Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iv2Mm5SEJF.exe

Overview

General Information

Sample name:iv2Mm5SEJF.exe
renamed because original name is a hash value
Original sample name:86742847ae7b5c190b6cf54b05415785.exe
Analysis ID:1542674
MD5:86742847ae7b5c190b6cf54b05415785
SHA1:1a3d5dab7fe553730376639198d29df70805c1c8
SHA256:60af9598845f6017b3d2214685db9ecd2e34068c2e0045347c4569e709539fbd
Tags:32exe
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • iv2Mm5SEJF.exe (PID: 6840 cmdline: "C:\Users\user\Desktop\iv2Mm5SEJF.exe" MD5: 86742847AE7B5C190B6CF54B05415785)
    • iv2Mm5SEJF.tmp (PID: 2476 cmdline: "C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp" /SL5="$20440,3877545,54272,C:\Users\user\Desktop\iv2Mm5SEJF.exe" MD5: 5F86C3F8C6F55F23DA9D2522C64722B8)
      • sigmavideoconverter32_64.exe (PID: 6024 cmdline: "C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe" -i MD5: B9DE5388BAC9E856A1796FC2144A647B)
  • cleanup
{"C2 list": ["bxxfdpb.com"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2957312058.00000000026DB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: sigmavideoconverter32_64.exe PID: 6024JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-26T06:22:02.586939+020020494671A Network Trojan was detected192.168.2.449737185.208.158.20280TCP
        2024-10-26T06:22:05.784765+020020494671A Network Trojan was detected192.168.2.449737185.208.158.20280TCP
        2024-10-26T06:22:06.832471+020020494671A Network Trojan was detected192.168.2.449758185.208.158.20280TCP
        2024-10-26T06:22:07.854297+020020494671A Network Trojan was detected192.168.2.449768185.208.158.20280TCP
        2024-10-26T06:22:08.266464+020020494671A Network Trojan was detected192.168.2.449768185.208.158.20280TCP
        2024-10-26T06:22:09.304006+020020494671A Network Trojan was detected192.168.2.449774185.208.158.20280TCP
        2024-10-26T06:22:09.718916+020020494671A Network Trojan was detected192.168.2.449774185.208.158.20280TCP
        2024-10-26T06:22:10.848561+020020494671A Network Trojan was detected192.168.2.449784185.208.158.20280TCP
        2024-10-26T06:22:11.919489+020020494671A Network Trojan was detected192.168.2.449790185.208.158.20280TCP
        2024-10-26T06:22:13.086795+020020494671A Network Trojan was detected192.168.2.449796185.208.158.20280TCP
        2024-10-26T06:22:13.550725+020020494671A Network Trojan was detected192.168.2.449796185.208.158.20280TCP
        2024-10-26T06:22:14.835018+020020494671A Network Trojan was detected192.168.2.449807185.208.158.20280TCP
        2024-10-26T06:22:15.374010+020020494671A Network Trojan was detected192.168.2.449807185.208.158.20280TCP
        2024-10-26T06:22:16.398791+020020494671A Network Trojan was detected192.168.2.449817185.208.158.20280TCP
        2024-10-26T06:22:16.807767+020020494671A Network Trojan was detected192.168.2.449817185.208.158.20280TCP
        2024-10-26T06:22:17.218363+020020494671A Network Trojan was detected192.168.2.449817185.208.158.20280TCP
        2024-10-26T06:22:18.278055+020020494671A Network Trojan was detected192.168.2.449826185.208.158.20280TCP
        2024-10-26T06:22:19.329633+020020494671A Network Trojan was detected192.168.2.449833185.208.158.20280TCP
        2024-10-26T06:22:20.372700+020020494671A Network Trojan was detected192.168.2.449840185.208.158.20280TCP
        2024-10-26T06:22:21.433012+020020494671A Network Trojan was detected192.168.2.449848185.208.158.20280TCP
        2024-10-26T06:22:21.845256+020020494671A Network Trojan was detected192.168.2.449848185.208.158.20280TCP
        2024-10-26T06:22:22.893665+020020494671A Network Trojan was detected192.168.2.449856185.208.158.20280TCP
        2024-10-26T06:22:24.009156+020020494671A Network Trojan was detected192.168.2.449863185.208.158.20280TCP
        2024-10-26T06:22:24.455305+020020494671A Network Trojan was detected192.168.2.449863185.208.158.20280TCP
        2024-10-26T06:22:25.479213+020020494671A Network Trojan was detected192.168.2.449872185.208.158.20280TCP
        2024-10-26T06:22:25.888300+020020494671A Network Trojan was detected192.168.2.449872185.208.158.20280TCP
        2024-10-26T06:22:26.954438+020020494671A Network Trojan was detected192.168.2.449883185.208.158.20280TCP
        2024-10-26T06:22:28.028701+020020494671A Network Trojan was detected192.168.2.449889185.208.158.20280TCP
        2024-10-26T06:22:29.080487+020020494671A Network Trojan was detected192.168.2.449895185.208.158.20280TCP
        2024-10-26T06:22:30.138462+020020494671A Network Trojan was detected192.168.2.449903185.208.158.20280TCP
        2024-10-26T06:22:31.189646+020020494671A Network Trojan was detected192.168.2.449908185.208.158.20280TCP
        2024-10-26T06:22:32.242129+020020494671A Network Trojan was detected192.168.2.449914185.208.158.20280TCP
        2024-10-26T06:22:34.298252+020020494671A Network Trojan was detected192.168.2.449922185.208.158.20280TCP
        2024-10-26T06:22:35.326407+020020494671A Network Trojan was detected192.168.2.449935185.208.158.20280TCP
        2024-10-26T06:22:36.386449+020020494671A Network Trojan was detected192.168.2.449941185.208.158.20280TCP
        2024-10-26T06:22:36.805851+020020494671A Network Trojan was detected192.168.2.449941185.208.158.20280TCP
        2024-10-26T06:22:37.232262+020020494671A Network Trojan was detected192.168.2.449941185.208.158.20280TCP
        2024-10-26T06:22:38.288920+020020494671A Network Trojan was detected192.168.2.449953185.208.158.20280TCP
        2024-10-26T06:22:38.707360+020020494671A Network Trojan was detected192.168.2.449953185.208.158.20280TCP
        2024-10-26T06:22:39.738961+020020494671A Network Trojan was detected192.168.2.449963185.208.158.20280TCP
        2024-10-26T06:22:40.777587+020020494671A Network Trojan was detected192.168.2.449969185.208.158.20280TCP
        2024-10-26T06:22:41.191875+020020494671A Network Trojan was detected192.168.2.449969185.208.158.20280TCP
        2024-10-26T06:22:42.211510+020020494671A Network Trojan was detected192.168.2.449977185.208.158.20280TCP
        2024-10-26T06:22:43.237307+020020494671A Network Trojan was detected192.168.2.449984185.208.158.20280TCP
        2024-10-26T06:22:44.266869+020020494671A Network Trojan was detected192.168.2.449992185.208.158.20280TCP
        2024-10-26T06:22:45.357771+020020494671A Network Trojan was detected192.168.2.449998185.208.158.20280TCP
        2024-10-26T06:22:46.503129+020020494671A Network Trojan was detected192.168.2.450003185.208.158.20280TCP
        2024-10-26T06:22:47.554516+020020494671A Network Trojan was detected192.168.2.450010185.208.158.20280TCP
        2024-10-26T06:22:47.974698+020020494671A Network Trojan was detected192.168.2.450010185.208.158.20280TCP
        2024-10-26T06:22:49.027783+020020494671A Network Trojan was detected192.168.2.450019185.208.158.20280TCP
        2024-10-26T06:22:50.070614+020020494671A Network Trojan was detected192.168.2.450027185.208.158.20280TCP
        2024-10-26T06:22:50.485528+020020494671A Network Trojan was detected192.168.2.450027185.208.158.20280TCP
        2024-10-26T06:22:51.539932+020020494671A Network Trojan was detected192.168.2.450036185.208.158.20280TCP
        2024-10-26T06:22:51.956350+020020494671A Network Trojan was detected192.168.2.450036185.208.158.20280TCP
        2024-10-26T06:22:53.018488+020020494671A Network Trojan was detected192.168.2.450041185.208.158.20280TCP
        2024-10-26T06:22:54.058079+020020494671A Network Trojan was detected192.168.2.450042185.208.158.20280TCP
        2024-10-26T06:22:54.476598+020020494671A Network Trojan was detected192.168.2.450042185.208.158.20280TCP
        2024-10-26T06:22:54.892274+020020494671A Network Trojan was detected192.168.2.450042185.208.158.20280TCP
        2024-10-26T06:22:56.128532+020020494671A Network Trojan was detected192.168.2.450043185.208.158.20280TCP
        2024-10-26T06:22:57.173148+020020494671A Network Trojan was detected192.168.2.450044185.208.158.20280TCP
        2024-10-26T06:22:58.208831+020020494671A Network Trojan was detected192.168.2.450045185.208.158.20280TCP
        2024-10-26T06:22:59.271765+020020494671A Network Trojan was detected192.168.2.450046185.208.158.20280TCP
        2024-10-26T06:23:00.300111+020020494671A Network Trojan was detected192.168.2.450047185.208.158.20280TCP
        2024-10-26T06:23:01.345599+020020494671A Network Trojan was detected192.168.2.450048185.208.158.20280TCP
        2024-10-26T06:23:02.378782+020020494671A Network Trojan was detected192.168.2.450049185.208.158.20280TCP
        2024-10-26T06:23:03.421035+020020494671A Network Trojan was detected192.168.2.450050185.208.158.20280TCP
        2024-10-26T06:23:04.851079+020020494671A Network Trojan was detected192.168.2.450051185.208.158.20280TCP
        2024-10-26T06:23:06.095835+020020494671A Network Trojan was detected192.168.2.450052185.208.158.20280TCP
        2024-10-26T06:23:07.154947+020020494671A Network Trojan was detected192.168.2.450053185.208.158.20280TCP
        2024-10-26T06:23:08.239423+020020494671A Network Trojan was detected192.168.2.450054185.208.158.20280TCP
        2024-10-26T06:23:09.271355+020020494671A Network Trojan was detected192.168.2.450055185.208.158.20280TCP
        2024-10-26T06:23:10.312851+020020494671A Network Trojan was detected192.168.2.450056185.208.158.20280TCP
        2024-10-26T06:23:11.380540+020020494671A Network Trojan was detected192.168.2.450057185.208.158.20280TCP
        2024-10-26T06:23:12.479490+020020494671A Network Trojan was detected192.168.2.450058185.208.158.20280TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-26T06:22:02.586939+020020501121A Network Trojan was detected192.168.2.449737185.208.158.20280TCP
        2024-10-26T06:22:05.784765+020020501121A Network Trojan was detected192.168.2.449737185.208.158.20280TCP
        2024-10-26T06:22:06.832471+020020501121A Network Trojan was detected192.168.2.449758185.208.158.20280TCP
        2024-10-26T06:22:07.854297+020020501121A Network Trojan was detected192.168.2.449768185.208.158.20280TCP
        2024-10-26T06:22:08.266464+020020501121A Network Trojan was detected192.168.2.449768185.208.158.20280TCP
        2024-10-26T06:22:09.304006+020020501121A Network Trojan was detected192.168.2.449774185.208.158.20280TCP
        2024-10-26T06:22:09.718916+020020501121A Network Trojan was detected192.168.2.449774185.208.158.20280TCP
        2024-10-26T06:22:10.848561+020020501121A Network Trojan was detected192.168.2.449784185.208.158.20280TCP
        2024-10-26T06:22:11.919489+020020501121A Network Trojan was detected192.168.2.449790185.208.158.20280TCP
        2024-10-26T06:22:13.086795+020020501121A Network Trojan was detected192.168.2.449796185.208.158.20280TCP
        2024-10-26T06:22:13.550725+020020501121A Network Trojan was detected192.168.2.449796185.208.158.20280TCP
        2024-10-26T06:22:14.835018+020020501121A Network Trojan was detected192.168.2.449807185.208.158.20280TCP
        2024-10-26T06:22:15.374010+020020501121A Network Trojan was detected192.168.2.449807185.208.158.20280TCP
        2024-10-26T06:22:16.398791+020020501121A Network Trojan was detected192.168.2.449817185.208.158.20280TCP
        2024-10-26T06:22:16.807767+020020501121A Network Trojan was detected192.168.2.449817185.208.158.20280TCP
        2024-10-26T06:22:17.218363+020020501121A Network Trojan was detected192.168.2.449817185.208.158.20280TCP
        2024-10-26T06:22:18.278055+020020501121A Network Trojan was detected192.168.2.449826185.208.158.20280TCP
        2024-10-26T06:22:19.329633+020020501121A Network Trojan was detected192.168.2.449833185.208.158.20280TCP
        2024-10-26T06:22:20.372700+020020501121A Network Trojan was detected192.168.2.449840185.208.158.20280TCP
        2024-10-26T06:22:21.433012+020020501121A Network Trojan was detected192.168.2.449848185.208.158.20280TCP
        2024-10-26T06:22:21.845256+020020501121A Network Trojan was detected192.168.2.449848185.208.158.20280TCP
        2024-10-26T06:22:22.893665+020020501121A Network Trojan was detected192.168.2.449856185.208.158.20280TCP
        2024-10-26T06:22:24.009156+020020501121A Network Trojan was detected192.168.2.449863185.208.158.20280TCP
        2024-10-26T06:22:24.455305+020020501121A Network Trojan was detected192.168.2.449863185.208.158.20280TCP
        2024-10-26T06:22:25.479213+020020501121A Network Trojan was detected192.168.2.449872185.208.158.20280TCP
        2024-10-26T06:22:25.888300+020020501121A Network Trojan was detected192.168.2.449872185.208.158.20280TCP
        2024-10-26T06:22:26.954438+020020501121A Network Trojan was detected192.168.2.449883185.208.158.20280TCP
        2024-10-26T06:22:28.028701+020020501121A Network Trojan was detected192.168.2.449889185.208.158.20280TCP
        2024-10-26T06:22:29.080487+020020501121A Network Trojan was detected192.168.2.449895185.208.158.20280TCP
        2024-10-26T06:22:30.138462+020020501121A Network Trojan was detected192.168.2.449903185.208.158.20280TCP
        2024-10-26T06:22:31.189646+020020501121A Network Trojan was detected192.168.2.449908185.208.158.20280TCP
        2024-10-26T06:22:32.242129+020020501121A Network Trojan was detected192.168.2.449914185.208.158.20280TCP
        2024-10-26T06:22:34.298252+020020501121A Network Trojan was detected192.168.2.449922185.208.158.20280TCP
        2024-10-26T06:22:35.326407+020020501121A Network Trojan was detected192.168.2.449935185.208.158.20280TCP
        2024-10-26T06:22:36.386449+020020501121A Network Trojan was detected192.168.2.449941185.208.158.20280TCP
        2024-10-26T06:22:36.805851+020020501121A Network Trojan was detected192.168.2.449941185.208.158.20280TCP
        2024-10-26T06:22:37.232262+020020501121A Network Trojan was detected192.168.2.449941185.208.158.20280TCP
        2024-10-26T06:22:38.288920+020020501121A Network Trojan was detected192.168.2.449953185.208.158.20280TCP
        2024-10-26T06:22:38.707360+020020501121A Network Trojan was detected192.168.2.449953185.208.158.20280TCP
        2024-10-26T06:22:39.738961+020020501121A Network Trojan was detected192.168.2.449963185.208.158.20280TCP
        2024-10-26T06:22:40.777587+020020501121A Network Trojan was detected192.168.2.449969185.208.158.20280TCP
        2024-10-26T06:22:41.191875+020020501121A Network Trojan was detected192.168.2.449969185.208.158.20280TCP
        2024-10-26T06:22:42.211510+020020501121A Network Trojan was detected192.168.2.449977185.208.158.20280TCP
        2024-10-26T06:22:43.237307+020020501121A Network Trojan was detected192.168.2.449984185.208.158.20280TCP
        2024-10-26T06:22:44.266869+020020501121A Network Trojan was detected192.168.2.449992185.208.158.20280TCP
        2024-10-26T06:22:45.357771+020020501121A Network Trojan was detected192.168.2.449998185.208.158.20280TCP
        2024-10-26T06:22:46.503129+020020501121A Network Trojan was detected192.168.2.450003185.208.158.20280TCP
        2024-10-26T06:22:47.554516+020020501121A Network Trojan was detected192.168.2.450010185.208.158.20280TCP
        2024-10-26T06:22:47.974698+020020501121A Network Trojan was detected192.168.2.450010185.208.158.20280TCP
        2024-10-26T06:22:49.027783+020020501121A Network Trojan was detected192.168.2.450019185.208.158.20280TCP
        2024-10-26T06:22:50.070614+020020501121A Network Trojan was detected192.168.2.450027185.208.158.20280TCP
        2024-10-26T06:22:50.485528+020020501121A Network Trojan was detected192.168.2.450027185.208.158.20280TCP
        2024-10-26T06:22:51.539932+020020501121A Network Trojan was detected192.168.2.450036185.208.158.20280TCP
        2024-10-26T06:22:51.956350+020020501121A Network Trojan was detected192.168.2.450036185.208.158.20280TCP
        2024-10-26T06:22:53.018488+020020501121A Network Trojan was detected192.168.2.450041185.208.158.20280TCP
        2024-10-26T06:22:54.058079+020020501121A Network Trojan was detected192.168.2.450042185.208.158.20280TCP
        2024-10-26T06:22:54.476598+020020501121A Network Trojan was detected192.168.2.450042185.208.158.20280TCP
        2024-10-26T06:22:54.892274+020020501121A Network Trojan was detected192.168.2.450042185.208.158.20280TCP
        2024-10-26T06:22:56.128532+020020501121A Network Trojan was detected192.168.2.450043185.208.158.20280TCP
        2024-10-26T06:22:57.173148+020020501121A Network Trojan was detected192.168.2.450044185.208.158.20280TCP
        2024-10-26T06:22:58.208831+020020501121A Network Trojan was detected192.168.2.450045185.208.158.20280TCP
        2024-10-26T06:22:59.271765+020020501121A Network Trojan was detected192.168.2.450046185.208.158.20280TCP
        2024-10-26T06:23:00.300111+020020501121A Network Trojan was detected192.168.2.450047185.208.158.20280TCP
        2024-10-26T06:23:01.345599+020020501121A Network Trojan was detected192.168.2.450048185.208.158.20280TCP
        2024-10-26T06:23:02.378782+020020501121A Network Trojan was detected192.168.2.450049185.208.158.20280TCP
        2024-10-26T06:23:03.421035+020020501121A Network Trojan was detected192.168.2.450050185.208.158.20280TCP
        2024-10-26T06:23:04.851079+020020501121A Network Trojan was detected192.168.2.450051185.208.158.20280TCP
        2024-10-26T06:23:06.095835+020020501121A Network Trojan was detected192.168.2.450052185.208.158.20280TCP
        2024-10-26T06:23:07.154947+020020501121A Network Trojan was detected192.168.2.450053185.208.158.20280TCP
        2024-10-26T06:23:08.239423+020020501121A Network Trojan was detected192.168.2.450054185.208.158.20280TCP
        2024-10-26T06:23:09.271355+020020501121A Network Trojan was detected192.168.2.450055185.208.158.20280TCP
        2024-10-26T06:23:10.312851+020020501121A Network Trojan was detected192.168.2.450056185.208.158.20280TCP
        2024-10-26T06:23:11.380540+020020501121A Network Trojan was detected192.168.2.450057185.208.158.20280TCP
        2024-10-26T06:23:12.479490+020020501121A Network Trojan was detected192.168.2.450058185.208.158.20280TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: iv2Mm5SEJF.exeAvira: detected
        Source: sigmavideoconverter32_64.exe.6024.2.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["bxxfdpb.com"]}
        Source: C:\ProgramData\Draw Panel Cleaner 10.25.47\Draw Panel Cleaner 10.25.47.exeReversingLabs: Detection: 28%
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeReversingLabs: Detection: 28%
        Source: iv2Mm5SEJF.exeReversingLabs: Detection: 26%
        Source: iv2Mm5SEJF.exeVirustotal: Detection: 21%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\ProgramData\Draw Panel Cleaner 10.25.47\Draw Panel Cleaner 10.25.47.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0045D4EC GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D4EC
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0045D5A0 ArcFourCrypt,1_2_0045D5A0
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0045D5B8 ArcFourCrypt,1_2_0045D5B8
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeUnpacked PE file: 2.2.sigmavideoconverter32_64.exe.400000.0.unpack
        Source: iv2Mm5SEJF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00452A4C FindFirstFileA,GetLastError,1_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,1_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00497A74

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49768 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49774 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49774 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49768 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49737 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49737 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49784 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49758 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49758 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49784 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49796 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49807 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49796 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49807 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49826 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49856 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49863 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49863 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49883 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49883 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49856 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49826 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49840 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49790 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49840 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49908 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49908 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49848 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49889 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49790 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49848 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49889 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49935 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49935 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49872 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49872 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49977 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49977 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49833 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49922 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49833 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49922 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49953 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49953 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49914 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50003 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50003 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49817 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50027 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50027 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49914 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49969 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49817 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49969 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50041 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50041 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49895 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50044 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49895 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50053 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50050 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50036 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50044 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50053 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49941 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49998 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50054 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50054 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50036 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49941 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50050 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49963 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49998 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49903 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49903 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50052 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50052 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49963 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50046 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50049 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50046 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50051 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50058 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50058 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50049 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49992 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49992 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50051 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50043 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50043 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50055 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50055 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50056 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50056 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49984 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50048 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50048 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49984 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50010 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50010 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50019 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50019 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50042 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50042 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50045 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50045 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50057 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50057 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50047 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50047 -> 185.208.158.202:80
        Source: Malware configuration extractorURLs: bxxfdpb.com
        Source: global trafficTCP traffic: 192.168.2.4:49743 -> 89.105.201.183:2023
        Source: Joe Sandbox ViewIP Address: 185.208.158.202 185.208.158.202
        Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c444db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf618c1e9909833 HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownUDP traffic detected without corresponding DNS query: 45.155.250.90
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C172AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_free,2_2_02C172AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c444db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf618c1e9909833 HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1Host: bxxfdpb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: bxxfdpb.com
        Source: sigmavideoconverter32_64.exe, 00000002.00000002.2956804557.0000000000A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.202/
        Source: sigmavideoconverter32_64.exe, 00000002.00000002.2956804557.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.202/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d8
        Source: sigmavideoconverter32_64.exe, 00000002.00000002.2956804557.0000000000A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.202/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: iv2Mm5SEJF.exe, 00000000.00000002.2956636706.0000000002138000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.exe, 00000000.00000003.1707984132.0000000002360000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956900362.000000000214C000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1714762158.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956704955.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1714521099.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1710263178.0000000002160000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1710183496.00000000030F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://fsf.org/
        Source: is-8E2AL.tmp.1.drString found in binary or memory: http://mingw-w64.sourceforge.net/X
        Source: is-U47N5.tmp.1.drString found in binary or memory: http://tukaani.org/
        Source: is-U47N5.tmp.1.drString found in binary or memory: http://tukaani.org/xz/
        Source: iv2Mm5SEJF.exe, 00000000.00000002.2956636706.0000000002138000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.exe, 00000000.00000003.1707984132.0000000002360000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956900362.000000000214C000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1714762158.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956704955.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1714521099.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1710263178.0000000002160000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1710183496.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, is-J7AJI.tmp.1.drString found in binary or memory: http://www.gnu.org/licenses/
        Source: iv2Mm5SEJF.tmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, iv2Mm5SEJF.tmp.0.dr, is-G54RV.tmp.1.drString found in binary or memory: http://www.innosetup.com/
        Source: iv2Mm5SEJF.exe, 00000000.00000003.1708804916.0000000002144000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.exe, 00000000.00000003.1708634959.0000000002360000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, iv2Mm5SEJF.tmp.0.dr, is-G54RV.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
        Source: iv2Mm5SEJF.exe, 00000000.00000003.1708804916.0000000002144000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.exe, 00000000.00000003.1708634959.0000000002360000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, iv2Mm5SEJF.tmp.0.dr, is-G54RV.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0042F530 NtdllDefWindowProc_A,1_2_0042F530
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004789DC NtdllDefWindowProc_A,1_2_004789DC
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004573CC PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_004573CC
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E944
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555D0
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004804C61_2_004804C6
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004709501_2_00470950
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004352D81_2_004352D8
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004677101_2_00467710
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0043036C1_2_0043036C
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004444D81_2_004444D8
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004345D41_2_004345D4
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004866041_2_00486604
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00444A801_2_00444A80
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00430EF81_2_00430EF8
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004451781_2_00445178
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0045F4301_2_0045F430
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0045B4D81_2_0045B4D8
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004875641_2_00487564
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004455841_2_00445584
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004697701_2_00469770
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0048D8C41_2_0048D8C4
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004519A81_2_004519A8
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0043DD601_2_0043DD60
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_00406C472_2_00406C47
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_004010512_2_00401051
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_00401C262_2_00401C26
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C4B4E52_2_02C4B4E5
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C4BF802_2_02C4BF80
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C4BF312_2_02C4BF31
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C2E24D2_2_02C2E24D
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C1F07A2_2_02C1F07A
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C34EE92_2_02C34EE9
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C2E6652_2_02C2E665
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C32E742_2_02C32E74
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C29F442_2_02C29F44
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C2ACFA2_2_02C2ACFA
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C2DD592_2_02C2DD59
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C285032_2_02C28503
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Sigma Video Converter\is-02SS0.tmp EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Sigma Video Converter\is-3JQ4P.tmp E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: String function: 02C28BA0 appears 37 times
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: String function: 02C353F0 appears 139 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 00405964 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 00408C14 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 00406ACC appears 41 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 00403400 appears 61 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 00445DE4 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 004078FC appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 004344EC appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 00403494 appears 82 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 00457D58 appears 73 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 00453330 appears 93 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 00457B4C appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 00403684 appears 221 times
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: String function: 004460B4 appears 59 times
        Source: iv2Mm5SEJF.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: iv2Mm5SEJF.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: iv2Mm5SEJF.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: iv2Mm5SEJF.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: iv2Mm5SEJF.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-G54RV.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-G54RV.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: is-G54RV.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-G54RV.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-4RR2F.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-HFR57.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-J7AJI.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-C4SKQ.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-U47N5.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-IU0LB.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-KVVK2.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-8E2AL.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-MC48V.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-BT44D.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-BPC4N.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: iv2Mm5SEJF.exe, 00000000.00000003.1708804916.0000000002144000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs iv2Mm5SEJF.exe
        Source: iv2Mm5SEJF.exe, 00000000.00000003.1708634959.0000000002360000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs iv2Mm5SEJF.exe
        Source: iv2Mm5SEJF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/69@1/2
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C208C0 FormatMessageA,GetLastError,FormatMessageA,GetLastError,2_2_02C208C0
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555D0
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00455DF8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455DF8
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: CreateServiceA,CloseServiceHandle,2_2_004021DB
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0046E38C GetVersion,CoCreateInstance,1_2_0046E38C
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_00409BEC FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409BEC
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_00402897 StartServiceCtrlDispatcherA,2_2_00402897
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_00402897 StartServiceCtrlDispatcherA,2_2_00402897
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video ConverterJump to behavior
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeFile created: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: iv2Mm5SEJF.exeReversingLabs: Detection: 26%
        Source: iv2Mm5SEJF.exeVirustotal: Detection: 21%
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeFile read: C:\Users\user\Desktop\iv2Mm5SEJF.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\iv2Mm5SEJF.exe "C:\Users\user\Desktop\iv2Mm5SEJF.exe"
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeProcess created: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp "C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp" /SL5="$20440,3877545,54272,C:\Users\user\Desktop\iv2Mm5SEJF.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess created: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe "C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe" -i
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeProcess created: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp "C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp" /SL5="$20440,3877545,54272,C:\Users\user\Desktop\iv2Mm5SEJF.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess created: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe "C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: iv2Mm5SEJF.exeStatic file information: File size 4158899 > 1048576

