month value is out of range 1..31
                                                                          • API String ID: 3258419250-1361117730
                                                                          • Opcode ID: 935d5c589319d2cf80603e3b3174b05684177752c06f87aca6a76d3fa5816e01
                                                                          • Instruction ID: a5d529f9fab2c6e41d3f17116b7ec759bd68e08fdb065f46cd4f2bc2f4a37638
                                                                          • Opcode Fuzzy Hash: 935d5c589319d2cf80603e3b3174b05684177752c06f87aca6a76d3fa5816e01
                                                                          • Instruction Fuzzy Hash: 09E09272A0022497EB15AB98D811BDDB765DB08760F40005AE805A3380DAF11D44CBE5
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D3391E
                                                                          • std::runtime_error::runtime_error.LIBCPMT ref: 02D3393D
                                                                            • Part of subcall function 02D31410: std::exception::exception.LIBCMT ref: 02D31428
                                                                            • Part of subcall function 02D388BF: _memmove.LIBCMT ref: 02D388DF
                                                                          Strings
                                                                          • Month number is out of range 1..12, xrefs: 02D3392C
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                          • String ID: Month number is out of range 1..12
                                                                          • API String ID: 3258419250-4198407886
                                                                          • Opcode ID: 5b773107767154dc4bd3a9cb7f5d77626ed2c0b8275dbe1630a03cab85487e78
                                                                          • Instruction ID: 2c92497e64b15991f8b2f503d32161a3e51a74dc5d54177b927c07c470337cb9
                                                                          • Opcode Fuzzy Hash: 5b773107767154dc4bd3a9cb7f5d77626ed2c0b8275dbe1630a03cab85487e78
                                                                          • Instruction Fuzzy Hash: 97E09272E0012897EB15BB98D811BDEB765DB08720F40005AEC05A3380DAF12D44CBE1
                                                                          APIs
                                                                          • TlsAlloc.KERNEL32 ref: 02D319CC
                                                                          • GetLastError.KERNEL32 ref: 02D319D9
                                                                            • Part of subcall function 02D31712: __EH_prolog.LIBCMT ref: 02D31717
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocErrorH_prologLast
                                                                          • String ID: tss
                                                                          • API String ID: 249634027-1638339373
                                                                          • Opcode ID: 2b8a2c422c563f0c04ba5dfce40601133175eae9c53208e0db3f4d955f874dcb
                                                                          • Instruction ID: 5ad0fd3ae8c53272677346a102130f6c5eaa678200c043ab8cb206bf3f6a57ee
                                                                          • Opcode Fuzzy Hash: 2b8a2c422c563f0c04ba5dfce40601133175eae9c53208e0db3f4d955f874dcb
                                                                          • Instruction Fuzzy Hash: EFE04F329042219B86007A78D80908BBBA49A44235F208B66EDB9833D0EA708D108AD6
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 02D33BD8
                                                                          • std::bad_exception::bad_exception.LIBCMT ref: 02D33BED
                                                                            • Part of subcall function 02D423F7: std::exception::exception.LIBCMT ref: 02D42401
                                                                            • Part of subcall function 02D3A58A: __EH_prolog.LIBCMT ref: 02D3A58F
                                                                            • Part of subcall function 02D3A58A: __CxxThrowException@8.LIBCMT ref: 02D3A5B8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2939684123.0000000002D31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D31000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2d31000_jennyvideoconverter32.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                          • String ID: bad cast
                                                                          • API String ID: 1300498068-3145022300
                                                                          • Opcode ID: 1e338f7deaffa3f458f16966a1a3ef3ebb2a410907c7cb4330b2adf0a70b9a57
                                                                          • Instruction ID: 38c130be757b6d57f6620dbfc614768a4c9e325e642da4bb43778886d634bd92
                                                                          • Opcode Fuzzy Hash: 1e338f7deaffa3f458f16966a1a3ef3ebb2a410907c7cb4330b2adf0a70b9a57
                                                                          • Instruction Fuzzy Hash: 01E04F71A00108DBDB06EF54E655BBCB775EF14304F4080ADED0657390CB719E56CEA6
                                                                          APIs
                                                                          • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 00404494
                                                                          • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044C8
                                                                          • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044E2
                                                                          • HeapFree.KERNEL32(00000000,?,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044F9
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2938707937.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000002.00000002.2938707937.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_jennyvideoconverter32.jbxd
                                                                          Similarity
                                                                          • API ID: AllocHeap$FreeVirtual
                                                                          • String ID:
                                                                          • API String ID: 3499195154-0
                                                                          • Opcode ID: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                          • Instruction ID: 6532d2b8740b88ca5c68c93f46193dcc45771cdeba7f909f778517217a69801f
                                                                          • Opcode Fuzzy Hash: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                          • Instruction Fuzzy Hash: 02113670200301AFC731CF29EE45A627BB5FB847207104A3AF252E65F0D775A866EF19