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeUnpacked PE file: 2.2.sigmavideoconverter32_64.exe.400000.0.unpack _hreg_4:EW;_ireg_4:R;_jreg_4:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeUnpacked PE file: 2.2.sigmavideoconverter32_64.exe.400000.0.unpack
        Source: is-02SS0.tmp.1.drStatic PE information: 0x8C00008C [Mon Jun 6 07:19:40 2044 UTC]
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502AC
        Source: initial sampleStatic PE information: section where entry point is pointing to: _hreg_4
        Source: sigmavideoconverter32_64.exe.1.drStatic PE information: section name: _hreg_4
        Source: sigmavideoconverter32_64.exe.1.drStatic PE information: section name: _ireg_4
        Source: sigmavideoconverter32_64.exe.1.drStatic PE information: section name: _jreg_4
        Source: is-VSJ85.tmp.1.drStatic PE information: section name: /4
        Source: is-BT44D.tmp.1.drStatic PE information: section name: /4
        Source: is-MC48V.tmp.1.drStatic PE information: section name: /4
        Source: is-9K7K3.tmp.1.drStatic PE information: section name: /4
        Source: is-VADGV.tmp.1.drStatic PE information: section name: /4
        Source: is-5ASRH.tmp.1.drStatic PE information: section name: /4
        Source: is-J7AJI.tmp.1.drStatic PE information: section name: /4
        Source: is-02SS0.tmp.1.drStatic PE information: section name: /4
        Source: is-783NG.tmp.1.drStatic PE information: section name: /4
        Source: is-U47N5.tmp.1.drStatic PE information: section name: /4
        Source: is-ARDA9.tmp.1.drStatic PE information: section name: /4
        Source: is-KVVK2.tmp.1.drStatic PE information: section name: /4
        Source: is-DBBG7.tmp.1.drStatic PE information: section name: /4
        Source: is-IU0LB.tmp.1.drStatic PE information: section name: /4
        Source: is-BPC4N.tmp.1.drStatic PE information: section name: /4
        Source: is-C4SKQ.tmp.1.drStatic PE information: section name: /4
        Source: is-4RR2F.tmp.1.drStatic PE information: section name: /4
        Source: is-G6MP2.tmp.1.drStatic PE information: section name: /4
        Source: is-HFR57.tmp.1.drStatic PE information: section name: /4
        Source: is-BUQA8.tmp.1.drStatic PE information: section name: /4
        Source: is-A0CCL.tmp.1.drStatic PE information: section name: /4
        Source: is-KAU6V.tmp.1.drStatic PE information: section name: /4
        Source: is-M3KHP.tmp.1.drStatic PE information: section name: /4
        Source: is-U1UC2.tmp.1.drStatic PE information: section name: /4
        Source: is-3JQ4P.tmp.1.drStatic PE information: section name: /4
        Source: is-8E2AL.tmp.1.drStatic PE information: section name: /4
        Source: is-P85R5.tmp.1.drStatic PE information: section name: /4
        Source: Draw Panel Cleaner 10.25.47.exe.2.drStatic PE information: section name: _hreg_4
        Source: Draw Panel Cleaner 10.25.47.exe.2.drStatic PE information: section name: _ireg_4
        Source: Draw Panel Cleaner 10.25.47.exe.2.drStatic PE information: section name: _jreg_4
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_004065B8 push 004065F5h; ret 0_2_004065ED
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00409954 push 00409991h; ret 1_2_00409989
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0040A04F push ds; ret 1_2_0040A050
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0040A023 push ds; ret 1_2_0040A04D
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00460088 push ecx; mov dword ptr [esp], ecx1_2_0046008C
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004062CC push ecx; mov dword ptr [esp], eax1_2_004062CD
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0049467C push ecx; mov dword ptr [esp], ecx1_2_00494681
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004106E0 push ecx; mov dword ptr [esp], edx1_2_004106E5
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0040D038 push ecx; mov dword ptr [esp], edx1_2_0040D03A
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004850AC push ecx; mov dword ptr [esp], ecx1_2_004850B1
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00443450 push ecx; mov dword ptr [esp], ecx1_2_00443454
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0040F598 push ecx; mov dword ptr [esp], edx1_2_0040F59A
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00459634 push 00459678h; ret 1_2_00459670
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004517E4 push 00451817h; ret 1_2_0045180F
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004519A8 push ecx; mov dword ptr [esp], eax1_2_004519AD
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00483A08 push 00483AF7h; ret 1_2_00483AEF
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00477A24 push ecx; mov dword ptr [esp], edx1_2_00477A25

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02C1F8A3
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-BT44D.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-VADGV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-VSJ85.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-KAU6V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-8E2AL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-U1UC2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-U47N5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-C4SKQ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-ARDA9.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-9K7K3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-P85R5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-BPC4N.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-J7AJI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-4RR2F.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-A0CCL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-G6MP2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeFile created: C:\ProgramData\Draw Panel Cleaner 10.25.47\Draw Panel Cleaner 10.25.47.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-02SS0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-HFR57.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-BUQA8.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-IU0LB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-5ASRH.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-M3KHP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-DBBG7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\uninstall\is-G54RV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-KVVK2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-783NG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-MC48V.tmpJump to dropped file
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeFile created: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpFile created: C:\Users\user\AppData\Local\Sigma Video Converter\is-3JQ4P.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeFile created: C:\ProgramData\Draw Panel Cleaner 10.25.47\Draw Panel Cleaner 10.25.47.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02C1F8A3
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_00402897 StartServiceCtrlDispatcherA,2_2_00402897
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004833BC IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_004833BC
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F128
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_00401B4B
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_02C1F9A7
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeWindow / User API: threadDelayed 670Jump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeWindow / User API: threadDelayed 9204Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-BT44D.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-VADGV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-VSJ85.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-KAU6V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-8E2AL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-U1UC2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-U47N5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-C4SKQ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-ARDA9.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-9K7K3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-P85R5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-BPC4N.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-4RR2F.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-J7AJI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-A0CCL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-G6MP2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-02SS0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-HFR57.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-BUQA8.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-IU0LB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-5ASRH.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-M3KHP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-DBBG7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\uninstall\is-G54RV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-KVVK2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-783NG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-MC48V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Sigma Video Converter\is-3JQ4P.tmpJump to dropped file
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5693
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-18777
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe TID: 3004Thread sleep count: 670 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe TID: 3004Thread sleep time: -1340000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe TID: 1696Thread sleep count: 56 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe TID: 1696Thread sleep time: -3360000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe TID: 3004Thread sleep count: 9204 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe TID: 3004Thread sleep time: -18408000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00452A4C FindFirstFileA,GetLastError,1_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,1_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00497A74
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_00409B30 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B30
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeThread delayed: delay time: 60000Jump to behavior
        Source: sigmavideoconverter32_64.exe, 00000002.00000002.2956804557.0000000000A77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: sigmavideoconverter32_64.exe, 00000002.00000002.2956804557.0000000000988000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeAPI call chain: ExitProcess graph end nodegraph_0-6733
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeAPI call chain: ExitProcess graph end nodegraph_2-18779
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeAPI call chain: ExitProcess graph end nodegraph_2-21141
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C301BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02C301BE
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C301BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02C301BE
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502AC
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C1648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_02C1648B
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C29528 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02C29528
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00478420 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478420
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E0AC
        Source: C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exeCode function: 2_2_02C1F85B cpuid 2_2_02C1F85B
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: GetLocaleInfoA,0_2_004051FC
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: GetLocaleInfoA,0_2_00405248
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: GetLocaleInfoA,1_2_00408570
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: GetLocaleInfoA,1_2_004085BC
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_0045892C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_0045892C
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmpCode function: 1_2_00455588 GetUserNameA,1_2_00455588
        Source: C:\Users\user\Desktop\iv2Mm5SEJF.exeCode function: 0_2_00405CE4 GetVersionExA,0_2_00405CE4

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000002.00000002.2957312058.00000000026DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: sigmavideoconverter32_64.exe PID: 6024, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000002.00000002.2957312058.00000000026DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: sigmavideoconverter32_64.exe PID: 6024, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Service Execution
        4
        Windows Service
        1
        DLL Side-Loading
        2
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt1
        Bootkit
        1
        Access Token Manipulation
        21
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook4
        Windows Service
        1
        Timestomp
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        DLL Side-Loading
        LSA Secrets141
        Security Software Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
        Virtualization/Sandbox Evasion
        DCSync21
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Access Token Manipulation
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
        Process Injection
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
        Bootkit
        Network Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        iv2Mm5SEJF.exe26%ReversingLabsWin32.Malware.Munp
        iv2Mm5SEJF.exe22%VirustotalBrowse
        iv2Mm5SEJF.exe100%AviraHEUR/AGEN.1332570
        SourceDetectionScannerLabelLink
        C:\ProgramData\Draw Panel Cleaner 10.25.47\Draw Panel Cleaner 10.25.47.exe100%Joe Sandbox ML
        C:\ProgramData\Draw Panel Cleaner 10.25.47\Draw Panel Cleaner 10.25.47.exe29%ReversingLabsWin32.Trojan.Generic
        C:\Users\user\AppData\Local\Sigma Video Converter\is-02SS0.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-3JQ4P.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-4RR2F.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-5ASRH.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-783NG.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-8E2AL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-9K7K3.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-A0CCL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-ARDA9.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-BPC4N.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-BT44D.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-BUQA8.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-C4SKQ.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-DBBG7.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-G6MP2.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-HFR57.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-IU0LB.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-J7AJI.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-KAU6V.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-KVVK2.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-M3KHP.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-MC48V.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-P85R5.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-U1UC2.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-U47N5.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-VADGV.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\is-VSJ85.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libgcc_s_dw2-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libgdk-win32-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libgdk_pixbuf-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libgdkmm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libglibmm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libgmodule-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libgobject-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libgomp-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libgraphite2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libharfbuzz-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libintl-8.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libjpeg-8.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\liblcms2-2.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\liblzma-5.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libpango-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libpangocairo-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libpangoft2-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libpangomm-1.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libpangowin32-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libpcre-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libpixman-1-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libpng16-16.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\librsvg-2-2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libsigc-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libtiff-5.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\libwinpthread-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe29%ReversingLabsWin32.Trojan.Generic
        C:\Users\user\AppData\Local\Sigma Video Converter\uninstall\is-G54RV.tmp3%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\uninstall\unins000.exe (copy)3%ReversingLabs
        C:\Users\user\AppData\Local\Sigma Video Converter\zlib1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-84H8I.tmp\_isetup\_shfoldr.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp3%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.innosetup.com/0%URL Reputationsafe
        http://www.innosetup.com/0%URL Reputationsafe
        http://www.remobjects.com/psU0%URL Reputationsafe
        http://www.remobjects.com/ps0%URL Reputationsafe
        http://fsf.org/0%URL Reputationsafe
        http://mingw-w64.sourceforge.net/X0%VirustotalBrowse
        http://tukaani.org/0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        bxxfdpb.com
        185.208.158.202
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://bxxfdpb.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c444db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf618c1e9909833true
            unknown
            bxxfdpb.comtrue
              unknown
              http://bxxfdpb.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941etrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.innosetup.com/iv2Mm5SEJF.tmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, iv2Mm5SEJF.tmp.0.dr, is-G54RV.tmp.1.drfalse
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://tukaani.org/is-U47N5.tmp.1.drfalseunknown
                http://www.remobjects.com/psUiv2Mm5SEJF.exe, 00000000.00000003.1708804916.0000000002144000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.exe, 00000000.00000003.1708634959.0000000002360000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, iv2Mm5SEJF.tmp.0.dr, is-G54RV.tmp.1.drfalse
                • URL Reputation: safe
                unknown
                http://tukaani.org/xz/is-U47N5.tmp.1.drfalse
                  unknown
                  http://185.208.158.202/sigmavideoconverter32_64.exe, 00000002.00000002.2956804557.0000000000A59000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://mingw-w64.sourceforge.net/Xis-8E2AL.tmp.1.drfalseunknown
                    http://www.remobjects.com/psiv2Mm5SEJF.exe, 00000000.00000003.1708804916.0000000002144000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.exe, 00000000.00000003.1708634959.0000000002360000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, iv2Mm5SEJF.tmp.0.dr, is-G54RV.tmp.1.drfalse
                    • URL Reputation: safe
                    unknown
                    http://fsf.org/iv2Mm5SEJF.exe, 00000000.00000002.2956636706.0000000002138000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.exe, 00000000.00000003.1707984132.0000000002360000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956900362.000000000214C000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1714762158.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956704955.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1714521099.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1710263178.0000000002160000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1710183496.00000000030F0000.00000004.00001000.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://185.208.158.202/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82dsigmavideoconverter32_64.exe, 00000002.00000002.2956804557.0000000000A59000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://185.208.158.202/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d8sigmavideoconverter32_64.exe, 00000002.00000002.2956804557.0000000000A77000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://www.gnu.org/licenses/iv2Mm5SEJF.exe, 00000000.00000002.2956636706.0000000002138000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.exe, 00000000.00000003.1707984132.0000000002360000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956900362.000000000214C000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1714762158.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000002.2956704955.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1714521099.000000000072F000.00000004.00000020.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1710263178.0000000002160000.00000004.00001000.00020000.00000000.sdmp, iv2Mm5SEJF.tmp, 00000001.00000003.1710183496.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, is-J7AJI.tmp.1.drfalse
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          185.208.158.202
                          bxxfdpb.comSwitzerland
                          34888SIMPLECARRER2ITtrue
                          89.105.201.183
                          unknownNetherlands
                          24875NOVOSERVE-ASNLfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1542674
                          Start date and time:2024-10-26 06:20:10 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 37s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:7
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:iv2Mm5SEJF.exe
                          renamed because original name is a hash value
                          Original Sample Name:86742847ae7b5c190b6cf54b05415785.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@5/69@1/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 91%
                          • Number of executed functions: 189
                          • Number of non-executed functions: 247
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtDeviceIoControlFile calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          00:21:42API Interceptor526693x Sleep call for process: sigmavideoconverter32_64.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          185.208.158.202R3Tb6f1QFD.exeGet hashmaliciousSocks5SystemzBrowse
                            FrYYvqvO2s.exeGet hashmaliciousSocks5SystemzBrowse
                              urHdxJtF4p.exeGet hashmaliciousSocks5SystemzBrowse
                                gi5qOqqypd.exeGet hashmaliciousSocks5SystemzBrowse
                                  rXoyCPba6O.exeGet hashmaliciousSocks5SystemzBrowse
                                    hAyQbTcI0I.exeGet hashmaliciousSocks5SystemzBrowse
                                      1iGYsIphmN.exeGet hashmaliciousSocks5SystemzBrowse
                                        XettQ15qw4.exeGet hashmaliciousSocks5SystemzBrowse
                                          7rBLc6cmJZ.exeGet hashmaliciousSocks5SystemzBrowse
                                            r1LQ3TmnJT.exeGet hashmaliciousSocks5SystemzBrowse
                                              89.105.201.183N6jsQ3XNNX.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 200
                                              cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 200
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              SIMPLECARRER2ITR3Tb6f1QFD.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 185.208.158.202
                                              FrYYvqvO2s.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 185.208.158.202
                                              urHdxJtF4p.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 185.208.158.202
                                              gi5qOqqypd.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 185.208.158.202
                                              rXoyCPba6O.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 185.208.158.202
                                              hAyQbTcI0I.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 185.208.158.202
                                              1iGYsIphmN.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 185.208.158.202
                                              XettQ15qw4.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 185.208.158.202
                                              7rBLc6cmJZ.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 185.208.158.202
                                              r1LQ3TmnJT.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 185.208.158.202
                                              NOVOSERVE-ASNLR3Tb6f1QFD.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 89.105.201.183
                                              FrYYvqvO2s.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 89.105.201.183
                                              urHdxJtF4p.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 89.105.201.183
                                              gi5qOqqypd.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 89.105.201.183
                                              rXoyCPba6O.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 89.105.201.183
                                              hAyQbTcI0I.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 89.105.201.183
                                              1iGYsIphmN.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 89.105.201.183
                                              la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                              • 89.105.208.192
                                              239c8b10775a00048df8eeccc1ad36394a86eb67934c8.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 89.105.201.183
                                              WwlZEpBtps.exeGet hashmaliciousSocks5SystemzBrowse
                                              • 89.105.201.183
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              C:\Users\user\AppData\Local\Sigma Video Converter\is-3JQ4P.tmpR3Tb6f1QFD.exeGet hashmaliciousSocks5SystemzBrowse
                                                FrYYvqvO2s.exeGet hashmaliciousSocks5SystemzBrowse
                                                  urHdxJtF4p.exeGet hashmaliciousSocks5SystemzBrowse
                                                    gi5qOqqypd.exeGet hashmaliciousSocks5SystemzBrowse
                                                      rXoyCPba6O.exeGet hashmaliciousSocks5SystemzBrowse
                                                        hAyQbTcI0I.exeGet hashmaliciousSocks5SystemzBrowse
                                                          1iGYsIphmN.exeGet hashmaliciousSocks5SystemzBrowse
                                                            XettQ15qw4.exeGet hashmaliciousSocks5SystemzBrowse
                                                              7rBLc6cmJZ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                r1LQ3TmnJT.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  C:\Users\user\AppData\Local\Sigma Video Converter\is-02SS0.tmpR3Tb6f1QFD.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    FrYYvqvO2s.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      urHdxJtF4p.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        gi5qOqqypd.exeGet hashmaliciousSocks5SystemzBrowse
                                                                          rXoyCPba6O.exeGet hashmaliciousSocks5SystemzBrowse
                                                                            hAyQbTcI0I.exeGet hashmaliciousSocks5SystemzBrowse
                                                                              1iGYsIphmN.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                XettQ15qw4.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  7rBLc6cmJZ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                    r1LQ3TmnJT.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                      Process:C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2693120
                                                                                      Entropy (8bit):6.695095780173695
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:Pptomms1bkUO1T1WaQlFvdeBc4JYj9qU0RaWicavWPWBMf+I5u1G0xiwgEZdplLE:PptomB8jWa+vqQVMmwz/U/3pUD
                                                                                      MD5:B9DE5388BAC9E856A1796FC2144A647B
                                                                                      SHA1:714EDCB8600CBE88F860243F7D76499B5048679D
                                                                                      SHA-256:93EB6E26B9926C93B453F32F6876092DF1D894D0737B80AF40E30AE811C1D372
                                                                                      SHA-512:7A9ACC0193A5ABB09BF3E36A1AFBA264E0C6A48472F4A816D8184A04859182D100F96DA1C9F1DC25B77461216845AA3919AE0138BC684B6B1EADD2B5F6503658
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      • Antivirus: ReversingLabs, Detection: 29%
                                                                                      Reputation:low
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p..L.................."..........."......."...@...........................)......g).......................................".......#.X............................................................................."............................._hreg_4...".......".................`..._ireg_4..+...."..,....".............@..@_jreg_4.......#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):8
                                                                                      Entropy (8bit):2.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ul/:ut
                                                                                      MD5:B6AB2444D3A3AB0D650E956CA8C2AB46
                                                                                      SHA1:6C500FAF48A7F532DEAB5D3C864B3D907AA08A54
                                                                                      SHA-256:97644311E2630FE385B4C1DE30D721B218CE526A20F1FA21F68C3A3A48D20F50
                                                                                      SHA-512:1793A4F28F7C7B7D232F1FDBB6C6B1F1AEFFC9DFCBC8C9242ADFA045C7DD78D624804A0C02C91D93C7D689B1C652A4FF4619EB227C94EB00C1765A8D31904F11
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview:pn.g....
                                                                                      Process:C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):4
                                                                                      Entropy (8bit):0.8112781244591328
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:yln:2n
                                                                                      MD5:9A30CB647A6BDD7B520EE3A072881D16
                                                                                      SHA1:5DC0E1CF689CB31A6C529DC8DDB9D677123E97F7
                                                                                      SHA-256:0AB677189BBD88D8D69ABCEB88946F32A36333B36D4E75CB1AE69EF3C4CF1FC2
                                                                                      SHA-512:152D87A8A4E15495F498F2BC2D24D07A7F38837D96846DA412BE5C0C44FE4F9BB803C3E7F0ADCCF801DCB392D7113011052E52048337EC1A6ADE15576BAB9DB6
                                                                                      Malicious:false
                                                                                      Reputation:moderate, very likely benign file
                                                                                      Preview:G...
                                                                                      Process:C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):128
                                                                                      Entropy (8bit):2.9545817380615236
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                                                      MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                                                      SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                                                      SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                                                      SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                                                      Malicious:false
                                                                                      Reputation:moderate, very likely benign file
                                                                                      Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):128
                                                                                      Entropy (8bit):1.7095628900165245
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                                                      MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                                                      SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                                                      SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                                                      SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                                                      Malicious:false
                                                                                      Reputation:moderate, very likely benign file
                                                                                      Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):509934
                                                                                      Entropy (8bit):6.031080686301204
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                                                      MD5:02E6C6AB886700E6F184EEE43157C066
                                                                                      SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                                                      SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                                                      SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Joe Sandbox View:
                                                                                      • Filename: R3Tb6f1QFD.exe, Detection: malicious, Browse
                                                                                      • Filename: FrYYvqvO2s.exe, Detection: malicious, Browse
                                                                                      • Filename: urHdxJtF4p.exe, Detection: malicious, Browse
                                                                                      • Filename: gi5qOqqypd.exe, Detection: malicious, Browse
                                                                                      • Filename: rXoyCPba6O.exe, Detection: malicious, Browse
                                                                                      • Filename: hAyQbTcI0I.exe, Detection: malicious, Browse
                                                                                      • Filename: 1iGYsIphmN.exe, Detection: malicious, Browse
                                                                                      • Filename: XettQ15qw4.exe, Detection: malicious, Browse
                                                                                      • Filename: 7rBLc6cmJZ.exe, Detection: malicious, Browse
                                                                                      • Filename: r1LQ3TmnJT.exe, Detection: malicious, Browse
                                                                                      Reputation:moderate, very likely benign file
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):448557
                                                                                      Entropy (8bit):6.353356595345232
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                                                      MD5:908111F583B7019D2ED3492435E5092D
                                                                                      SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                                                      SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                                                      SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                                                      Joe Sandbox View:
                                                                                      • Filename: R3Tb6f1QFD.exe, Detection: malicious, Browse
                                                                                      • Filename: FrYYvqvO2s.exe, Detection: malicious, Browse
                                                                                      • Filename: urHdxJtF4p.exe, Detection: malicious, Browse
                                                                                      • Filename: gi5qOqqypd.exe, Detection: malicious, Browse
                                                                                      • Filename: rXoyCPba6O.exe, Detection: malicious, Browse
                                                                                      • Filename: hAyQbTcI0I.exe, Detection: malicious, Browse
                                                                                      • Filename: 1iGYsIphmN.exe, Detection: malicious, Browse
                                                                                      • Filename: XettQ15qw4.exe, Detection: malicious, Browse
                                                                                      • Filename: 7rBLc6cmJZ.exe, Detection: malicious, Browse
                                                                                      • Filename: r1LQ3TmnJT.exe, Detection: malicious, Browse
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):92019
                                                                                      Entropy (8bit):5.974787373427489
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                                                      MD5:CC7DAD980DD04E0387795741D809CBF7
                                                                                      SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                                                      SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                                                      SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):441975
                                                                                      Entropy (8bit):6.372283713065844
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                                                      MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                                                      SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                                                      SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                                                      SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):397808
                                                                                      Entropy (8bit):6.396146399966879
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                                                      MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                                                      SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                                                      SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                                                      SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):65181
                                                                                      Entropy (8bit):6.085572761520829
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                                                      MD5:98A49CC8AE2D608C6E377E95833C569B
                                                                                      SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                                                      SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                                                      SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):174543
                                                                                      Entropy (8bit):6.3532700320638025
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                                                      MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                                                      SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                                                      SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                                                      SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):706136
                                                                                      Entropy (8bit):6.517672165992715
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                                                      MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                                                      SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                                                      SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                                                      SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):2693120
                                                                                      Entropy (8bit):6.69509560765089
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:wptomms1bkUO1T1WaQlFvdeBc4JYj9qU0RaWicavWPWBMf+I5u1G0xiwgEZdplLE:wptomB8jWa+vqQVMmwz/U/3pUD
                                                                                      MD5:88FA4506A0EC17E5807FB0C9E65FD4E9
                                                                                      SHA1:ED8232A7C4352756A6E5A2DC09F0E436C1E56E8D
                                                                                      SHA-256:E02A7A18D6756815D93F4148E712EB9CD4B48A215D6DDFB96E88F872E3255A69
                                                                                      SHA-512:9CDFA3DABCC659D063A6184A14A6B966B42953DDA4B364704198C158ADC9B2849DB4798F247B7D79534D6EDF35A0D62D803C66ACE1C8B4B4AE245AFD43C270F7
                                                                                      Malicious:false
                                                                                      Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p..L.................."..........."......."...@...........................)......g).......................................".......#.X............................................................................."............................._hreg_4...".......".................`..._ireg_4..+...."..,....".............@..@_jreg_4.......#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):121524
                                                                                      Entropy (8bit):6.347995296737745
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                                                      MD5:6CE25FB0302F133CC244889C360A6541
                                                                                      SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                                                      SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                                                      SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):259014
                                                                                      Entropy (8bit):6.075222655669795
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                                                      MD5:B4FDE05A19346072C713BE2926AF8961
                                                                                      SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                                                      SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                                                      SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):26562
                                                                                      Entropy (8bit):5.606958768500933
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                                                      MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                                                      SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                                                      SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                                                      SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):291245
                                                                                      Entropy (8bit):6.234245376773595
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                                                      MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                                                      SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                                                      SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                                                      SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):64724
                                                                                      Entropy (8bit):5.910307743399971
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                                                      MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                                                      SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                                                      SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                                                      SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):268404
                                                                                      Entropy (8bit):6.265024248848175
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                                                      MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                                                      SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                                                      SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                                                      SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):165739
                                                                                      Entropy (8bit):6.062324507479428
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                                                      MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                                                      SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                                                      SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                                                      SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):101544
                                                                                      Entropy (8bit):6.237382830377451
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                                                      MD5:E13FCD8FB16E483E4DE47A036687D904
                                                                                      SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                                                      SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                                                      SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):181527
                                                                                      Entropy (8bit):6.362061002967905
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                                                      MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                                                      SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                                                      SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                                                      SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):140752
                                                                                      Entropy (8bit):6.52778891175594
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                                                      MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                                                      SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                                                      SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                                                      SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):248781
                                                                                      Entropy (8bit):6.474165596279956
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                                                      MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                                                      SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                                                      SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                                                      SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):814068
                                                                                      Entropy (8bit):6.5113626552096
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                                                      MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                                                      SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                                                      SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                                                      SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):248694
                                                                                      Entropy (8bit):6.346971642353424
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                                                      MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                                                      SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                                                      SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                                                      SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):337171
                                                                                      Entropy (8bit):6.46334441651647
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                                                      MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                                                      SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                                                      SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                                                      SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):98626
                                                                                      Entropy (8bit):6.478068795827396
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                                                      MD5:70CA53E8B46464CCF956D157501D367A
                                                                                      SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                                                      SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                                                      SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):30994
                                                                                      Entropy (8bit):5.666281517516177
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                                                      MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                                                      SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                                                      SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                                                      SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):171848
                                                                                      Entropy (8bit):6.579154579239999
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                                                      MD5:236A679AB1B16E66625AFBA86A4669EB
                                                                                      SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                                                      SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                                                      SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):235032
                                                                                      Entropy (8bit):6.398850087061798
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                                                      MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                                                      SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                                                      SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                                                      SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):463112
                                                                                      Entropy (8bit):6.363613724826455
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                                                      MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                                                      SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                                                      SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                                                      SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):121524
                                                                                      Entropy (8bit):6.347995296737745
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                                                      MD5:6CE25FB0302F133CC244889C360A6541
                                                                                      SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                                                      SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                                                      SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):814068
                                                                                      Entropy (8bit):6.5113626552096
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                                                      MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                                                      SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                                                      SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                                                      SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):181527
                                                                                      Entropy (8bit):6.362061002967905
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                                                      MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                                                      SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                                                      SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                                                      SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):268404
                                                                                      Entropy (8bit):6.265024248848175
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                                                      MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                                                      SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                                                      SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                                                      SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):463112
                                                                                      Entropy (8bit):6.363613724826455
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                                                      MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                                                      SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                                                      SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                                                      SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):26562
                                                                                      Entropy (8bit):5.606958768500933
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                                                      MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                                                      SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                                                      SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                                                      SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):337171
                                                                                      Entropy (8bit):6.46334441651647
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                                                      MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                                                      SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                                                      SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                                                      SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):174543
                                                                                      Entropy (8bit):6.3532700320638025
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                                                      MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                                                      SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                                                      SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                                                      SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):235032
                                                                                      Entropy (8bit):6.398850087061798
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                                                      MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                                                      SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                                                      SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                                                      SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):441975
                                                                                      Entropy (8bit):6.372283713065844
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                                                      MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                                                      SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                                                      SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                                                      SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):140752
                                                                                      Entropy (8bit):6.52778891175594
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                                                      MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                                                      SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                                                      SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                                                      SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):509934
                                                                                      Entropy (8bit):6.031080686301204
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                                                      MD5:02E6C6AB886700E6F184EEE43157C066
                                                                                      SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                                                      SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                                                      SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):397808
                                                                                      Entropy (8bit):6.396146399966879
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                                                      MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                                                      SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                                                      SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                                                      SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):171848
                                                                                      Entropy (8bit):6.579154579239999
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                                                      MD5:236A679AB1B16E66625AFBA86A4669EB
                                                                                      SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                                                      SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                                                      SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):259014
                                                                                      Entropy (8bit):6.075222655669795
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                                                      MD5:B4FDE05A19346072C713BE2926AF8961
                                                                                      SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                                                      SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                                                      SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):64724
                                                                                      Entropy (8bit):5.910307743399971
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                                                      MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                                                      SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                                                      SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                                                      SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):92019
                                                                                      Entropy (8bit):5.974787373427489
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                                                      MD5:CC7DAD980DD04E0387795741D809CBF7
                                                                                      SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                                                      SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                                                      SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):165739
                                                                                      Entropy (8bit):6.062324507479428
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                                                      MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                                                      SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                                                      SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                                                      SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):101544
                                                                                      Entropy (8bit):6.237382830377451
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                                                      MD5:E13FCD8FB16E483E4DE47A036687D904
                                                                                      SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                                                      SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                                                      SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):291245
                                                                                      Entropy (8bit):6.234245376773595
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                                                      MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                                                      SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                                                      SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                                                      SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):706136
                                                                                      Entropy (8bit):6.517672165992715
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                                                      MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                                                      SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                                                      SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                                                      SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):248781
                                                                                      Entropy (8bit):6.474165596279956
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                                                      MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                                                      SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                                                      SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                                                      SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):248694
                                                                                      Entropy (8bit):6.346971642353424
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                                                      MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                                                      SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                                                      SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                                                      SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):30994
                                                                                      Entropy (8bit):5.666281517516177
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                                                      MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                                                      SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                                                      SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                                                      SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):448557
                                                                                      Entropy (8bit):6.353356595345232
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                                                      MD5:908111F583B7019D2ED3492435E5092D
                                                                                      SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                                                      SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                                                      SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):65181
                                                                                      Entropy (8bit):6.085572761520829
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                                                      MD5:98A49CC8AE2D608C6E377E95833C569B
                                                                                      SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                                                      SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                                                      SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:modified
                                                                                      Size (bytes):2693120
                                                                                      Entropy (8bit):6.695095780173695
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:Pptomms1bkUO1T1WaQlFvdeBc4JYj9qU0RaWicavWPWBMf+I5u1G0xiwgEZdplLE:PptomB8jWa+vqQVMmwz/U/3pUD
                                                                                      MD5:B9DE5388BAC9E856A1796FC2144A647B
                                                                                      SHA1:714EDCB8600CBE88F860243F7D76499B5048679D
                                                                                      SHA-256:93EB6E26B9926C93B453F32F6876092DF1D894D0737B80AF40E30AE811C1D372
                                                                                      SHA-512:7A9ACC0193A5ABB09BF3E36A1AFBA264E0C6A48472F4A816D8184A04859182D100F96DA1C9F1DC25B77461216845AA3919AE0138BC684B6B1EADD2B5F6503658
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 29%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p..L.................."..........."......."...@...........................)......g).......................................".......#.X............................................................................."............................._hreg_4...".......".................`..._ireg_4..+...."..,....".............@..@_jreg_4.......#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):720373
                                                                                      Entropy (8bit):6.507163580808883
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjUR3FDExyFw:nu7eEYCP8trP837szHUA60SLtcV3E9Os
                                                                                      MD5:9BBF3D955901E498AC6A52A55E6A028C
                                                                                      SHA1:129835948E8072663BBED0C0D93BD0D458FB1486
                                                                                      SHA-256:8D8D1FDDBDCD7B608678AF04FA1673B1DFC8C40E788AB14A8A2D15F86EAD3167
                                                                                      SHA-512:40C35E8B0D372C1CE15C7B67002EAC197ED0982F999B78137D1C7DFF00B21859FAA288AC7BE6812AC956308EA90191FE5710855B7E6A4605795FAEF814E427F8
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:InnoSetup Log Sigma Video Converter, version 0x30, 5917 bytes, 579569\user, "C:\Users\user\AppData\Local\Sigma Video Converter"
                                                                                      Category:dropped
                                                                                      Size (bytes):5917
                                                                                      Entropy (8bit):4.850699034324617
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:H2WjT8mvpPU5Q9e+eOIhLsQryZWAqaZIPFskwotaiL9lCuJ3TnhG/UhNp:H2WjTfpPU2HIh/Amp
                                                                                      MD5:F5A9355321869B1519E6A77A68F9E1CD
                                                                                      SHA1:FD89E850F3B7E23A089D2AB12799A04180A8D697
                                                                                      SHA-256:819A70A256CF8A57E5442545D5A6CB09F32396263CFA50E8536DD9E42A3AFCB8
                                                                                      SHA-512:18639765D4F42CFD5098CD83BB306691698D164BAF85226A8B1CAA1D09ADF6BF5453CA69573254B92311312C3B73EC85BBEA03F23FDA340D397924764D498AFD
                                                                                      Malicious:false
                                                                                      Preview:Inno Setup Uninstall Log (b)....................................Sigma Video Converter...........................................................................................................Sigma Video Converter...........................................................................................................0...".......%.................................................................................................................;.........)..q......R....579569.user2C:\Users\user\AppData\Local\Sigma Video Converter.................. ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):720373
                                                                                      Entropy (8bit):6.507163580808883
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjUR3FDExyFw:nu7eEYCP8trP837szHUA60SLtcV3E9Os
                                                                                      MD5:9BBF3D955901E498AC6A52A55E6A028C
                                                                                      SHA1:129835948E8072663BBED0C0D93BD0D458FB1486
                                                                                      SHA-256:8D8D1FDDBDCD7B608678AF04FA1673B1DFC8C40E788AB14A8A2D15F86EAD3167
                                                                                      SHA-512:40C35E8B0D372C1CE15C7B67002EAC197ED0982F999B78137D1C7DFF00B21859FAA288AC7BE6812AC956308EA90191FE5710855B7E6A4605795FAEF814E427F8
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):98626
                                                                                      Entropy (8bit):6.478068795827396
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                                                      MD5:70CA53E8B46464CCF956D157501D367A
                                                                                      SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                                                      SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                                                      SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):4096
                                                                                      Entropy (8bit):4.026670007889822
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                                                      MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                                                      SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                                                      SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                                                      SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2560
                                                                                      Entropy (8bit):2.8818118453929262
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                      MD5:A69559718AB506675E907FE49DEB71E9
                                                                                      SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                      SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                      SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):6144
                                                                                      Entropy (8bit):4.215994423157539
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                                      MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                                      SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                                      SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                                      SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):23312
                                                                                      Entropy (8bit):4.596242908851566
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                      MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                      SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                      SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                      SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\iv2Mm5SEJF.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):709120
                                                                                      Entropy (8bit):6.498763989155373
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:thu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjUR3FDExyF:Pu7eEYCP8trP837szHUA60SLtcV3E9OT
                                                                                      MD5:5F86C3F8C6F55F23DA9D2522C64722B8
                                                                                      SHA1:637C7AC403AFE1AF6C0D770D13495F9CE3C780D8
                                                                                      SHA-256:6E5678B9291D9ECD5808B871783A4012D158D4AF9C7E85290E2BE90A88B0641B
                                                                                      SHA-512:AF184BF2628C75989CF10FF525DBBFD9234C005019A258ED42743AEE7646B325D828D3B7B77BF5E8070395711D1F6EB3187CDA6A02FFFEBBE69C4785D0E08FF6
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):7.998406293543246
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) a (10002005/4) 98.86%
                                                                                      • Inno Setup installer (109748/4) 1.08%
                                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                      File name:iv2Mm5SEJF.exe
                                                                                      File size:4'158'899 bytes
                                                                                      MD5:86742847ae7b5c190b6cf54b05415785
                                                                                      SHA1:1a3d5dab7fe553730376639198d29df70805c1c8
                                                                                      SHA256:60af9598845f6017b3d2214685db9ecd2e34068c2e0045347c4569e709539fbd
                                                                                      SHA512:9a1a3f550137f15b5fcde6539531a7688c9fc7e6e6f202ea3971f94d51b93c2576eecad1bd3715eec946600e2cf5a089e8bb8248a614977d33204515e0d5a94b
                                                                                      SSDEEP:98304:NT5X4UN7ixIztGhDdWnvvfkaQn7XQD3fgf2UzcxHtT/NOVnE3dU:PimRyUnHfkaWXS3fgfBgtpOKC
                                                                                      TLSH:F7163336E04AC435E7A9EA718133506CA771BF5A05A8E0B1B4DFC9ABDF675CC401DBA0
                                                                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                      Icon Hash:2d2e3797b32b2b99
                                                                                      Entrypoint:0x409c40
                                                                                      Entrypoint Section:CODE
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:1
                                                                                      OS Version Minor:0
                                                                                      File Version Major:1
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:1
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                                      Instruction
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      add esp, FFFFFFC4h
                                                                                      push ebx
                                                                                      push esi
                                                                                      push edi
                                                                                      xor eax, eax
                                                                                      mov dword ptr [ebp-10h], eax
                                                                                      mov dword ptr [ebp-24h], eax
                                                                                      call 00007FFB4CDD0ECBh
                                                                                      call 00007FFB4CDD20D2h
                                                                                      call 00007FFB4CDD2361h
                                                                                      call 00007FFB4CDD4398h
                                                                                      call 00007FFB4CDD43DFh
                                                                                      call 00007FFB4CDD6D0Eh
                                                                                      call 00007FFB4CDD6E75h
                                                                                      xor eax, eax
                                                                                      push ebp
                                                                                      push 0040A2FCh
                                                                                      push dword ptr fs:[eax]
                                                                                      mov dword ptr fs:[eax], esp
                                                                                      xor edx, edx
                                                                                      push ebp
                                                                                      push 0040A2C5h
                                                                                      push dword ptr fs:[edx]
                                                                                      mov dword ptr fs:[edx], esp
                                                                                      mov eax, dword ptr [0040C014h]
                                                                                      call 00007FFB4CDD78DBh
                                                                                      call 00007FFB4CDD750Eh
                                                                                      lea edx, dword ptr [ebp-10h]
                                                                                      xor eax, eax
                                                                                      call 00007FFB4CDD49C8h
                                                                                      mov edx, dword ptr [ebp-10h]
                                                                                      mov eax, 0040CE24h
                                                                                      call 00007FFB4CDD0F77h
                                                                                      push 00000002h
                                                                                      push 00000000h
                                                                                      push 00000001h
                                                                                      mov ecx, dword ptr [0040CE24h]
                                                                                      mov dl, 01h
                                                                                      mov eax, 0040738Ch
                                                                                      call 00007FFB4CDD5257h
                                                                                      mov dword ptr [0040CE28h], eax
                                                                                      xor edx, edx
                                                                                      push ebp
                                                                                      push 0040A27Dh
                                                                                      push dword ptr fs:[edx]
                                                                                      mov dword ptr fs:[edx], esp
                                                                                      call 00007FFB4CDD794Bh
                                                                                      mov dword ptr [0040CE30h], eax
                                                                                      mov eax, dword ptr [0040CE30h]
                                                                                      cmp dword ptr [eax+0Ch], 01h
                                                                                      jne 00007FFB4CDD7A8Ah
                                                                                      mov eax, dword ptr [0040CE30h]
                                                                                      mov edx, 00000028h
                                                                                      call 00007FFB4CDD5658h
                                                                                      mov edx, dword ptr [00000030h]
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      CODE0x10000x93640x94002c410dfc3efd04d9b69c35c70921424eFalse0.6147856841216216data6.560885192755103IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      DATA0xb0000x24c0x400d5ea23d4ecf110fd2591314cbaa84278False0.310546875data2.7390956346874638IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      BSS0xc0000xe880x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                      .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                      .rsrc0x110000x2c000x2c00cc093ef0a15f59501e8b9430fc651403False0.3230646306818182data4.46274423321994IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                      RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                      RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                      RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                      RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                      RT_STRING0x125740x2f2data0.35543766578249336
                                                                                      RT_STRING0x128680x30cdata0.3871794871794872
                                                                                      RT_STRING0x12b740x2cedata0.42618384401114207
                                                                                      RT_STRING0x12e440x68data0.75
                                                                                      RT_STRING0x12eac0xb4data0.6277777777777778
                                                                                      RT_STRING0x12f600xaedata0.5344827586206896
                                                                                      RT_RCDATA0x130100x2cdata1.1818181818181819
                                                                                      RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                                      RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.2764900662251656
                                                                                      RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                                                      DLLImport
                                                                                      kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                                      user32.dllMessageBoxA
                                                                                      oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                                      kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                                      user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                                      comctl32.dllInitCommonControls
                                                                                      advapi32.dllAdjustTokenPrivileges
                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                      DutchNetherlands
                                                                                      EnglishUnited States
                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                      2024-10-26T06:22:02.586939+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449737185.208.158.20280TCP
                                                                                      2024-10-26T06:22:02.586939+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449737185.208.158.20280TCP
                                                                                      2024-10-26T06:22:05.784765+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449737185.208.158.20280TCP
                                                                                      2024-10-26T06:22:05.784765+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449737185.208.158.20280TCP
                                                                                      2024-10-26T06:22:06.832471+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449758185.208.158.20280TCP
                                                                                      2024-10-26T06:22:06.832471+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449758185.208.158.20280TCP
                                                                                      2024-10-26T06:22:07.854297+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449768185.208.158.20280TCP
                                                                                      2024-10-26T06:22:07.854297+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449768185.208.158.20280TCP
                                                                                      2024-10-26T06:22:08.266464+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449768185.208.158.20280TCP
                                                                                      2024-10-26T06:22:08.266464+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449768185.208.158.20280TCP
                                                                                      2024-10-26T06:22:09.304006+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449774185.208.158.20280TCP
                                                                                      2024-10-26T06:22:09.304006+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449774185.208.158.20280TCP
                                                                                      2024-10-26T06:22:09.718916+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449774185.208.158.20280TCP
                                                                                      2024-10-26T06:22:09.718916+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449774185.208.158.20280TCP
                                                                                      2024-10-26T06:22:10.848561+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449784185.208.158.20280TCP
                                                                                      2024-10-26T06:22:10.848561+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449784185.208.158.20280TCP
                                                                                      2024-10-26T06:22:11.919489+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449790185.208.158.20280TCP
                                                                                      2024-10-26T06:22:11.919489+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449790185.208.158.20280TCP
                                                                                      2024-10-26T06:22:13.086795+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449796185.208.158.20280TCP
                                                                                      2024-10-26T06:22:13.086795+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449796185.208.158.20280TCP
                                                                                      2024-10-26T06:22:13.550725+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449796185.208.158.20280TCP
                                                                                      2024-10-26T06:22:13.550725+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449796185.208.158.20280TCP
                                                                                      2024-10-26T06:22:14.835018+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449807185.208.158.20280TCP
                                                                                      2024-10-26T06:22:14.835018+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449807185.208.158.20280TCP
                                                                                      2024-10-26T06:22:15.374010+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449807185.208.158.20280TCP
                                                                                      2024-10-26T06:22:15.374010+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449807185.208.158.20280TCP
                                                                                      2024-10-26T06:22:16.398791+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449817185.208.158.20280TCP
                                                                                      2024-10-26T06:22:16.398791+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449817185.208.158.20280TCP
                                                                                      2024-10-26T06:22:16.807767+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449817185.208.158.20280TCP
                                                                                      2024-10-26T06:22:16.807767+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449817185.208.158.20280TCP
                                                                                      2024-10-26T06:22:17.218363+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449817185.208.158.20280TCP
                                                                                      2024-10-26T06:22:17.218363+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449817185.208.158.20280TCP
                                                                                      2024-10-26T06:22:18.278055+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449826185.208.158.20280TCP
                                                                                      2024-10-26T06:22:18.278055+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449826185.208.158.20280TCP
                                                                                      2024-10-26T06:22:19.329633+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449833185.208.158.20280TCP
                                                                                      2024-10-26T06:22:19.329633+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449833185.208.158.20280TCP
                                                                                      2024-10-26T06:22:20.372700+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449840185.208.158.20280TCP
                                                                                      2024-10-26T06:22:20.372700+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449840185.208.158.20280TCP
                                                                                      2024-10-26T06:22:21.433012+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449848185.208.158.20280TCP
                                                                                      2024-10-26T06:22:21.433012+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449848185.208.158.20280TCP
                                                                                      2024-10-26T06:22:21.845256+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449848185.208.158.20280TCP
                                                                                      2024-10-26T06:22:21.845256+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449848185.208.158.20280TCP
                                                                                      2024-10-26T06:22:22.893665+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449856185.208.158.20280TCP
                                                                                      2024-10-26T06:22:22.893665+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449856185.208.158.20280TCP
                                                                                      2024-10-26T06:22:24.009156+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449863185.208.158.20280TCP
                                                                                      2024-10-26T06:22:24.009156+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449863185.208.158.20280TCP
                                                                                      2024-10-26T06:22:24.455305+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449863185.208.158.20280TCP
                                                                                      2024-10-26T06:22:24.455305+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449863185.208.158.20280TCP
                                                                                      2024-10-26T06:22:25.479213+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449872185.208.158.20280TCP
                                                                                      2024-10-26T06:22:25.479213+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449872185.208.158.20280TCP
                                                                                      2024-10-26T06:22:25.888300+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449872185.208.158.20280TCP
                                                                                      2024-10-26T06:22:25.888300+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449872185.208.158.20280TCP
                                                                                      2024-10-26T06:22:26.954438+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449883185.208.158.20280TCP
                                                                                      2024-10-26T06:22:26.954438+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449883185.208.158.20280TCP
                                                                                      2024-10-26T06:22:28.028701+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449889185.208.158.20280TCP
                                                                                      2024-10-26T06:22:28.028701+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449889185.208.158.20280TCP
                                                                                      2024-10-26T06:22:29.080487+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449895185.208.158.20280TCP
                                                                                      2024-10-26T06:22:29.080487+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449895185.208.158.20280TCP
                                                                                      2024-10-26T06:22:30.138462+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449903185.208.158.20280TCP
                                                                                      2024-10-26T06:22:30.138462+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449903185.208.158.20280TCP
                                                                                      2024-10-26T06:22:31.189646+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449908185.208.158.20280TCP
                                                                                      2024-10-26T06:22:31.189646+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449908185.208.158.20280TCP
                                                                                      2024-10-26T06:22:32.242129+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449914185.208.158.20280TCP
                                                                                      2024-10-26T06:22:32.242129+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449914185.208.158.20280TCP
                                                                                      2024-10-26T06:22:34.298252+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449922185.208.158.20280TCP
                                                                                      2024-10-26T06:22:34.298252+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449922185.208.158.20280TCP
                                                                                      2024-10-26T06:22:35.326407+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449935185.208.158.20280TCP
                                                                                      2024-10-26T06:22:35.326407+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449935185.208.158.20280TCP
                                                                                      2024-10-26T06:22:36.386449+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449941185.208.158.20280TCP
                                                                                      2024-10-26T06:22:36.386449+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449941185.208.158.20280TCP
                                                                                      2024-10-26T06:22:36.805851+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449941185.208.158.20280TCP
                                                                                      2024-10-26T06:22:36.805851+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449941185.208.158.20280TCP
                                                                                      2024-10-26T06:22:37.232262+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449941185.208.158.20280TCP
                                                                                      2024-10-26T06:22:37.232262+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449941185.208.158.20280TCP
                                                                                      2024-10-26T06:22:38.288920+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449953185.208.158.20280TCP
                                                                                      2024-10-26T06:22:38.288920+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449953185.208.158.20280TCP
                                                                                      2024-10-26T06:22:38.707360+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449953185.208.158.20280TCP
                                                                                      2024-10-26T06:22:38.707360+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449953185.208.158.20280TCP
                                                                                      2024-10-26T06:22:39.738961+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449963185.208.158.20280TCP
                                                                                      2024-10-26T06:22:39.738961+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449963185.208.158.20280TCP
                                                                                      2024-10-26T06:22:40.777587+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449969185.208.158.20280TCP
                                                                                      2024-10-26T06:22:40.777587+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449969185.208.158.20280TCP
                                                                                      2024-10-26T06:22:41.191875+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449969185.208.158.20280TCP
                                                                                      2024-10-26T06:22:41.191875+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449969185.208.158.20280TCP
                                                                                      2024-10-26T06:22:42.211510+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449977185.208.158.20280TCP
                                                                                      2024-10-26T06:22:42.211510+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449977185.208.158.20280TCP
                                                                                      2024-10-26T06:22:43.237307+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449984185.208.158.20280TCP
                                                                                      2024-10-26T06:22:43.237307+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449984185.208.158.20280TCP
                                                                                      2024-10-26T06:22:44.266869+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449992185.208.158.20280TCP
                                                                                      2024-10-26T06:22:44.266869+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449992185.208.158.20280TCP
                                                                                      2024-10-26T06:22:45.357771+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449998185.208.158.20280TCP
                                                                                      2024-10-26T06:22:45.357771+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449998185.208.158.20280TCP
                                                                                      2024-10-26T06:22:46.503129+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450003185.208.158.20280TCP
                                                                                      2024-10-26T06:22:46.503129+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450003185.208.158.20280TCP
                                                                                      2024-10-26T06:22:47.554516+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450010185.208.158.20280TCP
                                                                                      2024-10-26T06:22:47.554516+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450010185.208.158.20280TCP
                                                                                      2024-10-26T06:22:47.974698+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450010185.208.158.20280TCP
                                                                                      2024-10-26T06:22:47.974698+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450010185.208.158.20280TCP
                                                                                      2024-10-26T06:22:49.027783+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450019185.208.158.20280TCP
                                                                                      2024-10-26T06:22:49.027783+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450019185.208.158.20280TCP
                                                                                      2024-10-26T06:22:50.070614+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450027185.208.158.20280TCP
                                                                                      2024-10-26T06:22:50.070614+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450027185.208.158.20280TCP
                                                                                      2024-10-26T06:22:50.485528+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450027185.208.158.20280TCP
                                                                                      2024-10-26T06:22:50.485528+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450027185.208.158.20280TCP
                                                                                      2024-10-26T06:22:51.539932+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450036185.208.158.20280TCP
                                                                                      2024-10-26T06:22:51.539932+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450036185.208.158.20280TCP
                                                                                      2024-10-26T06:22:51.956350+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450036185.208.158.20280TCP
                                                                                      2024-10-26T06:22:51.956350+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450036185.208.158.20280TCP
                                                                                      2024-10-26T06:22:53.018488+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450041185.208.158.20280TCP
                                                                                      2024-10-26T06:22:53.018488+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450041185.208.158.20280TCP
                                                                                      2024-10-26T06:22:54.058079+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450042185.208.158.20280TCP
                                                                                      2024-10-26T06:22:54.058079+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450042185.208.158.20280TCP
                                                                                      2024-10-26T06:22:54.476598+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450042185.208.158.20280TCP
                                                                                      2024-10-26T06:22:54.476598+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450042185.208.158.20280TCP
                                                                                      2024-10-26T06:22:54.892274+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450042185.208.158.20280TCP
                                                                                      2024-10-26T06:22:54.892274+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450042185.208.158.20280TCP
                                                                                      2024-10-26T06:22:56.128532+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450043185.208.158.20280TCP
                                                                                      2024-10-26T06:22:56.128532+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450043185.208.158.20280TCP
                                                                                      2024-10-26T06:22:57.173148+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450044185.208.158.20280TCP
                                                                                      2024-10-26T06:22:57.173148+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450044185.208.158.20280TCP
                                                                                      2024-10-26T06:22:58.208831+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450045185.208.158.20280TCP
                                                                                      2024-10-26T06:22:58.208831+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450045185.208.158.20280TCP
                                                                                      2024-10-26T06:22:59.271765+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450046185.208.158.20280TCP
                                                                                      2024-10-26T06:22:59.271765+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450046185.208.158.20280TCP
                                                                                      2024-10-26T06:23:00.300111+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450047185.208.158.20280TCP
                                                                                      2024-10-26T06:23:00.300111+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450047185.208.158.20280TCP
                                                                                      2024-10-26T06:23:01.345599+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450048185.208.158.20280TCP
                                                                                      2024-10-26T06:23:01.345599+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450048185.208.158.20280TCP
                                                                                      2024-10-26T06:23:02.378782+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450049185.208.158.20280TCP
                                                                                      2024-10-26T06:23:02.378782+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450049185.208.158.20280TCP
                                                                                      2024-10-26T06:23:03.421035+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450050185.208.158.20280TCP
                                                                                      2024-10-26T06:23:03.421035+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450050185.208.158.20280TCP
                                                                                      2024-10-26T06:23:04.851079+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450051185.208.158.20280TCP
                                                                                      2024-10-26T06:23:04.851079+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450051185.208.158.20280TCP
                                                                                      2024-10-26T06:23:06.095835+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450052185.208.158.20280TCP
                                                                                      2024-10-26T06:23:06.095835+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450052185.208.158.20280TCP
                                                                                      2024-10-26T06:23:07.154947+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450053185.208.158.20280TCP
                                                                                      2024-10-26T06:23:07.154947+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450053185.208.158.20280TCP
                                                                                      2024-10-26T06:23:08.239423+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450054185.208.158.20280TCP
                                                                                      2024-10-26T06:23:08.239423+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450054185.208.158.20280TCP
                                                                                      2024-10-26T06:23:09.271355+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450055185.208.158.20280TCP
                                                                                      2024-10-26T06:23:09.271355+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450055185.208.158.20280TCP
                                                                                      2024-10-26T06:23:10.312851+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450056185.208.158.20280TCP
                                                                                      2024-10-26T06:23:10.312851+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450056185.208.158.20280TCP
                                                                                      2024-10-26T06:23:11.380540+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450057185.208.158.20280TCP
                                                                                      2024-10-26T06:23:11.380540+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450057185.208.158.20280TCP
                                                                                      2024-10-26T06:23:12.479490+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450058185.208.158.20280TCP
                                                                                      2024-10-26T06:23:12.479490+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450058185.208.158.20280TCP
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Oct 26, 2024 06:22:01.676986933 CEST4973780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:01.682504892 CEST8049737185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:01.682575941 CEST4973780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:01.684042931 CEST4973780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:01.689599991 CEST8049737185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:02.586744070 CEST8049737185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:02.586785078 CEST8049737185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:02.586939096 CEST4973780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:02.589108944 CEST4973780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:02.589111090 CEST497432023192.168.2.489.105.201.183
                                                                                      Oct 26, 2024 06:22:02.594760895 CEST20234974389.105.201.183192.168.2.4
                                                                                      Oct 26, 2024 06:22:02.594993114 CEST497432023192.168.2.489.105.201.183
                                                                                      Oct 26, 2024 06:22:02.594993114 CEST497432023192.168.2.489.105.201.183
                                                                                      Oct 26, 2024 06:22:02.600559950 CEST20234974389.105.201.183192.168.2.4
                                                                                      Oct 26, 2024 06:22:02.600625992 CEST497432023192.168.2.489.105.201.183
                                                                                      Oct 26, 2024 06:22:02.605982065 CEST20234974389.105.201.183192.168.2.4
                                                                                      Oct 26, 2024 06:22:03.438884974 CEST20234974389.105.201.183192.168.2.4
                                                                                      Oct 26, 2024 06:22:03.490950108 CEST497432023192.168.2.489.105.201.183
                                                                                      Oct 26, 2024 06:22:05.447707891 CEST4973780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:05.453238964 CEST8049737185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:05.784575939 CEST8049737185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:05.784765005 CEST4973780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:05.901061058 CEST4973780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:05.901468039 CEST4975880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:05.906872034 CEST8049758185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:05.906892061 CEST8049737185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:05.906960011 CEST4973780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:05.906974077 CEST4975880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:05.907145977 CEST4975880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:05.912688017 CEST8049758185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:06.832285881 CEST8049758185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:06.832470894 CEST4975880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:06.833329916 CEST497632023192.168.2.489.105.201.183
                                                                                      Oct 26, 2024 06:22:06.838728905 CEST20234976389.105.201.183192.168.2.4
                                                                                      Oct 26, 2024 06:22:06.838835001 CEST497632023192.168.2.489.105.201.183
                                                                                      Oct 26, 2024 06:22:06.838835001 CEST497632023192.168.2.489.105.201.183
                                                                                      Oct 26, 2024 06:22:06.838885069 CEST497632023192.168.2.489.105.201.183
                                                                                      Oct 26, 2024 06:22:06.844227076 CEST20234976389.105.201.183192.168.2.4
                                                                                      Oct 26, 2024 06:22:06.885062933 CEST20234976389.105.201.183192.168.2.4
                                                                                      Oct 26, 2024 06:22:06.947818995 CEST4975880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:06.948033094 CEST4976880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:06.953370094 CEST8049768185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:06.953444958 CEST4976880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:06.953577995 CEST4976880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:06.953697920 CEST8049758185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:06.953762054 CEST4975880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:06.959455013 CEST8049768185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:07.525573015 CEST20234976389.105.201.183192.168.2.4
                                                                                      Oct 26, 2024 06:22:07.525773048 CEST497632023192.168.2.489.105.201.183
                                                                                      Oct 26, 2024 06:22:07.854096889 CEST8049768185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:07.854296923 CEST4976880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:07.962841034 CEST4976880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:07.968278885 CEST8049768185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:08.266379118 CEST8049768185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:08.266463995 CEST4976880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:08.385334969 CEST4976880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:08.385502100 CEST4977480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:08.391336918 CEST8049774185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:08.391427040 CEST4977480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:08.391536951 CEST4977480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:08.391731977 CEST8049768185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:08.391920090 CEST4976880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:08.397073030 CEST8049774185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:09.303906918 CEST8049774185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:09.304006100 CEST4977480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:09.416197062 CEST4977480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:09.421802998 CEST8049774185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:09.718842983 CEST8049774185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:09.718915939 CEST4977480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:09.838016033 CEST4977480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:09.838310003 CEST4978480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:09.843589067 CEST8049774185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:09.843605995 CEST8049784185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:09.843648911 CEST4977480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:09.843678951 CEST4978480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:09.843822002 CEST4978480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:09.849148989 CEST8049784185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:10.848453999 CEST8049784185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:10.848561049 CEST4978480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:10.964050055 CEST4978480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:10.964392900 CEST4979080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:10.969727993 CEST8049790185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:10.969809055 CEST4979080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:10.969830990 CEST8049784185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:10.969904900 CEST4978480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:10.970061064 CEST4979080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:10.975286007 CEST8049790185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:11.919406891 CEST8049790185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:11.919488907 CEST4979080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:12.043035984 CEST4979080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:12.043435097 CEST4979680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:12.048650980 CEST8049790185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:12.048722982 CEST8049796185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:12.048727989 CEST4979080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:12.048823118 CEST4979680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:12.049022913 CEST4979680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:12.054294109 CEST8049796185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:13.086724043 CEST8049796185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:13.086795092 CEST4979680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:13.197150946 CEST4979680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:13.202511072 CEST8049796185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:13.550623894 CEST8049796185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:13.550724983 CEST4979680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:13.666125059 CEST4979680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:13.666518927 CEST4980780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:13.673199892 CEST8049807185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:13.673368931 CEST8049796185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:13.673454046 CEST4979680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:13.673590899 CEST4980780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:13.673722029 CEST4980780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:13.679388046 CEST8049807185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:14.834831953 CEST8049807185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:14.835017920 CEST4980780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:14.949512005 CEST4980780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:14.954869032 CEST8049807185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:15.373816967 CEST8049807185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:15.374010086 CEST4980780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:15.496167898 CEST4980780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:15.496488094 CEST4981780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:15.501833916 CEST8049817185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:15.501858950 CEST8049807185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:15.501938105 CEST4981780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:15.502095938 CEST4981780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:15.502110958 CEST4980780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:15.507400990 CEST8049817185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:16.398680925 CEST8049817185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:16.398791075 CEST4981780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:16.511575937 CEST4981780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:16.520570040 CEST8049817185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:16.807564974 CEST8049817185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:16.807766914 CEST4981780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:16.918241024 CEST4981780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:16.923711061 CEST8049817185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:17.218292952 CEST8049817185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:17.218363047 CEST4981780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:17.342609882 CEST4981780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:17.343164921 CEST4982680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:17.348553896 CEST8049826185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:17.348788023 CEST4982680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:17.348887920 CEST4982680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:17.349351883 CEST8049817185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:17.349431038 CEST4981780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:17.354265928 CEST8049826185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:18.277812004 CEST8049826185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:18.278054953 CEST4982680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:18.402918100 CEST4982680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:18.403244972 CEST4983380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:18.409912109 CEST8049833185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:18.409930944 CEST8049826185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:18.410007954 CEST4983380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:18.410186052 CEST4982680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:18.410339117 CEST4983380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:18.415680885 CEST8049833185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:19.329443932 CEST8049833185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:19.329632998 CEST4983380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:19.447540998 CEST4983380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:19.447805882 CEST4984080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:19.453151941 CEST8049840185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:19.453186989 CEST8049833185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:19.453227043 CEST4984080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:19.453274965 CEST4983380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:19.453459978 CEST4984080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:19.458784103 CEST8049840185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:20.372505903 CEST8049840185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:20.372699976 CEST4984080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:20.495289087 CEST4984080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:20.495629072 CEST4984880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:20.501054049 CEST8049840185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:20.501086950 CEST8049848185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:20.501120090 CEST4984080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:20.501147985 CEST4984880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:20.516755104 CEST4984880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:20.522205114 CEST8049848185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:21.432826996 CEST8049848185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:21.433012009 CEST4984880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:21.541331053 CEST4984880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:21.546869040 CEST8049848185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:21.845058918 CEST8049848185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:21.845256090 CEST4984880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:21.963563919 CEST4984880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:21.963835001 CEST4985680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:21.969197989 CEST8049856185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:21.969252110 CEST8049848185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:21.969299078 CEST4985680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:21.969332933 CEST4984880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:21.969386101 CEST4985680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:21.976305008 CEST8049856185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:22.893492937 CEST8049856185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:22.893665075 CEST4985680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:23.017591953 CEST4985680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:23.017936945 CEST4986380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:23.023329020 CEST8049863185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:23.023399115 CEST8049856185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:23.023430109 CEST4986380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:23.023592949 CEST4985680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:23.024281979 CEST4986380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:23.029778957 CEST8049863185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:24.008821964 CEST8049863185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:24.009155989 CEST4986380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:24.119143963 CEST4986380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:24.124744892 CEST8049863185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:24.455231905 CEST8049863185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:24.455305099 CEST4986380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:24.572334051 CEST4986380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:24.572658062 CEST4987280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:24.577928066 CEST8049872185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:24.577996016 CEST4987280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:24.578145027 CEST4987280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:24.578290939 CEST8049863185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:24.578356981 CEST4986380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:24.583362103 CEST8049872185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:25.479165077 CEST8049872185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:25.479212999 CEST4987280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:25.588757038 CEST4987280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:25.594090939 CEST8049872185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:25.888252974 CEST8049872185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:25.888299942 CEST4987280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:26.010092020 CEST4987280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:26.010379076 CEST4988380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:26.018603086 CEST8049883185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:26.018681049 CEST4988380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:26.018743992 CEST8049872185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:26.018790007 CEST4987280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:26.018831015 CEST4988380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:26.027837992 CEST8049883185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:26.954206944 CEST8049883185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:26.954437971 CEST4988380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:27.072071075 CEST4988380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:27.072293997 CEST4988980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:27.077935934 CEST8049883185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:27.078072071 CEST8049889185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:27.078136921 CEST4988380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:27.078157902 CEST4988980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:27.078262091 CEST4988980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:27.083549976 CEST8049889185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:28.028301954 CEST8049889185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:28.028701067 CEST4988980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:28.159234047 CEST4988980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:28.159462929 CEST4989580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:28.165479898 CEST8049895185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:28.165642023 CEST8049889185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:28.165735960 CEST4988980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:28.168638945 CEST4989580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:28.168992996 CEST4989580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:28.174360991 CEST8049895185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:29.080418110 CEST8049895185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:29.080487013 CEST4989580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:29.202289104 CEST4989580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:29.202543974 CEST4990380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:29.207830906 CEST8049903185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:29.207921982 CEST4990380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:29.207950115 CEST8049895185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:29.208008051 CEST4989580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:29.208148956 CEST4990380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:29.213376045 CEST8049903185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:30.138355970 CEST8049903185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:30.138462067 CEST4990380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:30.259644032 CEST4990380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:30.259918928 CEST4990880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:30.269160986 CEST8049908185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:30.269200087 CEST8049903185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:30.269251108 CEST4990880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:30.269284964 CEST4990380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:30.269556999 CEST4990880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:30.274902105 CEST8049908185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:31.188438892 CEST8049908185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:31.189646006 CEST4990880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:31.306617975 CEST4990880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:31.306894064 CEST4991480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:31.312264919 CEST8049914185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:31.312377930 CEST4991480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:31.312484980 CEST8049908185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:31.312486887 CEST4991480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:31.312578917 CEST4990880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:31.317770004 CEST8049914185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:32.242042065 CEST8049914185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:32.242129087 CEST4991480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:32.354856014 CEST4991480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:32.355390072 CEST4992280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:32.360369921 CEST8049914185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:32.360421896 CEST4991480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:32.360837936 CEST8049922185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:32.360917091 CEST4992280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:32.361310005 CEST4992280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:32.366554022 CEST8049922185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:34.298100948 CEST8049922185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:34.298252106 CEST4992280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:34.416246891 CEST4992280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:34.416503906 CEST4993580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:34.421833038 CEST8049935185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:34.421907902 CEST4993580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:34.422002077 CEST8049922185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:34.422080994 CEST4992280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:34.422107935 CEST4993580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:34.427407980 CEST8049935185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:35.326349974 CEST8049935185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:35.326406956 CEST4993580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:35.447740078 CEST4993580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:35.448174953 CEST4994180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:35.453692913 CEST8049941185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:35.453743935 CEST8049935185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:35.453799009 CEST4994180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:35.453814030 CEST4993580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:35.454125881 CEST4994180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:35.459418058 CEST8049941185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:36.386380911 CEST8049941185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:36.386449099 CEST4994180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:36.494152069 CEST4994180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:36.499592066 CEST8049941185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:36.805757999 CEST8049941185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:36.805850983 CEST4994180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:36.916338921 CEST4994180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:36.921768904 CEST8049941185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:37.232139111 CEST8049941185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:37.232261896 CEST4994180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:37.353435040 CEST4994180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:37.353661060 CEST4995380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:37.359041929 CEST8049953185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:37.359148979 CEST4995380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:37.359261990 CEST4995380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:37.359262943 CEST8049941185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:37.359340906 CEST4994180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:37.365457058 CEST8049953185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:38.287075996 CEST8049953185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:38.288919926 CEST4995380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:38.400460005 CEST4995380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:38.405915976 CEST8049953185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:38.707184076 CEST8049953185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:38.707360029 CEST4995380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:38.826823950 CEST4995380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:38.827092886 CEST4996380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:38.833331108 CEST8049963185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:38.833367109 CEST8049953185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:38.833518982 CEST4995380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:38.833689928 CEST4996380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:38.833690882 CEST4996380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:38.839144945 CEST8049963185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:39.738761902 CEST8049963185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:39.738960981 CEST4996380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:39.853827000 CEST4996380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:39.854078054 CEST4996980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:39.859498978 CEST8049969185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:39.859591007 CEST4996980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:39.859674931 CEST4996980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:39.859711885 CEST8049963185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:39.859783888 CEST4996380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:39.865170002 CEST8049969185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:40.777482033 CEST8049969185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:40.777586937 CEST4996980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:40.884742022 CEST4996980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:40.890445948 CEST8049969185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:41.191807985 CEST8049969185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:41.191874981 CEST4996980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:41.306840897 CEST4996980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:41.307104111 CEST4997780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:41.312462091 CEST8049977185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:41.312566996 CEST4997780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:41.312611103 CEST8049969185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:41.312673092 CEST4996980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:41.312768936 CEST4997780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:41.318111897 CEST8049977185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:42.211458921 CEST8049977185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:42.211509943 CEST4997780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:42.322185993 CEST4997780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:42.322458982 CEST4998480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:42.327841997 CEST8049984185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:42.327909946 CEST4998480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:42.328027964 CEST4998480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:42.328109980 CEST8049977185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:42.328157902 CEST4997780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:42.333329916 CEST8049984185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:43.237243891 CEST8049984185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:43.237307072 CEST4998480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:43.353775978 CEST4998480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:43.354079008 CEST4999280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:43.359436989 CEST8049984185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:43.359479904 CEST8049992185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:43.359503984 CEST4998480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:43.359556913 CEST4999280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:43.359675884 CEST4999280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:43.365025043 CEST8049992185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:44.266782045 CEST8049992185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:44.266869068 CEST4999280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:44.385273933 CEST4999280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:44.385540009 CEST4999880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:44.390924931 CEST8049998185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:44.391010046 CEST4999880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:44.391154051 CEST4999880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:44.391239882 CEST8049992185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:44.391300917 CEST4999280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:44.396424055 CEST8049998185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:45.357692003 CEST8049998185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:45.357770920 CEST4999880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:45.478440046 CEST4999880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:45.478792906 CEST5000380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:45.484055042 CEST8049998185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:45.484112024 CEST4999880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:45.484193087 CEST8050003185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:45.484261036 CEST5000380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:45.484407902 CEST5000380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:45.489705086 CEST8050003185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:46.503058910 CEST8050003185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:46.503129005 CEST5000380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:46.619149923 CEST5000380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:46.619416952 CEST5001080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:46.624804974 CEST8050010185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:46.624842882 CEST8050003185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:46.624897003 CEST5001080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:46.624917030 CEST5000380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:46.625066996 CEST5001080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:46.633553982 CEST8050010185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:47.554445028 CEST8050010185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:47.554516077 CEST5001080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:47.666462898 CEST5001080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:47.671941042 CEST8050010185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:47.974164963 CEST8050010185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:47.974698067 CEST5001080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:48.088176966 CEST5001080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:48.088457108 CEST5001980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:48.094608068 CEST8050010185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:48.094645023 CEST8050019185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:48.094711065 CEST5001080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:48.094741106 CEST5001980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:48.094882011 CEST5001980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:48.100447893 CEST8050019185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:49.027659893 CEST8050019185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:49.027782917 CEST5001980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:49.151398897 CEST5001980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:49.156151056 CEST5002780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:49.157269955 CEST8050019185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:49.157352924 CEST5001980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:49.161509037 CEST8050027185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:49.161714077 CEST5002780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:49.161899090 CEST5002780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:49.167228937 CEST8050027185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:50.070523024 CEST8050027185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:50.070614100 CEST5002780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:50.181907892 CEST5002780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:50.187366009 CEST8050027185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:50.485447884 CEST8050027185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:50.485527992 CEST5002780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:50.606796026 CEST5002780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:50.607139111 CEST5003680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:50.613779068 CEST8050027185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:50.613852024 CEST5002780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:50.613991976 CEST8050036185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:50.614059925 CEST5003680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:50.615104914 CEST5003680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:50.621817112 CEST8050036185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:51.539819002 CEST8050036185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:51.539932013 CEST5003680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:51.650422096 CEST5003680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:51.656008005 CEST8050036185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:51.956150055 CEST8050036185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:51.956350088 CEST5003680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:52.072412968 CEST5003680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:52.072613955 CEST5004180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:52.078007936 CEST8050041185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:52.078167915 CEST5004180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:52.078247070 CEST5004180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:52.078265905 CEST8050036185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:52.078316927 CEST5003680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:52.083640099 CEST8050041185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:53.018284082 CEST8050041185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:53.018487930 CEST5004180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:53.135065079 CEST5004180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:53.135374069 CEST5004280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:53.140811920 CEST8050042185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:53.140888929 CEST5004280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:53.141006947 CEST5004280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:53.141016960 CEST8050041185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:53.141113043 CEST5004180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:53.146676064 CEST8050042185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:54.057862997 CEST8050042185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:54.058079004 CEST5004280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:54.166246891 CEST5004280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:54.171909094 CEST8050042185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:54.476308107 CEST8050042185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:54.476598024 CEST5004280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:54.588500977 CEST5004280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:54.594000101 CEST8050042185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:54.892062902 CEST8050042185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:54.892273903 CEST5004280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:55.009740114 CEST5004280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:55.010250092 CEST5004380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:55.019428015 CEST8050043185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:55.019665003 CEST5004380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:55.019665003 CEST5004380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:55.019890070 CEST8050042185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:55.020068884 CEST5004280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:55.025248051 CEST8050043185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:56.128150940 CEST8050043185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:56.128531933 CEST5004380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:56.244179964 CEST5004380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:56.244369030 CEST5004480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:56.249861002 CEST8050044185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:56.249953985 CEST5004480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:56.250102043 CEST5004480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:56.250165939 CEST8050043185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:56.250235081 CEST5004380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:56.255498886 CEST8050044185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:57.173080921 CEST8050044185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:57.173147917 CEST5004480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:57.299529076 CEST5004480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:57.299793005 CEST5004580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:57.305219889 CEST8050045185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:57.305339098 CEST5004580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:57.305435896 CEST8050044185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:57.305455923 CEST5004580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:57.305485964 CEST5004480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:57.310789108 CEST8050045185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:58.208597898 CEST8050045185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:58.208831072 CEST5004580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:58.322314978 CEST5004580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:58.322434902 CEST5004680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:58.327790976 CEST8050046185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:58.327883959 CEST5004680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:58.328020096 CEST8050045185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:58.328032970 CEST5004680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:58.328232050 CEST5004580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:58.333333015 CEST8050046185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:59.271605015 CEST8050046185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:59.271764994 CEST5004680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:59.385333061 CEST5004680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:59.385664940 CEST5004780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:59.391164064 CEST8050047185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:59.391197920 CEST8050046185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:22:59.391268969 CEST5004780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:59.391288042 CEST5004680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:59.391448021 CEST5004780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:22:59.396827936 CEST8050047185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:00.299897909 CEST8050047185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:00.300111055 CEST5004780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:00.416531086 CEST5004780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:00.416825056 CEST5004880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:00.422192097 CEST8050048185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:00.422277927 CEST5004880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:00.422288895 CEST8050047185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:00.422370911 CEST5004780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:00.422468901 CEST5004880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:00.427799940 CEST8050048185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:01.345499039 CEST8050048185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:01.345598936 CEST5004880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:01.463447094 CEST5004880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:01.463726997 CEST5004980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:01.470374107 CEST8050048185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:01.470417023 CEST8050049185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:01.470457077 CEST5004880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:01.470504999 CEST5004980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:01.470653057 CEST5004980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:01.477888107 CEST8050049185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:02.374996901 CEST8050049185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:02.378782034 CEST5004980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:02.494591951 CEST5004980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:02.494935989 CEST5005080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:02.500389099 CEST8050050185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:02.500449896 CEST8050049185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:02.500536919 CEST5004980192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:02.500545979 CEST5005080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:02.500677109 CEST5005080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:02.506032944 CEST8050050185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:03.420844078 CEST8050050185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:03.421035051 CEST5005080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:03.541120052 CEST5005080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:03.541459084 CEST5005180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:03.547719002 CEST8050050185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:03.547755003 CEST8050051185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:03.547780991 CEST5005080192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:03.547835112 CEST5005180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:03.547980070 CEST5005180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:03.553749084 CEST8050051185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:04.850812912 CEST8050051185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:04.851078987 CEST5005180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:04.967012882 CEST5005180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:04.967190027 CEST5005280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:04.972539902 CEST8050052185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:04.972615004 CEST5005280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:04.972707033 CEST5005280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:04.972851992 CEST8050051185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:04.973031998 CEST5005180192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:04.978008032 CEST8050052185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:06.095763922 CEST8050052185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:06.095834970 CEST5005280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:06.215153933 CEST5005280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:06.215501070 CEST5005380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:06.220928907 CEST8050052185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:06.220963955 CEST8050053185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:06.220998049 CEST5005280192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:06.221055984 CEST5005380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:06.221188068 CEST5005380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:06.226499081 CEST8050053185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:07.154865026 CEST8050053185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:07.154947042 CEST5005380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:07.276920080 CEST5005380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:07.277098894 CEST5005480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:07.282496929 CEST8050054185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:07.282560110 CEST5005480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:07.282666922 CEST5005480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:07.282668114 CEST8050053185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:07.282880068 CEST5005380192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:07.288463116 CEST8050054185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:08.239340067 CEST8050054185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:08.239423037 CEST5005480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:08.357335091 CEST5005480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:08.357767105 CEST5005580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:08.365380049 CEST8050054185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:08.365416050 CEST8050055185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:08.365464926 CEST5005480192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:08.365498066 CEST5005580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:08.365833998 CEST5005580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:08.371185064 CEST8050055185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:09.270850897 CEST8050055185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:09.271354914 CEST5005580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:09.402523994 CEST5005580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:09.404803038 CEST5005680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:09.408536911 CEST8050055185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:09.409014940 CEST5005580192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:09.410352945 CEST8050056185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:09.410476923 CEST5005680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:09.410634995 CEST5005680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:09.415957928 CEST8050056185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:10.312784910 CEST8050056185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:10.312850952 CEST5005680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:10.460755110 CEST5005680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:10.461035013 CEST5005780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:10.466427088 CEST8050057185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:10.466509104 CEST5005780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:10.466598988 CEST8050056185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:10.466656923 CEST5005680192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:10.469002962 CEST5005780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:10.474313974 CEST8050057185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:11.380407095 CEST8050057185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:11.380539894 CEST5005780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:11.496212006 CEST5005780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:11.499090910 CEST5005880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:11.501883984 CEST8050057185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:11.501992941 CEST5005780192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:11.504460096 CEST8050058185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:11.504755020 CEST5005880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:11.504914045 CEST5005880192.168.2.4185.208.158.202
                                                                                      Oct 26, 2024 06:23:11.510221004 CEST8050058185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:12.479396105 CEST8050058185.208.158.202192.168.2.4
                                                                                      Oct 26, 2024 06:23:12.479490042 CEST5005880192.168.2.4185.208.158.202
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Oct 26, 2024 06:22:01.560626984 CEST5386453192.168.2.445.155.250.90
                                                                                      Oct 26, 2024 06:22:01.595557928 CEST535386445.155.250.90192.168.2.4
                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                      Oct 26, 2024 06:22:01.560626984 CEST192.168.2.445.155.250.900x4468Standard query (0)bxxfdpb.comA (IP address)IN (0x0001)false
                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                      Oct 26, 2024 06:22:01.595557928 CEST45.155.250.90192.168.2.40x4468No error (0)bxxfdpb.com185.208.158.202A (IP address)IN (0x0001)false
                                                                                      • bxxfdpb.com
                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.449737185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:01.684042931 CEST318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c444db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf618c1e9909833 HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:02.586744070 CEST1236INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:02 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 34 32 38 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 63 38 31 63 34 35 39 66 65 38 62 64 32 65 39 31 66 31 65 66 35 61 32 35 63 65 39 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 62 37 36 35 62 62 33 37 34 66 30 36 37 62 37 33 32 35 36 63 30 65 30 64 35 30 65 63 61 34 32 63 64 37 64 62 30 31 62 66 64 33 32 38 38 33 38 65 33 31 36 62 38 36 37 63 37 35 61 61 35 65 61 34 65 65 37 35 62 37 66 34 33 65 63 32 66 36 36 39 34 33 64 37 39 38 63 66 66 31 32 64 65 65 64 39 30 39 39 32 35 63 39 36 61 39 63 31 33 64 38 35 30 38 66 32 31 62 30 35 63 61 64 65 62 35 65 33 66 65 66 37 61 64 36 65 33 37 38 62 39 38 61 65 35 64 34 34 61 65 36 33 65 63 32 31 30 33 30 34 33 35 62 32 30 65 62 33 62 37 30 30 65 37 38 62 64 65 36 38 63 66 65 38 36 32 64 35 61 65 37 35 38 37 33 33 66 66 63 32 66 35 63 65 39 66 34 65 31 39 32 66 63 33 66 37 31 61 31 65 64 34 37 39 32 38 66 66 33 37 38 33 39 31 [TRUNCATED]
                                                                                      Data Ascii: 42867b68a8a3203a77b0418f55f677c81c459fe8bd2e91f1ef5a25ce91585bccfb5fbc40ad9088be8de2266e208a6bb9d592deb765bb374f067b73256c0e0d50eca42cd7db01bfd328838e316b867c75aa5ea4ee75b7f43ec2f66943d798cff12deed909925c96a9c13d8508f21b05cadeb5e3fef7ad6e378b98ae5d44ae63ec21030435b20eb3b700e78bde68cfe862d5ae758733ffc2f5ce9f4e192fc3f71a1ed47928ff3783911bd6af199cdb27bd36a03223464ac57c5dca43c30bbc107a609b0bc3bbecfce3074210fd634f512e8cfbf0346cc3d1bce51dbf363962cbe9440a3e2d9b6c13e2aa079b5e9009fa0bc7351a18ef63facfe8c981ee81dfc58834d66cbb5c1fdd34362bf9ced24ae728b113ea228d138dd9405d55cb3361a1d54cec96c5f38586785fc8e2128655117c9dcb7170dffd5b0e3de347f7bec3e82c31b09459db4c10b5246d7747f5b334ee3dadaceeec8539e226d48ff6235862dbcca937f8a5fc1842802096298e99feb1a11a42c8cd2137303dd3cc5f68f0e752b709c341cec59457466864cdab3a2ef31bdd3c7134c8e2fd6435588b8d665d25130b66fea3320b07a845503cea2a3a46ea7c00c9947d2c0ca4ea50eb547f3b3b16293a42baa2f3e0f36d9817918f7a0ce4a6cea2c3e201718df2ea146ad1a8c40d9a1d69548e7488383b0c02b18836863fcef029e065e5c42c [TRUNCATED]
                                                                                      Oct 26, 2024 06:22:02.586785078 CEST36INData Raw: 35 61 31 66 30 31 32 63 39 65 65 37 38 62 35 65 37 65 37 66 66 31 35 32 39 37 35 65 65 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: 5a1f012c9ee78b5e7e7ff152975ee0
                                                                                      Oct 26, 2024 06:22:05.447707891 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:05.784575939 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:05 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.449758185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:05.907145977 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:06.832285881 CEST1128INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:06 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 33 39 38 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 63 38 66 63 66 66 35 31 65 31 39 65 62 62 64 35 35 65 39 30 33 63 61 66 66 38 64 65 37 39 35 38 37 34 64 38 30 34 37 64 31 65 34 64 63 32 61 33 30 61 31 35 32 66 66 64 36 63 64 30 37 32 39 65 39 37 64 35 39 61 64 37 35 66 36 36 63 61 38 33 32 35 33 64 65 66 63 64 33 30 62 64 65 34 31 63 38 37 65 61 65 31 34 66 61 33 39 38 66 32 36 65 34 31 30 61 64 36 30 63 30 34 64 62 39 65 32 35 30 65 66 35 62 37 62 35 64 65 64 32 34 36 32 39 66 33 61 36 37 38 65 66 66 31 61 63 36 65 61 38 62 39 62 33 62 63 35 37 31 39 34 31 30 63 36 35 34 38 35 32 62 62 36 35 39 62 33 65 32 35 65 32 35 65 35 36 35 64 30 66 38 37 38 61 37 38 37 65 39 63 62 34 63 65 37 33 34 63 63 31 36 33 35 35 64 35 31 32 38 65 31 33 62 37 30 30 38 36 34 61 37 65 64 38 62 66 65 39 38 32 66 35 30 65 30 35 36 37 65 32 31 66 65 32 61 35 36 66 36 66 35 65 32 39 32 66 62 33 36 37 32 62 61 65 34 34 65 38 63 38 64 66 64 37 30 32 32 31 [TRUNCATED]
                                                                                      Data Ascii: 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


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      2192.168.2.449768185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:06.953577995 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:07.854096889 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:07 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:07.962841034 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:08.266379118 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:08 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      3192.168.2.449774185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:08.391536951 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:09.303906918 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:09 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:09.416197062 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:09.718842983 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:09 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      4192.168.2.449784185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:09.843822002 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:10.848453999 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:10 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      5192.168.2.449790185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:10.970061064 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:11.919406891 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:11 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      6192.168.2.449796185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:12.049022913 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:13.086724043 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:12 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:13.197150946 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:13.550623894 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:13 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      7192.168.2.449807185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:13.673722029 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:14.834831953 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:14 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:14.949512005 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:15.373816967 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:15 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      8192.168.2.449817185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:15.502095938 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:16.398680925 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:16 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:16.511575937 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:16.807564974 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:16 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:16.918241024 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:17.218292952 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:17 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      9192.168.2.449826185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:17.348887920 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:18.277812004 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:18 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      10192.168.2.449833185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:18.410339117 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:19.329443932 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:19 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      11192.168.2.449840185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:19.453459978 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:20.372505903 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:20 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      12192.168.2.449848185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:20.516755104 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:21.432826996 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:21 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:21.541331053 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:21.845058918 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:21 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      13192.168.2.449856185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:21.969386101 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:22.893492937 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:22 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      14192.168.2.449863185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:23.024281979 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:24.008821964 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:23 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:24.119143963 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:24.455231905 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:24 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      15192.168.2.449872185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:24.578145027 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:25.479165077 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:25 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:25.588757038 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:25.888252974 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:25 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      16192.168.2.449883185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:26.018831015 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:26.954206944 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:26 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      17192.168.2.449889185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:27.078262091 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:28.028301954 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:27 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      18192.168.2.449895185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:28.168992996 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:29.080418110 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:28 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      19192.168.2.449903185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:29.208148956 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:30.138355970 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:30 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      20192.168.2.449908185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:30.269556999 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:31.188438892 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:31 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      21192.168.2.449914185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:31.312486887 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:32.242042065 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:32 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      22192.168.2.449922185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:32.361310005 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:34.298100948 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:34 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      23192.168.2.449935185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:34.422107935 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:35.326349974 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:35 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      24192.168.2.449941185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:35.454125881 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:36.386380911 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:36 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:36.494152069 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:36.805757999 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:36 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:36.916338921 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:37.232139111 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:37 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      25192.168.2.449953185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:37.359261990 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:38.287075996 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:38 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:38.400460005 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:38.707184076 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:38 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      26192.168.2.449963185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:38.833690882 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:39.738761902 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:39 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      27192.168.2.449969185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:39.859674931 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:40.777482033 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:40 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:40.884742022 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:41.191807985 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:41 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      28192.168.2.449977185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:41.312768936 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:42.211458921 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:42 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      29192.168.2.449984185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:42.328027964 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:43.237243891 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:43 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      30192.168.2.449992185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:43.359675884 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:44.266782045 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:44 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      31192.168.2.449998185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:44.391154051 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:45.357692003 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:45 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      32192.168.2.450003185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:45.484407902 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:46.503058910 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:46 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      33192.168.2.450010185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:46.625066996 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:47.554445028 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:47 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:47.666462898 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:47.974164963 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:47 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      34192.168.2.450019185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:48.094882011 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:49.027659893 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:48 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      35192.168.2.450027185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:49.161899090 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:50.070523024 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:49 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:50.181907892 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:50.485447884 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:50 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      36192.168.2.450036185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:50.615104914 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:51.539819002 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:51 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:51.650422096 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:51.956150055 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:51 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      37192.168.2.450041185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:52.078247070 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:53.018284082 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:52 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      38192.168.2.450042185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:53.141006947 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:54.057862997 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:53 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:54.166246891 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:54.476308107 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:54 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20
                                                                                      Oct 26, 2024 06:22:54.588500977 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:54.892062902 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:54 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      39192.168.2.450043185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:55.019665003 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:56.128150940 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:55 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      40192.168.2.450044185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:56.250102043 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:57.173080921 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:57 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      41192.168.2.450045185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:57.305455923 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:58.208597898 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:58 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      42192.168.2.450046185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:58.328032970 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:22:59.271605015 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:22:59 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      43192.168.2.450047185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:22:59.391448021 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:00.299897909 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:00 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      44192.168.2.450048185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:00.422468901 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:01.345499039 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:01 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      45192.168.2.450049185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:01.470653057 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:02.374996901 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:02 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      46192.168.2.450050185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:02.500677109 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:03.420844078 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:03 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      47192.168.2.450051185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:03.547980070 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:04.850812912 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:04 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      48192.168.2.450052185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:04.972707033 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:06.095763922 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:05 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      49192.168.2.450053185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:06.221188068 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:07.154865026 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:07 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      50192.168.2.450054185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:07.282666922 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:08.239340067 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:08 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      51192.168.2.450055185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:08.365833998 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:09.270850897 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:09 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      52192.168.2.450056185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:09.410634995 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:10.312784910 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:10 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      53192.168.2.450057185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:10.469002962 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:11.380407095 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:11 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      54192.168.2.450058185.208.158.202806024C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 26, 2024 06:23:11.504914045 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9c933acb6a941e HTTP/1.1
                                                                                      Host: bxxfdpb.com
                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      Oct 26, 2024 06:23:12.479396105 CEST220INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.20.1
                                                                                      Date: Sat, 26 Oct 2024 04:23:12 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      X-Powered-By: PHP/7.4.33
                                                                                      Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: e67b680813008c20


                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:00:21:05
                                                                                      Start date:26/10/2024
                                                                                      Path:C:\Users\user\Desktop\iv2Mm5SEJF.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\iv2Mm5SEJF.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:4'158'899 bytes
                                                                                      MD5 hash:86742847AE7B5C190B6CF54B05415785
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:low
                                                                                      Has exited:false

                                                                                      Target ID:1
                                                                                      Start time:00:21:05
                                                                                      Start date:26/10/2024
                                                                                      Path:C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\is-ICEJ3.tmp\iv2Mm5SEJF.tmp" /SL5="$20440,3877545,54272,C:\Users\user\Desktop\iv2Mm5SEJF.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:709'120 bytes
                                                                                      MD5 hash:5F86C3F8C6F55F23DA9D2522C64722B8
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Antivirus matches:
                                                                                      • Detection: 3%, ReversingLabs
                                                                                      Reputation:low
                                                                                      Has exited:false

                                                                                      Target ID:2
                                                                                      Start time:00:21:07
                                                                                      Start date:26/10/2024
                                                                                      Path:C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\AppData\Local\Sigma Video Converter\sigmavideoconverter32_64.exe" -i
                                                                                      Imagebase:0x400000
                                                                                      File size:2'693'120 bytes
                                                                                      MD5 hash:B9DE5388BAC9E856A1796FC2144A647B
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2957312058.00000000026DB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Antivirus matches:
                                                                                      • Detection: 29%, ReversingLabs
                                                                                      Reputation:low
                                                                                      Has exited:false

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:21.1%
                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                        Signature Coverage:2.4%
                                                                                        Total number of Nodes:1498
                                                                                        Total number of Limit Nodes:22
                                                                                        execution_graph 4984 409c40 5025 4030dc 4984->5025 4986 409c56 5028 4042e8 4986->5028 4988 409c5b 5031 40457c GetModuleHandleA GetProcAddress 4988->5031 4994 409c6a 5048 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 4994->5048 5011 409d43 5110 4074a0 5011->5110 5013 409d05 5013->5011 5143 409aa0 5013->5143 5014 409d84 5114 407a28 5014->5114 5015 409d69 5015->5014 5016 409aa0 4 API calls 5015->5016 5016->5014 5018 409da9 5124 408b08 5018->5124 5022 409def 5023 408b08 21 API calls 5022->5023 5024 409e28 5022->5024 5023->5022 5153 403094 5025->5153 5027 4030e1 GetModuleHandleA GetCommandLineA 5027->4986 5030 404323 5028->5030 5154 403154 5028->5154 5030->4988 5032 404598 5031->5032 5033 40459f GetProcAddress 5031->5033 5032->5033 5034 4045b5 GetProcAddress 5033->5034 5035 4045ae 5033->5035 5036 4045c4 SetProcessDEPPolicy 5034->5036 5037 4045c8 5034->5037 5035->5034 5036->5037 5038 4065b8 5037->5038 5167 405c98 5038->5167 5047 406604 6F551CD0 5047->4994 5049 4090f7 5048->5049 5294 406fa0 SetErrorMode 5049->5294 5054 403198 4 API calls 5055 40913c 5054->5055 5056 409b30 GetSystemInfo VirtualQuery 5055->5056 5057 409be4 5056->5057 5060 409b5a 5056->5060 5062 409768 5057->5062 5058 409bc5 VirtualQuery 5058->5057 5058->5060 5059 409b84 VirtualProtect 5059->5060 5060->5057 5060->5058 5060->5059 5061 409bb3 VirtualProtect 5060->5061 5061->5058 5304 406bd0 GetCommandLineA 5062->5304 5064 409825 5066 4031b8 4 API calls 5064->5066 5065 406c2c 6 API calls 5069 409785 5065->5069 5067 40983f 5066->5067 5070 406c2c 5067->5070 5068 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5068->5069 5069->5064 5069->5065 5069->5068 5071 406c53 GetModuleFileNameA 5070->5071 5072 406c77 GetCommandLineA 5070->5072 5073 403278 4 API calls 5071->5073 5074 406c7c 5072->5074 5075 406c75 5073->5075 5076 406c81 5074->5076 5077 406af0 4 API calls 5074->5077 5080 406c89 5074->5080 5078 406ca4 5075->5078 5079 403198 4 API calls 5076->5079 5077->5074 5081 403198 4 API calls 5078->5081 5079->5080 5082 40322c 4 API calls 5080->5082 5083 406cb9 5081->5083 5082->5078 5084 4031e8 5083->5084 5085 4031ec 5084->5085 5086 4031fc 5084->5086 5085->5086 5088 403254 4 API calls 5085->5088 5087 403228 5086->5087 5089 4025ac 4 API calls 5086->5089 5090 4074e0 5087->5090 5088->5086 5089->5087 5091 4074ea 5090->5091 5325 407576 5091->5325 5328 407578 5091->5328 5092 407516 5093 40752a 5092->5093 5331 40748c GetLastError 5092->5331 5097 409bec FindResourceA 5093->5097 5098 409c01 5097->5098 5099 409c06 SizeofResource 5097->5099 5100 409aa0 4 API calls 5098->5100 5101 409c13 5099->5101 5102 409c18 LoadResource 5099->5102 5100->5099 5103 409aa0 4 API calls 5101->5103 5104 409c26 5102->5104 5105 409c2b LockResource 5102->5105 5103->5102 5106 409aa0 4 API calls 5104->5106 5107 409c37 5105->5107 5108 409c3c 5105->5108 5106->5105 5109 409aa0 4 API calls 5107->5109 5108->5013 5140 407918 5108->5140 5109->5108 5111 4074b4 5110->5111 5112 4074c4 5111->5112 5113 4073ec 20 API calls 5111->5113 5112->5015 5113->5112 5115 407a35 5114->5115 5116 405880 4 API calls 5115->5116 5117 407a89 5115->5117 5116->5117 5118 407918 InterlockedExchange 5117->5118 5119 407a9b 5118->5119 5120 405880 4 API calls 5119->5120 5121 407ab1 5119->5121 5120->5121 5122 405880 4 API calls 5121->5122 5123 407af4 5121->5123 5122->5123 5123->5018 5128 408b82 5124->5128 5131 408b39 5124->5131 5125 408bcd 5439 407cb8 5125->5439 5127 408be4 5132 4031b8 4 API calls 5127->5132 5128->5125 5130 4034f0 4 API calls 5128->5130 5136 403420 4 API calls 5128->5136 5137 4031e8 4 API calls 5128->5137 5139 407cb8 21 API calls 5128->5139 5130->5128 5131->5128 5133 4031e8 4 API calls 5131->5133 5135 403420 4 API calls 5131->5135 5138 407cb8 21 API calls 5131->5138 5430 4034f0 5131->5430 5134 408bfe 5132->5134 5133->5131 5150 404c10 5134->5150 5135->5131 5136->5128 5137->5128 5138->5131 5139->5128 5465 4078c4 5140->5465 5144 409ac1 5143->5144 5145 409aa9 5143->5145 5146 405880 4 API calls 5144->5146 5147 405880 4 API calls 5145->5147 5148 409ad2 5146->5148 5149 409abb 5147->5149 5148->5011 5149->5011 5151 402594 4 API calls 5150->5151 5152 404c1b 5151->5152 5152->5022 5153->5027 5155 403164 5154->5155 5156 40318c TlsGetValue 5154->5156 5155->5030 5157 403196 5156->5157 5158 40316f 5156->5158 5157->5030 5162 40310c 5158->5162 5160 403174 TlsGetValue 5161 403184 5160->5161 5161->5030 5163 403120 LocalAlloc 5162->5163 5164 403116 5162->5164 5165 40313e TlsSetValue 5163->5165 5166 403132 5163->5166 5164->5163 5165->5166 5166->5160 5239 405930 5167->5239 5170 405270 GetSystemDefaultLCID 5174 4052a6 5170->5174 5171 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5171->5174 5172 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5172->5174 5173 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5173->5174 5174->5171 5174->5172 5174->5173 5175 405308 5174->5175 5176 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5175->5176 5177 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5175->5177 5178 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5175->5178 5179 40538b 5175->5179 5176->5175 5177->5175 5178->5175 5272 4031b8 5179->5272 5182 4053b4 GetSystemDefaultLCID 5276 4051fc GetLocaleInfoA 5182->5276 5185 4031e8 4 API calls 5186 4053f4 5185->5186 5187 4051fc 5 API calls 5186->5187 5188 405409 5187->5188 5189 4051fc 5 API calls 5188->5189 5190 40542d 5189->5190 5282 405248 GetLocaleInfoA 5190->5282 5193 405248 GetLocaleInfoA 5194 40545d 5193->5194 5195 4051fc 5 API calls 5194->5195 5196 405477 5195->5196 5197 405248 GetLocaleInfoA 5196->5197 5198 405494 5197->5198 5199 4051fc 5 API calls 5198->5199 5200 4054ae 5199->5200 5201 4031e8 4 API calls 5200->5201 5202 4054bb 5201->5202 5203 4051fc 5 API calls 5202->5203 5204 4054d0 5203->5204 5205 4031e8 4 API calls 5204->5205 5206 4054dd 5205->5206 5207 405248 GetLocaleInfoA 5206->5207 5208 4054eb 5207->5208 5209 4051fc 5 API calls 5208->5209 5210 405505 5209->5210 5211 4031e8 4 API calls 5210->5211 5212 405512 5211->5212 5213 4051fc 5 API calls 5212->5213 5214 405527 5213->5214 5215 4031e8 4 API calls 5214->5215 5216 405534 5215->5216 5217 4051fc 5 API calls 5216->5217 5218 405549 5217->5218 5219 405566 5218->5219 5220 405557 5218->5220 5222 40322c 4 API calls 5219->5222 5290 40322c 5220->5290 5223 405564 5222->5223 5224 4051fc 5 API calls 5223->5224 5225 405588 5224->5225 5226 4055a5 5225->5226 5227 405596 5225->5227 5228 403198 4 API calls 5226->5228 5229 40322c 4 API calls 5227->5229 5230 4055a3 5228->5230 5229->5230 5284 4033b4 5230->5284 5232 4055c7 5233 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5232->5233 5234 4055e1 5233->5234 5235 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5234->5235 5236 4055fb 5235->5236 5237 405ce4 GetVersionExA 5236->5237 5238 405cfb 5237->5238 5238->5047 5240 40593c 5239->5240 5247 404ccc LoadStringA 5240->5247 5243 4031e8 4 API calls 5244 40596d 5243->5244 5250 403198 5244->5250 5254 403278 5247->5254 5251 4031b7 5250->5251 5252 40319e 5250->5252 5251->5170 5252->5251 5268 4025ac 5252->5268 5259 403254 5254->5259 5256 403288 5257 403198 4 API calls 5256->5257 5258 4032a0 5257->5258 5258->5243 5260 403274 5259->5260 5261 403258 5259->5261 5260->5256 5264 402594 5261->5264 5263 403261 5263->5256 5265 402598 5264->5265 5266 4025a2 5264->5266 5265->5266 5267 403154 4 API calls 5265->5267 5266->5263 5266->5266 5267->5266 5269 4025b0 5268->5269 5270 4025ba 5268->5270 5269->5270 5271 403154 4 API calls 5269->5271 5270->5251 5271->5270 5274 4031be 5272->5274 5273 4031e3 5273->5182 5274->5273 5275 4025ac 4 API calls 5274->5275 5275->5274 5277 405223 5276->5277 5278 405235 5276->5278 5280 403278 4 API calls 5277->5280 5279 40322c 4 API calls 5278->5279 5281 405233 5279->5281 5280->5281 5281->5185 5283 405264 5282->5283 5283->5193 5285 4033bc 5284->5285 5286 403254 4 API calls 5285->5286 5287 4033cf 5286->5287 5288 4031e8 4 API calls 5287->5288 5289 4033f7 5288->5289 5292 403230 5290->5292 5291 403252 5291->5223 5292->5291 5293 4025ac 4 API calls 5292->5293 5293->5291 5302 403414 5294->5302 5297 406fee 5298 407284 FormatMessageA 5297->5298 5299 4072aa 5298->5299 5300 403278 4 API calls 5299->5300 5301 4072c7 5300->5301 5301->5054 5303 403418 LoadLibraryA 5302->5303 5303->5297 5311 406af0 5304->5311 5306 406bf3 5307 406af0 4 API calls 5306->5307 5308 406c05 5306->5308 5307->5306 5309 403198 4 API calls 5308->5309 5310 406c1a 5309->5310 5310->5069 5312 406b1c 5311->5312 5313 403278 4 API calls 5312->5313 5314 406b29 5313->5314 5321 403420 5314->5321 5316 406b31 5317 4031e8 4 API calls 5316->5317 5318 406b49 5317->5318 5319 403198 4 API calls 5318->5319 5320 406b6b 5319->5320 5320->5306 5322 403426 5321->5322 5324 403437 5321->5324 5323 403254 4 API calls 5322->5323 5322->5324 5323->5324 5324->5316 5326 407578 5325->5326 5327 4075b7 CreateFileA 5326->5327 5327->5092 5329 403414 5328->5329 5330 4075b7 CreateFileA 5329->5330 5330->5092 5334 4073ec 5331->5334 5335 407284 5 API calls 5334->5335 5336 407414 5335->5336 5337 407434 5336->5337 5343 405184 5336->5343 5346 405880 5337->5346 5340 407443 5341 403198 4 API calls 5340->5341 5342 407460 5341->5342 5342->5093 5350 405198 5343->5350 5347 405887 5346->5347 5348 4031e8 4 API calls 5347->5348 5349 40589f 5348->5349 5349->5340 5351 4051b5 5350->5351 5358 404e48 5351->5358 5354 4051e1 5356 403278 4 API calls 5354->5356 5357 405193 5356->5357 5357->5337 5361 404e63 5358->5361 5359 404e75 5359->5354 5363 404bd4 5359->5363 5361->5359 5366 404f6a 5361->5366 5373 404e3c 5361->5373 5364 405930 5 API calls 5363->5364 5365 404be5 5364->5365 5365->5354 5367 404f7b 5366->5367 5370 404fc9 5366->5370 5369 40504f 5367->5369 5367->5370 5372 404fe7 5369->5372 5380 404e28 5369->5380 5370->5372 5376 404de4 5370->5376 5372->5361 5374 403198 4 API calls 5373->5374 5375 404e46 5374->5375 5375->5361 5377 404df2 5376->5377 5383 404bec 5377->5383 5379 404e20 5379->5370 5396 4039a4 5380->5396 5386 4059a0 5383->5386 5385 404c05 5385->5379 5387 4059ae 5386->5387 5388 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5387->5388 5389 4059d8 5388->5389 5390 405184 19 API calls 5389->5390 5391 4059e6 5390->5391 5392 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5391->5392 5393 4059f1 5392->5393 5394 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5393->5394 5395 405a0b 5394->5395 5395->5385 5397 4039ab 5396->5397 5402 4038b4 5397->5402 5399 4039cb 5400 403198 4 API calls 5399->5400 5401 4039d2 5400->5401 5401->5372 5403 4038d5 5402->5403 5404 4038c8 5402->5404 5406 403934 5403->5406 5407 4038db 5403->5407 5405 403780 6 API calls 5404->5405 5410 4038d0 5405->5410 5408 403993 5406->5408 5409 40393b 5406->5409 5411 4038e1 5407->5411 5412 4038ee 5407->5412 5415 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5408->5415 5416 403941 5409->5416 5417 40394b 5409->5417 5410->5399 5413 403894 6 API calls 5411->5413 5414 403894 6 API calls 5412->5414 5413->5410 5419 4038fc 5414->5419 5415->5410 5420 403864 9 API calls 5416->5420 5418 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5417->5418 5421 40395d 5418->5421 5422 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5419->5422 5420->5410 5423 403864 9 API calls 5421->5423 5424 403917 5422->5424 5425 403976 5423->5425 5426 40374c VariantClear 5424->5426 5427 40374c VariantClear 5425->5427 5428 40392c 5426->5428 5429 40398b 5427->5429 5428->5399 5429->5399 5431 4034fd 5430->5431 5438 40352d 5430->5438 5432 403526 5431->5432 5434 403509 5431->5434 5435 403254 4 API calls 5432->5435 5433 403198 4 API calls 5436 403517 5433->5436 5445 4025c4 5434->5445 5435->5438 5436->5131 5438->5433 5440 407cd3 5439->5440 5442 407cc8 5439->5442 5449 407c5c 5440->5449 5442->5127 5444 405880 4 API calls 5444->5442 5446 4025ca 5445->5446 5447 4025dc 5446->5447 5448 403154 4 API calls 5446->5448 5447->5436 5447->5447 5448->5447 5450 407c70 5449->5450 5451 407caf 5449->5451 5450->5451 5453 407bac 5450->5453 5451->5442 5451->5444 5454 407bb7 5453->5454 5455 407bc8 5453->5455 5457 405880 4 API calls 5454->5457 5456 4074a0 20 API calls 5455->5456 5458 407bdc 5456->5458 5457->5455 5459 4074a0 20 API calls 5458->5459 5460 407bfd 5459->5460 5461 407918 InterlockedExchange 5460->5461 5462 407c12 5461->5462 5463 407c28 5462->5463 5464 405880 4 API calls 5462->5464 5463->5450 5464->5463 5466 4078d6 5465->5466 5467 4078e7 5465->5467 5468 4078db InterlockedExchange 5466->5468 5467->5013 5468->5467 6241 409e47 6242 409e6c 6241->6242 6243 4098f4 15 API calls 6242->6243 6246 409e71 6243->6246 6244 409ec4 6275 4026c4 GetSystemTime 6244->6275 6246->6244 6249 408dd8 4 API calls 6246->6249 6247 409ec9 6248 409330 32 API calls 6247->6248 6250 409ed1 6248->6250 6251 409ea0 6249->6251 6252 4031e8 4 API calls 6250->6252 6255 409ea8 MessageBoxA 6251->6255 6253 409ede 6252->6253 6254 406928 5 API calls 6253->6254 6256 409eeb 6254->6256 6255->6244 6257 409eb5 6255->6257 6258 4066c0 5 API calls 6256->6258 6259 405854 5 API calls 6257->6259 6260 409efb 6258->6260 6259->6244 6261 406638 5 API calls 6260->6261 6262 409f0c 6261->6262 6263 403340 4 API calls 6262->6263 6264 409f1a 6263->6264 6265 4031e8 4 API calls 6264->6265 6266 409f2a 6265->6266 6267 4074e0 23 API calls 6266->6267 6268 409f69 6267->6268 6269 402594 4 API calls 6268->6269 6270 409f89 6269->6270 6271 407a28 5 API calls 6270->6271 6272 409fcb 6271->6272 6273 407cb8 21 API calls 6272->6273 6274 409ff2 6273->6274 6275->6247 6202 407548 6203 407554 CloseHandle 6202->6203 6204 40755d 6202->6204 6203->6204 6654 402b48 RaiseException 6205 407749 6206 4076dc WriteFile 6205->6206 6214 407724 6205->6214 6207 4076e8 6206->6207 6208 4076ef 6206->6208 6209 40748c 21 API calls 6207->6209 6210 407700 6208->6210 6211 4073ec 20 API calls 6208->6211 6209->6208 6211->6210 6212 4077e0 6213 4078db InterlockedExchange 6212->6213 6216 407890 6212->6216 6215 4078e7 6213->6215 6214->6205 6214->6212 6655 40294a 6656 402952 6655->6656 6657 403554 4 API calls 6656->6657 6658 402967 6656->6658 6657->6656 6659 403f4a 6660 403f53 6659->6660 6661 403f5c 6659->6661 6663 403f07 6660->6663 6666 403f09 6663->6666 6664 403f3c 6664->6661 6667 403154 4 API calls 6666->6667 6669 403e9c 6666->6669 6672 403f3d 6666->6672 6686 403e9c 6666->6686 6667->6666 6668 403ef2 6671 402674 4 API calls 6668->6671 6669->6664 6669->6668 6674 403ea9 6669->6674 6677 403e8e 6669->6677 6676 403ecf 6671->6676 6672->6661 6675 402674 4 API calls 6674->6675 6674->6676 6675->6676 6676->6661 6678 403e4c 6677->6678 6679 403e62 6678->6679 6680 403e7b 6678->6680 6683 403e67 6678->6683 6681 403cc8 4 API calls 6679->6681 6682 402674 4 API calls 6680->6682 6681->6683 6684 403e78 6682->6684 6683->6684 6685 402674 4 API calls 6683->6685 6684->6668 6684->6674 6685->6684 6687 403ed7 6686->6687 6693 403ea9 6686->6693 6688 403ef2 6687->6688 6690 403e8e 4 API calls 6687->6690 6691 402674 4 API calls 6688->6691 6689 403ecf 6689->6666 6692 403ee6 6690->6692 6691->6689 6692->6688 6692->6693 6693->6689 6694 402674 4 API calls 6693->6694 6694->6689 6703 405150 6704 405163 6703->6704 6705 404e48 19 API calls 6704->6705 6706 405177 6705->6706 6276 403a52 6277 403a74 6276->6277 6278 403a5a WriteFile 6276->6278 6278->6277 6279 403a78 GetLastError 6278->6279 6279->6277 6280 402654 6281 403154 4 API calls 6280->6281 6282 402614 6281->6282 6283 402632 6282->6283 6284 403154 4 API calls 6282->6284 6284->6283 5651 409e62 5652 409aa0 4 API calls 5651->5652 5653 409e67 5652->5653 5654 409e6c 5653->5654 5754 402f24 5653->5754 5688 4098f4 5654->5688 5657 409ec4 5693 4026c4 GetSystemTime 5657->5693 5659 409e71 5659->5657 5759 408dd8 5659->5759 5660 409ec9 5694 409330 5660->5694 5664 409ea0 5668 409ea8 MessageBoxA 5664->5668 5665 4031e8 4 API calls 5666 409ede 5665->5666 5712 406928 5666->5712 5668->5657 5670 409eb5 5668->5670 5762 405854 5670->5762 5675 409f0c 5739 403340 5675->5739 5677 409f1a 5678 4031e8 4 API calls 5677->5678 5679 409f2a 5678->5679 5680 4074e0 23 API calls 5679->5680 5681 409f69 5680->5681 5682 402594 4 API calls 5681->5682 5683 409f89 5682->5683 5684 407a28 5 API calls 5683->5684 5685 409fcb 5684->5685 5686 407cb8 21 API calls 5685->5686 5687 409ff2 5686->5687 5766 40953c 5688->5766 5693->5660 5697 409350 5694->5697 5698 409375 CreateDirectoryA 5697->5698 5703 408dd8 4 API calls 5697->5703 5707 407284 5 API calls 5697->5707 5711 405880 4 API calls 5697->5711 5858 406cf4 5697->5858 5881 409224 5697->5881 5900 404c84 5697->5900 5903 408da8 5697->5903 5699 4093ed 5698->5699 5700 40937f GetLastError 5698->5700 5701 40322c 4 API calls 5699->5701 5700->5697 5702 4093f7 5701->5702 5704 4031b8 4 API calls 5702->5704 5703->5697 5706 409411 5704->5706 5708 4031b8 4 API calls 5706->5708 5707->5697 5709 40941e 5708->5709 5709->5665 5711->5697 6013 406820 5712->6013 5715 403454 4 API calls 5716 40694a 5715->5716 5717 4066c0 5716->5717 6018 4068e4 5717->6018 5720 4066f0 5722 403340 4 API calls 5720->5722 5721 4066fe 5723 403454 4 API calls 5721->5723 5724 4066fc 5722->5724 5725 406711 5723->5725 5727 403198 4 API calls 5724->5727 5726 403340 4 API calls 5725->5726 5726->5724 5728 406733 5727->5728 5729 406638 5728->5729 5730 406642 5729->5730 5731 406665 5729->5731 6024 406950 5730->6024 5732 40322c 4 API calls 5731->5732 5734 40666e 5732->5734 5734->5675 5735 406649 5735->5731 5736 406654 5735->5736 5737 403340 4 API calls 5736->5737 5738 406662 5737->5738 5738->5675 5740 403344 5739->5740 5741 4033a5 5739->5741 5742 4031e8 5740->5742 5743 40334c 5740->5743 5744 4031fc 5742->5744 5747 403254 4 API calls 5742->5747 5743->5741 5748 4031e8 4 API calls 5743->5748 5749 40335b 5743->5749 5745 403228 5744->5745 5750 4025ac 4 API calls 5744->5750 5745->5677 5746 403254 4 API calls 5751 403375 5746->5751 5747->5744 5748->5749 5749->5746 5750->5745 5752 4031e8 4 API calls 5751->5752 5753 4033a1 5752->5753 5753->5677 5755 403154 4 API calls 5754->5755 5756 402f29 5755->5756 6030 402bcc 5756->6030 5758 402f51 5758->5758 5760 408da8 4 API calls 5759->5760 5761 408df4 5760->5761 5761->5664 5763 405859 5762->5763 5764 405930 5 API calls 5763->5764 5765 40586b 5764->5765 5765->5765 5773 40955b 5766->5773 5767 409590 5769 40959d GetUserDefaultLangID 5767->5769 5774 409592 5767->5774 5768 409594 5784 407024 GetModuleHandleA GetProcAddress 5768->5784 5769->5774 5772 40956f 5778 409884 5772->5778 5773->5767 5773->5768 5773->5772 5774->5772 5775 4095cb GetACP 5774->5775 5776 4095ef 5774->5776 5775->5772 5775->5774 5776->5772 5777 409615 GetACP 5776->5777 5777->5772 5777->5776 5779 40988c 5778->5779 5783 4098c6 5778->5783 5780 403420 4 API calls 5779->5780 5779->5783 5781 4098c0 5780->5781 5842 408e80 5781->5842 5783->5659 5785 407067 5784->5785 5786 40705e 5784->5786 5787 407070 5785->5787 5788 4070a8 5785->5788 5797 403198 4 API calls 5786->5797 5805 406f68 5787->5805 5790 406f68 RegOpenKeyExA 5788->5790 5792 4070c1 5790->5792 5791 407089 5793 4070de 5791->5793 5808 406f5c 5791->5808 5792->5793 5794 406f5c 6 API calls 5792->5794 5795 40322c 4 API calls 5793->5795 5798 4070d5 RegCloseKey 5794->5798 5799 4070eb 5795->5799 5801 407120 5797->5801 5798->5793 5811 4032fc 5799->5811 5803 403198 4 API calls 5801->5803 5804 407128 5803->5804 5804->5774 5806 406f73 5805->5806 5807 406f79 RegOpenKeyExA 5805->5807 5806->5807 5807->5791 5825 406e10 5808->5825 5812 403300 5811->5812 5813 40333f 5811->5813 5814 4031e8 5812->5814 5815 40330a 5812->5815 5813->5786 5819 4031fc 5814->5819 5822 403254 4 API calls 5814->5822 5816 403334 5815->5816 5817 40331d 5815->5817 5818 4034f0 4 API calls 5816->5818 5820 4034f0 4 API calls 5817->5820 5824 403322 5818->5824 5821 403228 5819->5821 5823 4025ac 4 API calls 5819->5823 5820->5824 5821->5786 5822->5819 5823->5821 5824->5786 5826 406e36 RegQueryValueExA 5825->5826 5827 406e7b 5826->5827 5832 406e59 5826->5832 5829 403198 4 API calls 5827->5829 5828 406e73 5830 403198 4 API calls 5828->5830 5831 406f47 RegCloseKey 5829->5831 5830->5827 5831->5793 5832->5827 5832->5828 5833 403278 4 API calls 5832->5833 5834 403420 4 API calls 5832->5834 5833->5832 5835 406eb0 RegQueryValueExA 5834->5835 5835->5826 5837 406ecc 5835->5837 5836 4034f0 4 API calls 5838 406f0e 5836->5838 5837->5827 5837->5836 5839 406f20 5838->5839 5841 403420 4 API calls 5838->5841 5840 4031e8 4 API calls 5839->5840 5840->5827 5841->5839 5843 408e8e 5842->5843 5845 408ea6 5843->5845 5855 408e18 5843->5855 5846 408e18 4 API calls 5845->5846 5847 408eca 5845->5847 5846->5847 5848 407918 InterlockedExchange 5847->5848 5849 408ee5 5848->5849 5850 408e18 4 API calls 5849->5850 5852 408ef8 5849->5852 5850->5852 5851 408e18 4 API calls 5851->5852 5852->5851 5853 403278 4 API calls 5852->5853 5854 408f27 5852->5854 5853->5852 5854->5783 5856 405880 4 API calls 5855->5856 5857 408e29 5856->5857 5857->5845 5907 406a58 5858->5907 5861 406d26 5863 406a58 5 API calls 5861->5863 5865 406d72 5861->5865 5864 406d36 5863->5864 5866 406a34 7 API calls 5864->5866 5868 406d42 5864->5868 5915 406888 5865->5915 5866->5868 5868->5865 5869 406a58 5 API calls 5868->5869 5878 406d67 5868->5878 5872 406d5b 5869->5872 5876 406a34 7 API calls 5872->5876 5872->5878 5873 406638 5 API calls 5874 406d87 5873->5874 5875 40322c 4 API calls 5874->5875 5877 406d91 5875->5877 5876->5878 5879 4031b8 4 API calls 5877->5879 5878->5865 5927 406cc8 GetWindowsDirectoryA 5878->5927 5880 406dab 5879->5880 5880->5697 5882 409244 5881->5882 5883 406638 5 API calls 5882->5883 5884 40925d 5883->5884 5885 40322c 4 API calls 5884->5885 5892 409268 5885->5892 5886 406978 6 API calls 5886->5892 5888 408dd8 4 API calls 5888->5892 5889 4033b4 4 API calls 5889->5892 5890 405880 4 API calls 5890->5892 5892->5886 5892->5888 5892->5889 5892->5890 5893 4092e4 5892->5893 5967 4091b0 5892->5967 5975 409034 5892->5975 5894 40322c 4 API calls 5893->5894 5895 4092ef 5894->5895 5896 4031b8 4 API calls 5895->5896 5897 409309 5896->5897 5898 403198 4 API calls 5897->5898 5899 409311 5898->5899 5899->5697 5901 405198 19 API calls 5900->5901 5902 404ca2 5901->5902 5902->5697 5904 408dc8 5903->5904 6003 408c80 5904->6003 5908 4034f0 4 API calls 5907->5908 5910 406a6b 5908->5910 5909 406a82 GetEnvironmentVariableA 5909->5910 5911 406a8e 5909->5911 5910->5909 5914 406a95 5910->5914 5929 406dec 5910->5929 5913 403198 4 API calls 5911->5913 5913->5914 5914->5861 5924 406a34 5914->5924 5916 403414 5915->5916 5917 4068ab GetFullPathNameA 5916->5917 5918 4068b7 5917->5918 5919 4068ce 5917->5919 5918->5919 5920 4068bf 5918->5920 5921 40322c 4 API calls 5919->5921 5922 403278 4 API calls 5920->5922 5923 4068cc 5921->5923 5922->5923 5923->5873 5933 4069dc 5924->5933 5928 406ce9 5927->5928 5928->5865 5930 406dfa 5929->5930 5931 4034f0 4 API calls 5930->5931 5932 406e08 5931->5932 5932->5910 5940 406978 5933->5940 5935 4069fe 5936 406a06 GetFileAttributesA 5935->5936 5937 406a1b 5936->5937 5938 403198 4 API calls 5937->5938 5939 406a23 5938->5939 5939->5861 5950 406744 5940->5950 5942 4069b0 5945 4069c6 5942->5945 5946 4069bb 5942->5946 5944 406989 5944->5942 5957 406970 CharPrevA 5944->5957 5958 403454 5945->5958 5947 40322c 4 API calls 5946->5947 5949 4069c4 5947->5949 5949->5935 5953 406755 5950->5953 5951 4067b9 5952 406680 IsDBCSLeadByte 5951->5952 5955 4067b4 5951->5955 5952->5955 5953->5951 5954 406773 5953->5954 5954->5955 5965 406680 IsDBCSLeadByte 5954->5965 5955->5944 5957->5944 5959 403486 5958->5959 5960 403459 5958->5960 5961 403198 4 API calls 5959->5961 5960->5959 5963 40346d 5960->5963 5962 40347c 5961->5962 5962->5949 5964 403278 4 API calls 5963->5964 5964->5962 5966 406694 5965->5966 5966->5954 5968 403198 4 API calls 5967->5968 5970 4091d1 5968->5970 5972 4091fe 5970->5972 5984 4032a8 5970->5984 5987 403494 5970->5987 5973 403198 4 API calls 5972->5973 5974 409213 5973->5974 5974->5892 5991 408f70 5975->5991 5977 40904a 5978 40904e 5977->5978 5997 406a48 5977->5997 5978->5892 5981 409081 6000 408fac 5981->6000 5985 403278 4 API calls 5984->5985 5986 4032b5 5985->5986 5986->5970 5988 4034c3 5987->5988 5989 403498 5987->5989 5988->5970 5990 4034f0 4 API calls 5989->5990 5990->5988 5992 408f7a 5991->5992 5993 408f7e 5991->5993 5992->5977 5994 408fa0 SetLastError 5993->5994 5995 408f87 Wow64DisableWow64FsRedirection 5993->5995 5996 408f9b 5994->5996 5995->5996 5996->5977 5998 4069dc 7 API calls 5997->5998 5999 406a52 GetLastError 5998->5999 5999->5981 6001 408fb1 Wow64RevertWow64FsRedirection 6000->6001 6002 408fbb 6000->6002 6001->6002 6002->5892 6004 403198 4 API calls 6003->6004 6005 408cb1 6003->6005 6004->6005 6007 408cc8 6005->6007 6009 403278 4 API calls 6005->6009 6011 408cdc 6005->6011 6012 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6005->6012 6006 4031b8 4 API calls 6008 408d69 6006->6008 6010 4032fc 4 API calls 6007->6010 6008->5697 6009->6005 6010->6011 6011->6006 6012->6005 6014 406744 IsDBCSLeadByte 6013->6014 6016 406835 6014->6016 6015 40687f 6015->5715 6016->6015 6017 406680 IsDBCSLeadByte 6016->6017 6017->6016 6019 4068f3 6018->6019 6020 406820 IsDBCSLeadByte 6019->6020 6023 4068fe 6020->6023 6021 4066ea 6021->5720 6021->5721 6022 406680 IsDBCSLeadByte 6022->6023 6023->6021 6023->6022 6025 406957 6024->6025 6026 40695b 6024->6026 6025->5735 6029 406970 CharPrevA 6026->6029 6028 40696c 6028->5735 6029->6028 6031 402bd5 RaiseException 6030->6031 6032 402be6 6030->6032 6031->6032 6032->5758 6285 402e64 6286 402e69 6285->6286 6287 402e7a RtlUnwind 6286->6287 6288 402e5e 6286->6288 6289 402e9d 6287->6289 6306 40667c IsDBCSLeadByte 6307 406694 6306->6307 6719 403f7d 6720 403fa2 6719->6720 6723 403f84 6719->6723 6722 403e8e 4 API calls 6720->6722 6720->6723 6721 403f8c 6722->6723 6723->6721 6724 402674 4 API calls 6723->6724 6725 403fca 6724->6725 6732 403d02 6734 403d12 6732->6734 6733 403ddf ExitProcess 6734->6733 6735 403db8 6734->6735 6737 403dea 6734->6737 6741 403da4 6734->6741 6742 403d8f MessageBoxA 6734->6742 6736 403cc8 4 API calls 6735->6736 6738 403dc2 6736->6738 6739 403cc8 4 API calls 6738->6739 6740 403dcc 6739->6740 6752 4019dc 6740->6752 6748 403fe4 6741->6748 6742->6735 6744 403dd1 6744->6733 6744->6737 6749 403fe8 6748->6749 6750 403f07 4 API calls 6749->6750 6751 404006 6750->6751 6753 401abb 6752->6753 6754 4019ed 6752->6754 6753->6744 6755 401a04 RtlEnterCriticalSection 6754->6755 6756 401a0e LocalFree 6754->6756 6755->6756 6757 401a41 6756->6757 6758 401a2f VirtualFree 6757->6758 6759 401a49 6757->6759 6758->6757 6760 401a70 LocalFree 6759->6760 6761 401a87 6759->6761 6760->6760 6760->6761 6762 401aa9 RtlDeleteCriticalSection 6761->6762 6763 401a9f RtlLeaveCriticalSection 6761->6763 6762->6744 6763->6762 6316 404206 6317 4041cc 6316->6317 6320 40420a 6316->6320 6318 404282 6319 403154 4 API calls 6321 404323 6319->6321 6320->6318 6320->6319 6322 402c08 6325 402c82 6322->6325 6326 402c19 6322->6326 6323 402c56 RtlUnwind 6324 403154 4 API calls 6323->6324 6324->6325 6326->6323 6326->6325 6329 402b28 6326->6329 6330 402b31 RaiseException 6329->6330 6331 402b47 6329->6331 6330->6331 6331->6323 6332 408c10 6333 408c17 6332->6333 6334 403198 4 API calls 6333->6334 6342 408cb1 6334->6342 6335 408cdc 6336 4031b8 4 API calls 6335->6336 6338 408d69 6336->6338 6337 408cc8 6340 4032fc 4 API calls 6337->6340 6339 403278 4 API calls 6339->6342 6340->6335 6341 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6341->6342 6342->6335 6342->6337 6342->6339 6342->6341 6343 40a011 6344 40a036 6343->6344 6345 407918 InterlockedExchange 6344->6345 6347 40a060 6345->6347 6346 40a070 6353 4076ac SetEndOfFile 6346->6353 6347->6346 6348 409aa0 4 API calls 6347->6348 6348->6346 6350 40a08c 6351 4025ac 4 API calls 6350->6351 6352 40a0c3 6351->6352 6354 4076c3 6353->6354 6355 4076bc 6353->6355 6354->6350 6356 40748c 21 API calls 6355->6356 6356->6354 6768 409916 6770 409918 6768->6770 6769 40993a 6770->6769 6771 409956 CallWindowProcA 6770->6771 6771->6769 6084 407017 6085 407008 SetErrorMode 6084->6085 6361 403018 6362 403070 6361->6362 6363 403025 6361->6363 6364 40302a RtlUnwind 6363->6364 6365 40304e 6364->6365 6367 402f78 6365->6367 6368 402be8 6365->6368 6369 402bf1 RaiseException 6368->6369 6370 402c04 6368->6370 6369->6370 6370->6362 6778 409918 6779 40993a 6778->6779 6781 409927 6778->6781 6780 409956 CallWindowProcA 6780->6779 6781->6779 6781->6780 6375 40901e 6376 409010 6375->6376 6377 408fac Wow64RevertWow64FsRedirection 6376->6377 6378 409018 6377->6378 6379 409020 SetLastError 6380 409029 6379->6380 6391 403a28 ReadFile 6392 403a46 6391->6392 6393 403a49 GetLastError 6391->6393 6222 40762c ReadFile 6223 407663 6222->6223 6224 40764c 6222->6224 6225 407652 GetLastError 6224->6225 6226 40765c 6224->6226 6225->6223 6225->6226 6227 40748c 21 API calls 6226->6227 6227->6223 6398 40a02c 6399 409aa0 4 API calls 6398->6399 6400 40a031 6399->6400 6401 40a036 6400->6401 6402 402f24 5 API calls 6400->6402 6403 407918 InterlockedExchange 6401->6403 6402->6401 6404 40a060 6403->6404 6405 40a070 6404->6405 6406 409aa0 4 API calls 6404->6406 6407 4076ac 22 API calls 6405->6407 6406->6405 6408 40a08c 6407->6408 6409 4025ac 4 API calls 6408->6409 6410 40a0c3 6409->6410 6782 40712e 6783 407118 6782->6783 6784 403198 4 API calls 6783->6784 6785 407120 6784->6785 6786 403198 4 API calls 6785->6786 6787 407128 6786->6787 6788 408f30 6791 408dfc 6788->6791 6792 408e05 6791->6792 6793 403198 4 API calls 6792->6793 6794 408e13 6792->6794 6793->6792 6795 403932 6796 403924 6795->6796 6799 40374c 6796->6799 6798 40392c 6800 403766 6799->6800 6801 403759 6799->6801 6800->6798 6801->6800 6802 403779 VariantClear 6801->6802 6802->6798 6033 4075c4 SetFilePointer 6034 4075f7 6033->6034 6035 4075e7 GetLastError 6033->6035 6035->6034 6036 4075f0 6035->6036 6037 40748c 21 API calls 6036->6037 6037->6034 6411 405ac4 6412 405acc 6411->6412 6415 405ad4 6411->6415 6413 405ad2 6412->6413 6414 405adb 6412->6414 6418 405a3c 6413->6418 6416 405930 5 API calls 6414->6416 6416->6415 6419 405a44 6418->6419 6420 405a5e 6419->6420 6421 403154 4 API calls 6419->6421 6422 405a63 6420->6422 6423 405a7a 6420->6423 6421->6419 6424 405930 5 API calls 6422->6424 6425 403154 4 API calls 6423->6425 6426 405a76 6424->6426 6427 405a7f 6425->6427 6429 403154 4 API calls 6426->6429 6428 4059a0 19 API calls 6427->6428 6428->6426 6430 405aa8 6429->6430 6431 403154 4 API calls 6430->6431 6432 405ab6 6431->6432 6432->6415 6433 4076c8 WriteFile 6434 4076e8 6433->6434 6437 4076ef 6433->6437 6435 40748c 21 API calls 6434->6435 6435->6437 6436 407700 6437->6436 6438 4073ec 20 API calls 6437->6438 6438->6436 6439 40a2ca 6448 4096fc 6439->6448 6442 402f24 5 API calls 6443 40a2d4 6442->6443 6444 403198 4 API calls 6443->6444 6445 40a2f3 6444->6445 6446 403198 4 API calls 6445->6446 6447 40a2fb 6446->6447 6457 40569c 6448->6457 6450 409717 6451 409745 6450->6451 6463 40720c 6450->6463 6453 403198 4 API calls 6451->6453 6455 40975a 6453->6455 6454 409735 6456 40973d MessageBoxA 6454->6456 6455->6442 6456->6451 6458 403154 4 API calls 6457->6458 6459 4056a1 6458->6459 6460 4056b9 6459->6460 6461 403154 4 API calls 6459->6461 6460->6450 6462 4056af 6461->6462 6462->6450 6464 40569c 4 API calls 6463->6464 6465 40721b 6464->6465 6466 407221 6465->6466 6467 40722f 6465->6467 6468 40322c 4 API calls 6466->6468 6470 40724b 6467->6470 6471 40723f 6467->6471 6469 40722d 6468->6469 6469->6454 6481 4032b8 6470->6481 6474 4071d0 6471->6474 6475 40322c 4 API calls 6474->6475 6476 4071df 6475->6476 6477 4071fc 6476->6477 6478 406950 CharPrevA 6476->6478 6477->6469 6479 4071eb 6478->6479 6479->6477 6480 4032fc 4 API calls 6479->6480 6480->6477 6482 403278 4 API calls 6481->6482 6483 4032c2 6482->6483 6483->6469 6484 402ccc 6485 402cdd 6484->6485 6489 402cfe 6484->6489 6486 402d88 RtlUnwind 6485->6486 6488 402b28 RaiseException 6485->6488 6485->6489 6487 403154 4 API calls 6486->6487 6487->6489 6490 402d7f 6488->6490 6490->6486 6811 403fcd 6812 403f07 4 API calls 6811->6812 6813 403fd6 6812->6813 6814 403e9c 4 API calls 6813->6814 6815 403fe2 6814->6815 5469 4024d0 5470 4024e4 5469->5470 5471 4024f7 5469->5471 5508 401918 RtlInitializeCriticalSection 5470->5508 5473 402518 5471->5473 5474 40250e RtlEnterCriticalSection 5471->5474 5485 402300 5473->5485 5474->5473 5477 4024ed 5479 402525 5482 402581 5479->5482 5483 402577 RtlLeaveCriticalSection 5479->5483 5481 402531 5481->5479 5515 40215c 5481->5515 5483->5482 5486 402314 5485->5486 5487 402335 5486->5487 5492 4023b8 5486->5492 5488 402344 5487->5488 5529 401b74 5487->5529 5488->5479 5495 401fd4 5488->5495 5492->5488 5493 402455 5492->5493 5532 401d80 5492->5532 5540 401e84 5492->5540 5493->5488 5536 401d00 5493->5536 5496 401fe8 5495->5496 5497 401ffb 5495->5497 5498 401918 4 API calls 5496->5498 5499 402012 RtlEnterCriticalSection 5497->5499 5502 40201c 5497->5502 5500 401fed 5498->5500 5499->5502 5500->5497 5501 401ff1 5500->5501 5505 402052 5501->5505 5502->5505 5622 401ee0 5502->5622 5505->5481 5506 402147 5506->5481 5507 40213d RtlLeaveCriticalSection 5507->5506 5509 40193c RtlEnterCriticalSection 5508->5509 5510 401946 5508->5510 5509->5510 5511 401964 LocalAlloc 5510->5511 5512 40197e 5511->5512 5513 4019c3 RtlLeaveCriticalSection 5512->5513 5514 4019cd 5512->5514 5513->5514 5514->5471 5514->5477 5516 40217a 5515->5516 5517 402175 5515->5517 5519 4021ab RtlEnterCriticalSection 5516->5519 5522 4021b5 5516->5522 5523 40217e 5516->5523 5518 401918 4 API calls 5517->5518 5518->5516 5519->5522 5520 4021c1 5524 4022e3 RtlLeaveCriticalSection 5520->5524 5525 4022ed 5520->5525 5521 402244 5521->5523 5526 401d80 7 API calls 5521->5526 5522->5520 5522->5521 5527 402270 5522->5527 5523->5479 5524->5525 5525->5479 5526->5523 5527->5520 5528 401d00 7 API calls 5527->5528 5528->5520 5530 40215c 9 API calls 5529->5530 5531 401b95 5530->5531 5531->5488 5533 401d92 5532->5533 5534 401d89 5532->5534 5533->5492 5534->5533 5535 401b74 9 API calls 5534->5535 5535->5533 5537 401d4e 5536->5537 5538 401d1e 5536->5538 5537->5538 5545 401c68 5537->5545 5538->5488 5600 401768 5540->5600 5542 401e99 5543 401ea6 5542->5543 5611 401dcc 5542->5611 5543->5492 5546 401c7a 5545->5546 5547 401c9d 5546->5547 5548 401caf 5546->5548 5558 40188c 5547->5558 5549 40188c 3 API calls 5548->5549 5551 401cad 5549->5551 5552 401cc5 5551->5552 5568 401b44 5551->5568 5552->5538 5554 401cd4 5555 401cee 5554->5555 5573 401b98 5554->5573 5578 4013a0 5555->5578 5559 4018b2 5558->5559 5560 40190b 5558->5560 5582 401658 5559->5582 5560->5551 5565 4018e6 5565->5560 5567 4013a0 LocalAlloc 5565->5567 5567->5560 5569 401b61 5568->5569 5570 401b52 5568->5570 5569->5554 5571 401d00 9 API calls 5570->5571 5572 401b5f 5571->5572 5572->5554 5574 401bab 5573->5574 5575 401b9d 5573->5575 5574->5555 5576 401b74 9 API calls 5575->5576 5577 401baa 5576->5577 5577->5555 5579 4013ab 5578->5579 5580 4013c6 5579->5580 5581 4012e4 LocalAlloc 5579->5581 5580->5552 5581->5580 5584 40168f 5582->5584 5583 4016cf 5586 40132c 5583->5586 5584->5583 5585 4016a9 VirtualFree 5584->5585 5585->5584 5587 401348 5586->5587 5594 4012e4 5587->5594 5590 40150c 5593 40153b 5590->5593 5591 401594 5591->5565 5592 401568 VirtualFree 5592->5593 5593->5591 5593->5592 5597 40128c 5594->5597 5598 401298 LocalAlloc 5597->5598 5599 4012aa 5597->5599 5598->5599 5599->5565 5599->5590 5601 401787 5600->5601 5602 40183b 5601->5602 5603 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5601->5603 5605 40132c LocalAlloc 5601->5605 5606 401821 5601->5606 5608 4017d6 5601->5608 5609 4017e7 5602->5609 5618 4015c4 5602->5618 5603->5601 5605->5601 5607 40150c VirtualFree 5606->5607 5607->5609 5610 40150c VirtualFree 5608->5610 5609->5542 5610->5609 5612 401d80 9 API calls 5611->5612 5613 401de0 5612->5613 5614 40132c LocalAlloc 5613->5614 5615 401df0 5614->5615 5616 401df8 5615->5616 5617 401b44 9 API calls 5615->5617 5616->5543 5617->5616 5620 40160a 5618->5620 5619 40163a 5619->5609 5620->5619 5621 401626 VirtualAlloc 5620->5621 5621->5619 5621->5620 5625 401ef0 5622->5625 5623 401f1c 5624 401d00 9 API calls 5623->5624 5627 401f40 5623->5627 5624->5627 5625->5623 5625->5627 5628 401e58 5625->5628 5627->5506 5627->5507 5633 4016d8 5628->5633 5631 401e75 5631->5625 5632 401dcc 9 API calls 5632->5631 5637 4016f4 5633->5637 5635 4016fe 5636 4015c4 VirtualAlloc 5635->5636 5640 40170a 5636->5640 5637->5635 5638 40175b 5637->5638 5639 40132c LocalAlloc 5637->5639 5641 40174f 5637->5641 5643 401430 5637->5643 5638->5631 5638->5632 5639->5637 5640->5638 5642 40150c VirtualFree 5641->5642 5642->5638 5644 40143f VirtualAlloc 5643->5644 5646 40146c 5644->5646 5647 40148f 5644->5647 5648 4012e4 LocalAlloc 5646->5648 5647->5637 5649 401478 5648->5649 5649->5647 5650 40147c VirtualFree 5649->5650 5650->5647 6491 4028d2 6492 4028da 6491->6492 6493 403554 4 API calls 6492->6493 6494 4028ef 6492->6494 6493->6492 6495 4025ac 4 API calls 6494->6495 6496 4028f4 6495->6496 6816 4019d3 6817 4019ba 6816->6817 6818 4019c3 RtlLeaveCriticalSection 6817->6818 6819 4019cd 6817->6819 6818->6819 6038 407fd4 6039 407fe6 6038->6039 6041 407fed 6038->6041 6049 407f10 6039->6049 6042 408021 6041->6042 6043 408015 6041->6043 6044 408017 6041->6044 6045 40804e 6042->6045 6047 407d7c 19 API calls 6042->6047 6063 407e2c 6043->6063 6060 407d7c 6044->6060 6047->6045 6050 407f25 6049->6050 6051 407d7c 19 API calls 6050->6051 6052 407f34 6050->6052 6051->6052 6053 407f6e 6052->6053 6054 407d7c 19 API calls 6052->6054 6055 407f82 6053->6055 6056 407d7c 19 API calls 6053->6056 6054->6053 6059 407fae 6055->6059 6070 407eb8 6055->6070 6056->6055 6059->6041 6073 4058b4 6060->6073 6062 407d9e 6062->6042 6064 405184 19 API calls 6063->6064 6065 407e57 6064->6065 6081 407de4 6065->6081 6067 407e5f 6068 403198 4 API calls 6067->6068 6069 407e74 6068->6069 6069->6042 6071 407ec7 VirtualFree 6070->6071 6072 407ed9 VirtualAlloc 6070->6072 6071->6072 6072->6059 6074 4058c0 6073->6074 6075 405184 19 API calls 6074->6075 6076 4058ed 6075->6076 6077 4031e8 4 API calls 6076->6077 6078 4058f8 6077->6078 6079 403198 4 API calls 6078->6079 6080 40590d 6079->6080 6080->6062 6082 4058b4 19 API calls 6081->6082 6083 407e06 6082->6083 6083->6067 6501 40a0d5 6502 40a105 6501->6502 6503 40a10f CreateWindowExA SetWindowLongA 6502->6503 6504 405184 19 API calls 6503->6504 6505 40a192 6504->6505 6506 4032fc 4 API calls 6505->6506 6507 40a1a0 6506->6507 6508 4032fc 4 API calls 6507->6508 6509 40a1ad 6508->6509 6510 406b7c 5 API calls 6509->6510 6511 40a1b9 6510->6511 6512 4032fc 4 API calls 6511->6512 6513 40a1c2 6512->6513 6514 4099a4 29 API calls 6513->6514 6515 40a1d4 6514->6515 6516 409884 5 API calls 6515->6516 6517 40a1e7 6515->6517 6516->6517 6518 40a220 6517->6518 6519 4094d8 9 API calls 6517->6519 6520 40a239 6518->6520 6523 40a233 RemoveDirectoryA 6518->6523 6519->6518 6521 40a242 73A25CF0 6520->6521 6522 40a24d 6520->6522 6521->6522 6524 40a275 6522->6524 6525 40357c 4 API calls 6522->6525 6523->6520 6526 40a26b 6525->6526 6527 4025ac 4 API calls 6526->6527 6527->6524 6086 40a0e7 6087 40a0eb SetLastError 6086->6087 6118 409648 GetLastError 6087->6118 6090 40a105 6092 40a10f CreateWindowExA SetWindowLongA 6090->6092 6091 402f24 5 API calls 6091->6090 6093 405184 19 API calls 6092->6093 6094 40a192 6093->6094 6095 4032fc 4 API calls 6094->6095 6096 40a1a0 6095->6096 6097 4032fc 4 API calls 6096->6097 6098 40a1ad 6097->6098 6131 406b7c GetCommandLineA 6098->6131 6101 4032fc 4 API calls 6102 40a1c2 6101->6102 6136 4099a4 6102->6136 6105 409884 5 API calls 6106 40a1e7 6105->6106 6107 40a220 6106->6107 6108 40a207 6106->6108 6110 40a239 6107->6110 6113 40a233 RemoveDirectoryA 6107->6113 6152 4094d8 6108->6152 6111 40a242 73A25CF0 6110->6111 6112 40a24d 6110->6112 6111->6112 6114 40a275 6112->6114 6160 40357c 6112->6160 6113->6110 6116 40a26b 6117 4025ac 4 API calls 6116->6117 6117->6114 6119 404c84 19 API calls 6118->6119 6120 40968f 6119->6120 6121 407284 5 API calls 6120->6121 6122 40969f 6121->6122 6123 408da8 4 API calls 6122->6123 6124 4096b4 6123->6124 6125 405880 4 API calls 6124->6125 6126 4096c3 6125->6126 6127 4031b8 4 API calls 6126->6127 6128 4096e2 6127->6128 6129 403198 4 API calls 6128->6129 6130 4096ea 6129->6130 6130->6090 6130->6091 6132 406af0 4 API calls 6131->6132 6133 406ba1 6132->6133 6134 403198 4 API calls 6133->6134 6135 406bbf 6134->6135 6135->6101 6137 4033b4 4 API calls 6136->6137 6138 4099df 6137->6138 6139 409a11 CreateProcessA 6138->6139 6140 409a24 CloseHandle 6139->6140 6141 409a1d 6139->6141 6143 409a2d 6140->6143 6142 409648 21 API calls 6141->6142 6142->6140 6173 409978 6143->6173 6146 409a49 6147 409978 3 API calls 6146->6147 6148 409a4e GetExitCodeProcess CloseHandle 6147->6148 6149 409a6e 6148->6149 6150 403198 4 API calls 6149->6150 6151 409a76 6150->6151 6151->6105 6151->6106 6153 409532 6152->6153 6155 4094eb 6152->6155 6153->6107 6154 4094f3 Sleep 6154->6155 6155->6153 6155->6154 6156 409503 Sleep 6155->6156 6158 40951a GetLastError 6155->6158 6177 408fbc 6155->6177 6156->6155 6158->6153 6159 409524 GetLastError 6158->6159 6159->6153 6159->6155 6161 403591 6160->6161 6162 4035a0 6160->6162 6167 4035d0 6161->6167 6168 40359b 6161->6168 6169 4035b6 6161->6169 6163 4035b1 6162->6163 6164 4035b8 6162->6164 6165 403198 4 API calls 6163->6165 6166 4031b8 4 API calls 6164->6166 6165->6169 6166->6169 6167->6169 6171 40357c 4 API calls 6167->6171 6168->6162 6170 4035ec 6168->6170 6169->6116 6170->6169 6185 403554 6170->6185 6171->6167 6174 40998c PeekMessageA 6173->6174 6175 409980 TranslateMessage DispatchMessageA 6174->6175 6176 40999e MsgWaitForMultipleObjects 6174->6176 6175->6174 6176->6143 6176->6146 6178 408f70 2 API calls 6177->6178 6180 408fd2 6178->6180 6179 408fd6 6179->6155 6180->6179 6181 408ff2 DeleteFileA GetLastError 6180->6181 6182 409010 6181->6182 6183 408fac Wow64RevertWow64FsRedirection 6182->6183 6184 409018 6183->6184 6184->6155 6186 403566 6185->6186 6188 403578 6186->6188 6189 403604 6186->6189 6188->6170 6190 40357c 6189->6190 6191 4035a0 6190->6191 6196 4035d0 6190->6196 6197 40359b 6190->6197 6198 4035b6 6190->6198 6192 4035b1 6191->6192 6193 4035b8 6191->6193 6194 403198 4 API calls 6192->6194 6195 4031b8 4 API calls 6193->6195 6194->6198 6195->6198 6196->6198 6200 40357c 4 API calls 6196->6200 6197->6191 6199 4035ec 6197->6199 6198->6186 6199->6198 6201 403554 4 API calls 6199->6201 6200->6196 6201->6199 6823 402be9 RaiseException 6824 402c04 6823->6824 6534 402af2 6535 402afe 6534->6535 6538 402ed0 6535->6538 6539 403154 4 API calls 6538->6539 6540 402ee0 6539->6540 6541 402b03 6540->6541 6543 402b0c 6540->6543 6544 402b25 6543->6544 6545 402b15 RaiseException 6543->6545 6544->6541 6545->6544 6825 402dfa 6826 402e26 6825->6826 6827 402e0d 6825->6827 6829 402ba4 6827->6829 6830 402bc9 6829->6830 6831 402bad 6829->6831 6830->6826 6832 402bb5 RaiseException 6831->6832 6832->6830 6833 4075fa GetFileSize 6834 407626 6833->6834 6835 407616 GetLastError 6833->6835 6835->6834 6836 40761f 6835->6836 6837 40748c 21 API calls 6836->6837 6837->6834 6838 406ffb 6839 407008 SetErrorMode 6838->6839 6550 403a80 CloseHandle 6551 403a90 6550->6551 6552 403a91 GetLastError 6550->6552 6553 40a282 6555 40a1f4 6553->6555 6554 40a220 6557 40a239 6554->6557 6560 40a233 RemoveDirectoryA 6554->6560 6555->6554 6556 4094d8 9 API calls 6555->6556 6556->6554 6558 40a242 73A25CF0 6557->6558 6559 40a24d 6557->6559 6558->6559 6561 40a275 6559->6561 6562 40357c 4 API calls 6559->6562 6560->6557 6563 40a26b 6562->6563 6564 4025ac 4 API calls 6563->6564 6564->6561 6565 404283 6566 4042c3 6565->6566 6567 403154 4 API calls 6566->6567 6568 404323 6567->6568 6840 404185 6841 4041ff 6840->6841 6842 4041cc 6841->6842 6843 403154 4 API calls 6841->6843 6844 404323 6843->6844 6569 40a287 6570 40a290 6569->6570 6572 40a2bb 6569->6572 6579 409448 6570->6579 6574 403198 4 API calls 6572->6574 6573 40a295 6573->6572 6577 40a2b3 MessageBoxA 6573->6577 6575 40a2f3 6574->6575 6576 403198 4 API calls 6575->6576 6578 40a2fb 6576->6578 6577->6572 6580 409454 GetCurrentProcess OpenProcessToken 6579->6580 6581 4094af ExitWindowsEx 6579->6581 6582 409466 6580->6582 6583 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6580->6583 6581->6582 6582->6573 6583->6581 6583->6582 6584 403e87 6585 403e4c 6584->6585 6586 403e67 6585->6586 6587 403e62 6585->6587 6588 403e7b 6585->6588 6591 403e78 6586->6591 6597 402674 6586->6597 6593 403cc8 6587->6593 6590 402674 4 API calls 6588->6590 6590->6591 6594 403cd6 6593->6594 6595 402674 4 API calls 6594->6595 6596 403ceb 6594->6596 6595->6596 6596->6586 6598 403154 4 API calls 6597->6598 6599 40267a 6598->6599 6599->6591 6604 407e90 6605 407eb8 VirtualFree 6604->6605 6606 407e9d 6605->6606 6853 403991 6854 403983 6853->6854 6855 40374c VariantClear 6854->6855 6856 40398b 6855->6856 6857 405b92 6859 405b94 6857->6859 6858 405bd0 6862 405930 5 API calls 6858->6862 6859->6858 6860 405be7 6859->6860 6861 405bca 6859->6861 6866 404ccc 5 API calls 6860->6866 6861->6858 6863 405c3c 6861->6863 6864 405be3 6862->6864 6865 4059a0 19 API calls 6863->6865 6867 403198 4 API calls 6864->6867 6865->6864 6868 405c10 6866->6868 6869 405c76 6867->6869 6870 4059a0 19 API calls 6868->6870 6870->6864 6609 403e95 6610 403e4c 6609->6610 6611 403e62 6610->6611 6612 403e7b 6610->6612 6614 403e67 6610->6614 6613 403cc8 4 API calls 6611->6613 6615 402674 4 API calls 6612->6615 6613->6614 6616 403e78 6614->6616 6617 402674 4 API calls 6614->6617 6615->6616 6617->6616 6618 403a97 6619 403aac 6618->6619 6620 403bbc GetStdHandle 6619->6620 6621 403b0e CreateFileA 6619->6621 6631 403ab2 6619->6631 6622 403c17 GetLastError 6620->6622 6626 403bba 6620->6626 6621->6622 6623 403b2c 6621->6623 6622->6631 6625 403b3b GetFileSize 6623->6625 6623->6626 6625->6622 6627 403b4e SetFilePointer 6625->6627 6628 403be7 GetFileType 6626->6628 6626->6631 6627->6622 6632 403b6a ReadFile 6627->6632 6630 403c02 CloseHandle 6628->6630 6628->6631 6630->6631 6632->6622 6633 403b8c 6632->6633 6633->6626 6634 403b9f SetFilePointer 6633->6634 6634->6622 6635 403bb0 SetEndOfFile 6634->6635 6635->6622 6635->6626 6889 4011aa 6890 4011ac GetStdHandle 6889->6890 6228 4076ac SetEndOfFile 6229 4076c3 6228->6229 6230 4076bc 6228->6230 6231 40748c 21 API calls 6230->6231 6231->6229 6639 4028ac 6640 402594 4 API calls 6639->6640 6641 4028b6 6640->6641 6642 401ab9 6643 401a96 6642->6643 6644 401aa9 RtlDeleteCriticalSection 6643->6644 6645 401a9f RtlLeaveCriticalSection 6643->6645 6645->6644

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 116 409b30-409b54 GetSystemInfo VirtualQuery 117 409be4-409beb 116->117 118 409b5a 116->118 119 409bd9-409bde 118->119 119->117 120 409b5c-409b63 119->120 121 409bc5-409bd7 VirtualQuery 120->121 122 409b65-409b69 120->122 121->117 121->119 122->121 123 409b6b-409b73 122->123 124 409b84-409b95 VirtualProtect 123->124 125 409b75-409b78 123->125 127 409b97 124->127 128 409b99-409b9b 124->128 125->124 126 409b7a-409b7d 125->126 126->124 129 409b7f-409b82 126->129 127->128 130 409baa-409bad 128->130 129->124 129->128 131 409b9d-409ba6 call 409b28 130->131 132 409baf-409bb1 130->132 131->130 132->121 134 409bb3-409bc0 VirtualProtect 132->134 134->121
                                                                                        APIs
                                                                                        • GetSystemInfo.KERNEL32(?), ref: 00409B42
                                                                                        • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B4D
                                                                                        • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409B8E
                                                                                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BC0
                                                                                        • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409BD0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$ProtectQuery$InfoSystem
                                                                                        • String ID:
                                                                                        • API String ID: 2441996862-0
                                                                                        • Opcode ID: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                                                        • Instruction ID: 3002c4020e31fcb34e6ffc2d5983d7aa910ebdc8277ab133fd4bc27d875cdae8
                                                                                        • Opcode Fuzzy Hash: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                                                        • Instruction Fuzzy Hash: F4219DB12003046BD7709AA99C85E5777E9EB85370F04082BFA89E32D3D239FC40C669
                                                                                        APIs
                                                                                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 2299586839-0
                                                                                        • Opcode ID: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                                                        • Instruction ID: f5e54e9283223dc3068d295e9d46a059fb55c29f9ef527c49189185961fa2cd4
                                                                                        • Opcode Fuzzy Hash: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                                                        • Instruction Fuzzy Hash: 42E0927170021426D710A9A99C86AEB735CEB58310F4002BFB908E73C6EDB49E844AEE

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00409C60), ref: 00404582
                                                                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00409C60), ref: 004045C6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModulePolicyProcess
                                                                                        • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                        • API String ID: 3256987805-3653653586
                                                                                        • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                        • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                                        • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                        • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • SetLastError.KERNEL32 ref: 0040A0F4
                                                                                          • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,021315B8), ref: 0040966C
                                                                                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                                                        • SetWindowLongA.USER32(00020440,000000FC,00409918), ref: 0040A148
                                                                                        • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                                                        • 73A25CF0.USER32(00020440,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastWindow$CreateDirectoryLongRemove
                                                                                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                        • API String ID: 3341979996-3001827809
                                                                                        • Opcode ID: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                                                        • Instruction ID: a1ec2b29f79e5ff862fc4fad7e4f310b8339f10a1453332cc6b7faa73b6a426b
                                                                                        • Opcode Fuzzy Hash: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                                                        • Instruction Fuzzy Hash: C2411F71600205DFD710EBA9EE8AB9977A4EB45304F10467EF514B73E2CBB8A811CB9D

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090C4
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090DE
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                        • API String ID: 1646373207-2130885113
                                                                                        • Opcode ID: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                                                        • Instruction ID: 4a4222b704d734fa8d0781b40c04fe9f9c76e7b4f133337d95099c0c8a01123f
                                                                                        • Opcode Fuzzy Hash: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                                                        • Instruction Fuzzy Hash: 20017170748342AEFB00BB72DD4AB163A68E785704F50457BF5407A2D3DABD4C04DA6D

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                                                        • SetWindowLongA.USER32(00020440,000000FC,00409918), ref: 0040A148
                                                                                          • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040A1B9,?), ref: 00406B94
                                                                                          • Part of subcall function 004099A4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021315B8,00409A90,00000000,00409A77), ref: 00409A14
                                                                                          • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021315B8,00409A90,00000000), ref: 00409A28
                                                                                          • Part of subcall function 004099A4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                                          • Part of subcall function 004099A4: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                                          • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021315B8,00409A90), ref: 00409A5C
                                                                                        • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                                                        • 73A25CF0.USER32(00020440,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                        • API String ID: 978128352-3001827809
                                                                                        • Opcode ID: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                                                        • Instruction ID: f39d198f6ca78f9e57da3cbf677d536b45cc778db879de651171db1d1b5627bc
                                                                                        • Opcode Fuzzy Hash: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                                                        • Instruction Fuzzy Hash: 07411A71604204DFD714EBA9EE86B5A77A4EB49304F10427EE514B73E1CBB8A810CB9D

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021315B8,00409A90,00000000,00409A77), ref: 00409A14
                                                                                        • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021315B8,00409A90,00000000), ref: 00409A28
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                                        • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                                        • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021315B8,00409A90), ref: 00409A5C
                                                                                          • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,021315B8), ref: 0040966C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                                        • String ID: D
                                                                                        • API String ID: 3356880605-2746444292
                                                                                        • Opcode ID: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                                                        • Instruction ID: 6ea97129cf5aa135a7f7046e3a99eae43c862e8aca722617c6144c18eae127a8
                                                                                        • Opcode Fuzzy Hash: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                                                        • Instruction Fuzzy Hash: 3A1142B17442486EDB10EBE68C42FAEB7ACEF49714F50017BB604F72C2DA785D048A69

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message
                                                                                        • String ID: .tmp$y@
                                                                                        • API String ID: 2030045667-2396523267
                                                                                        • Opcode ID: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                                                        • Instruction ID: eba11cc0b212557bcf85e4c41764595d0d3f2f842990b0293eb01d0c1562b25b
                                                                                        • Opcode Fuzzy Hash: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                                                        • Instruction Fuzzy Hash: 9841BD30600200DFC711EF25DE96A5A77A5EB49304B50463AF804B73E2CBB9AC05CBED

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message
                                                                                        • String ID: .tmp$y@
                                                                                        • API String ID: 2030045667-2396523267
                                                                                        • Opcode ID: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                                                        • Instruction ID: fef9de22095f7e51d457e3baefdda2d393bbfb66a144e2f6f14d312cbfdc2d61
                                                                                        • Opcode Fuzzy Hash: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                                                        • Instruction Fuzzy Hash: 3A418D70610204DFC711EF25DED6A5A77A5EB49308B50463AF804B73E2CBB9AC05CBAD

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                        • String ID: .tmp
                                                                                        • API String ID: 1375471231-2986845003
                                                                                        • Opcode ID: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                                                        • Instruction ID: a1094b0e4056d8a2da25745c6e48f9a4b2523a9a3c4edc503687ab74cbc79d39
                                                                                        • Opcode Fuzzy Hash: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                                                        • Instruction Fuzzy Hash: 3A213674A002099BDB05FFA1C9429DEB7B9EF48304F50457BE901B73C2DA7C9E059AA5

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 321 407749-40774a 322 4076dc-4076e6 WriteFile 321->322 323 40774c-40776f 321->323 325 4076e8-4076ea call 40748c 322->325 326 4076ef-4076f2 322->326 324 407770-407785 323->324 327 407787 324->327 328 4077f9 324->328 325->326 330 407700-407704 326->330 331 4076f4-4076fb call 4073ec 326->331 332 40778a-40778f 327->332 333 4077fd-407802 327->333 334 40783b-40783d 328->334 335 4077fb 328->335 331->330 339 407803-407819 332->339 341 407791-407792 332->341 333->339 337 407841-407843 334->337 335->333 340 40785b-40785c 337->340 339->340 349 40781b 339->349 342 4078d6-4078eb call 407890 InterlockedExchange 340->342 343 40785e-40788c 340->343 344 407724-407741 341->344 345 407794-4077b4 341->345 366 407912-407917 342->366 367 4078ed-407910 342->367 360 407820-407823 343->360 361 407890-407893 343->361 348 4077b5 344->348 351 407743 344->351 345->348 355 4077b6-4077b7 348->355 356 4077f7-4077f8 348->356 357 40781e-40781f 349->357 352 407746-407747 351->352 353 4077b9 351->353 352->321 359 4077bb-4077cd 352->359 353->359 355->353 356->328 357->360 359->337 364 4077cf-4077d4 359->364 363 407898 360->363 365 407824 360->365 361->363 368 40789a 363->368 364->334 372 4077d6-4077de 364->372 365->368 370 407825 365->370 367->366 367->367 371 40789f 368->371 373 407896-407897 370->373 374 407826-40782d 370->374 376 4078a1 371->376 372->324 384 4077e0 372->384 373->363 374->376 377 40782f 374->377 381 4078a3 376->381 382 4078ac 376->382 379 407832-407833 377->379 380 4078a5-4078aa 377->380 379->334 379->357 383 4078ae-4078af 380->383 381->380 382->383 383->371 385 4078b1-4078bd 383->385 384->356 385->363 386 4078bf-4078c0 385->386
                                                                                        APIs
                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3934441357-0
                                                                                        • Opcode ID: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                                                        • Instruction ID: ef7112967ca92329f6454244f41010afd6781152a6d2bd16d4b387d8db15cd6b
                                                                                        • Opcode Fuzzy Hash: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                                                        • Instruction Fuzzy Hash: F951D12294D2910FC7126B7849685A53FE0FE5331532E92FBC5C1AB1A3D27CA847D35B

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 387 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                                        • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLibraryLoadMode
                                                                                        • String ID:
                                                                                        • API String ID: 2987862817-0
                                                                                        • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                        • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                                        • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                        • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 397 40766c-407691 SetFilePointer 398 4076a3-4076a8 397->398 399 407693-40769a GetLastError 397->399 399->398 400 40769c-40769e call 40748c 399->400 400->398
                                                                                        APIs
                                                                                        • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                                        • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021203AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$FilePointer
                                                                                        • String ID:
                                                                                        • API String ID: 1156039329-0
                                                                                        • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                        • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                                        • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                        • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 391 40762c-40764a ReadFile 392 407663-40766a 391->392 393 40764c-407650 391->393 394 407652-40765a GetLastError 393->394 395 40765c-40765e call 40748c 393->395 394->392 394->395 395->392
                                                                                        APIs
                                                                                        • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                                        • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastRead
                                                                                        • String ID:
                                                                                        • API String ID: 1948546556-0
                                                                                        • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                        • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                                        • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                        • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 402 4075c4-4075e5 SetFilePointer 403 4075f7-4075f9 402->403 404 4075e7-4075ee GetLastError 402->404 404->403 405 4075f0-4075f2 call 40748c 404->405 405->403
                                                                                        APIs
                                                                                        • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                                        • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021203AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$FilePointer
                                                                                        • String ID:
                                                                                        • API String ID: 1156039329-0
                                                                                        • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                        • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                                        • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                        • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$AllocFree
                                                                                        • String ID:
                                                                                        • API String ID: 2087232378-0
                                                                                        • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                        • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                                        • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                        • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                                                        APIs
                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,004053A6), ref: 0040528F
                                                                                          • Part of subcall function 00404CCC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CE9
                                                                                          • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                        • String ID:
                                                                                        • API String ID: 1658689577-0
                                                                                        • Opcode ID: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                                                        • Instruction ID: 2407abf821673f044c2d0b48b7a4a38d2d1f2757cafa01d062fe92b1f2c090cc
                                                                                        • Opcode Fuzzy Hash: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                                                        • Instruction Fuzzy Hash: 73314D75E0010AABCB00DF95C8C19EEB379FF84304F158977E815BB285E739AE059B98
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                        • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                                        • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                        • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                        • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                                        • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                        • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID:
                                                                                        • API String ID: 3188754299-0
                                                                                        • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                        • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                                        • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                        • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                                        APIs
                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021203AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastWrite
                                                                                        • String ID:
                                                                                        • API String ID: 442123175-0
                                                                                        • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                        • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                                        • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                        • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                                        APIs
                                                                                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FormatMessage
                                                                                        • String ID:
                                                                                        • API String ID: 1306739567-0
                                                                                        • Opcode ID: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                                                        • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                                        • Opcode Fuzzy Hash: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                                                        • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                                        APIs
                                                                                        • SetEndOfFile.KERNEL32(?,02144000,0040A08C,00000000), ref: 004076B3
                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021203AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLast
                                                                                        • String ID:
                                                                                        • API String ID: 734332943-0
                                                                                        • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                        • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                                        • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                        • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode
                                                                                        • String ID:
                                                                                        • API String ID: 2340568224-0
                                                                                        • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                        • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                                        • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                        • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode
                                                                                        • String ID:
                                                                                        • API String ID: 2340568224-0
                                                                                        • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                        • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                                        • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                        • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                                        APIs
                                                                                        • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CharPrev
                                                                                        • String ID:
                                                                                        • API String ID: 122130370-0
                                                                                        • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                        • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                                        • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                        • Instruction Fuzzy Hash:
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                                                        • Instruction ID: 20a67eb23ea55951ef5110b519d4bcc97d420124264edb02c1094051c82f9398
                                                                                        • Opcode Fuzzy Hash: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                                                        • Instruction Fuzzy Hash: D2117571A042059BDB00EF19C881B5B7794AF44359F05807EF958AB3C6DB38EC00CBAA
                                                                                        APIs
                                                                                        • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 1263568516-0
                                                                                        • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                        • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                                        • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                        • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID:
                                                                                        • API String ID: 2962429428-0
                                                                                        • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                        • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                                        • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                        • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                                        APIs
                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 1263568516-0
                                                                                        • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                        • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                                        • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                        • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040949D
                                                                                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004094A2
                                                                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                        • String ID: SeShutdownPrivilege
                                                                                        • API String ID: 107509674-3733053543
                                                                                        • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                        • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                                        • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                        • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                                        APIs
                                                                                        • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409BF6
                                                                                        • SizeofResource.KERNEL32(00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 00409C09
                                                                                        • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000), ref: 00409C1B
                                                                                        • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5), ref: 00409C2C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                        • String ID:
                                                                                        • API String ID: 3473537107-0
                                                                                        • Opcode ID: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                                                        • Instruction ID: ed04ed1443b666af2c347742ca0221af59beed1f1180006ed42e296f861e82c7
                                                                                        • Opcode Fuzzy Hash: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                                                        • Instruction Fuzzy Hash: ECE07EA0B483562AFA6076FB08C2B2A018C4BA671DF40003BB701B92C3DEBD8C14856E
                                                                                        APIs
                                                                                        • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 2299586839-0
                                                                                        • Opcode ID: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                                                        • Instruction ID: 297a7c39c0825e6b478cba46507f56ab37b47465b1590baa0f4eee863dd3b982
                                                                                        • Opcode Fuzzy Hash: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                                                        • Instruction Fuzzy Hash: AED05EA630E6502AE21051AB2D85EBB4A9CCEC5BA4F18407FF648D7242D6248C069B76
                                                                                        APIs
                                                                                        • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: SystemTime
                                                                                        • String ID:
                                                                                        • API String ID: 2656138-0
                                                                                        • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                        • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                                        • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                        • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                                        APIs
                                                                                        • GetVersionExA.KERNEL32(?,004065E0,00000000,004065EE,?,?,?,?,?,00409C65), ref: 00405CF2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Version
                                                                                        • String ID:
                                                                                        • API String ID: 1889659487-0
                                                                                        • Opcode ID: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                                                        • Instruction ID: 3c95a3e10eaf3ff9c271e05f7503c1a51fdcfb4de7972086e3eff1de8b037954
                                                                                        • Opcode Fuzzy Hash: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                                                        • Instruction Fuzzy Hash: FDC012A040070186D7109B31EC02B1672D4AB44310F440539AEA4953C2E73C80018A5A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                                        • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                                        • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                                        • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 0040704D
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 004070A1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressCloseHandleModuleProc
                                                                                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                        • API String ID: 4190037839-2401316094
                                                                                        • Opcode ID: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                                                        • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                                        • Opcode Fuzzy Hash: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                                                        • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                                        • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                                        • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                                        • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                        • String ID:
                                                                                        • API String ID: 1694776339-0
                                                                                        • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                        • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                                        • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                        • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                                        APIs
                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,004055FC,?,?,?,?,00000000,00000000,00000000,?,004065DB,00000000,004065EE), ref: 004053CE
                                                                                          • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                                          • Part of subcall function 00405248: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale$DefaultSystem
                                                                                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                        • API String ID: 1044490935-665933166
                                                                                        • Opcode ID: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                                                        • Instruction ID: af1252b4c964b6680b9f9af4a0d1ea0fc67f86ffa9d2e4d8722b1cefb330e960
                                                                                        • Opcode Fuzzy Hash: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                                                        • Instruction Fuzzy Hash: 25515334B04548ABDB00EBA59C91A9F776AEB89304F50947BB504BB3C6CA3DCE059B5C
                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                                        • LocalFree.KERNEL32(0072FC60,00000000,00401AB4), ref: 00401A1B
                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000,0072FC60,00000000,00401AB4), ref: 00401A3A
                                                                                        • LocalFree.KERNEL32(0072ED10,?,00000000,00008000,0072FC60,00000000,00401AB4), ref: 00401A79
                                                                                        • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                                        • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 3782394904-0
                                                                                        • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                        • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                                        • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                        • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                                        APIs
                                                                                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                                        • ExitProcess.KERNEL32 ref: 00403DE5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExitMessageProcess
                                                                                        • String ID: Error$Runtime error at 00000000$9@
                                                                                        • API String ID: 1220098344-1503883590
                                                                                        • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                        • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                                        • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                        • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$AllocString
                                                                                        • String ID:
                                                                                        • API String ID: 262959230-0
                                                                                        • Opcode ID: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                                                        • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                                        • Opcode Fuzzy Hash: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                                                        • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(00000000,00409C56), ref: 004030E3
                                                                                        • GetCommandLineA.KERNEL32(00000000,00409C56), ref: 004030EE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CommandHandleLineModule
                                                                                        • String ID: U1hd.@$%q
                                                                                        • API String ID: 2123368496-1561265964
                                                                                        • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                        • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                                        • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                        • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                                        APIs
                                                                                        • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                        • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                        • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                        • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                        • String ID:
                                                                                        • API String ID: 730355536-0
                                                                                        • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                                        • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                                        • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                                        • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                                                        APIs
                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,004098D0,00000000), ref: 00406E4C
                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: QueryValue
                                                                                        • String ID: )q@
                                                                                        • API String ID: 3660427363-2284170586
                                                                                        • Opcode ID: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                                                        • Instruction ID: 7350e5e82036d2c0193b98364cdb321f9e6d5b5bf7e48a12e03045d443e4f3bd
                                                                                        • Opcode Fuzzy Hash: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                                                        • Instruction Fuzzy Hash: DC414C31D0021AAFDB21DF95C881BAFB7B8EB05704F56457AE901B7280D738AF108B99
                                                                                        APIs
                                                                                        • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 004094F7
                                                                                        • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409507
                                                                                        • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 0040951A
                                                                                        • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409524
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2956242378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2956215047.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956270871.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2956297662.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastSleep
                                                                                        • String ID:
                                                                                        • API String ID: 1458359878-0
                                                                                        • Opcode ID: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                                                        • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                                        • Opcode Fuzzy Hash: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                                                        • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                                        Execution Graph

                                                                                        Execution Coverage:16%
                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                        Signature Coverage:4.3%
                                                                                        Total number of Nodes:2000
                                                                                        Total number of Limit Nodes:72
                                                                                        execution_graph 49667 40cf00 49668 40cf0d 49667->49668 49670 40cf12 49667->49670 49671 406f50 CloseHandle 49668->49671 49671->49670 55815 4413a4 55816 4413ad 55815->55816 55817 4413bb WriteFile 55815->55817 55816->55817 55818 4413c6 55817->55818 49672 492208 49673 49223c 49672->49673 49674 49223e 49673->49674 49675 492252 49673->49675 49818 446fac 18 API calls 49674->49818 49678 492261 49675->49678 49680 49228e 49675->49680 49677 492247 Sleep 49692 492289 49677->49692 49808 447008 49678->49808 49684 4922ca 49680->49684 49685 49229d 49680->49685 49682 492270 49686 492278 FindWindowA 49682->49686 49690 4922d9 49684->49690 49691 492320 49684->49691 49687 447008 18 API calls 49685->49687 49812 447288 49686->49812 49689 4922aa 49687->49689 49694 4922b2 FindWindowA 49689->49694 49819 446fac 18 API calls 49690->49819 49697 49237c 49691->49697 49698 49232f 49691->49698 49858 403420 49692->49858 49696 447288 5 API calls 49694->49696 49695 4922e5 49820 446fac 18 API calls 49695->49820 49700 4922c5 49696->49700 49707 4923d8 49697->49707 49708 49238b 49697->49708 49823 446fac 18 API calls 49698->49823 49700->49692 49702 4922f2 49821 446fac 18 API calls 49702->49821 49703 49233b 49824 446fac 18 API calls 49703->49824 49706 4922ff 49822 446fac 18 API calls 49706->49822 49718 492412 49707->49718 49719 4923e7 49707->49719 49828 446fac 18 API calls 49708->49828 49710 492348 49825 446fac 18 API calls 49710->49825 49712 492397 49829 446fac 18 API calls 49712->49829 49714 49230a SendMessageA 49717 447288 5 API calls 49714->49717 49716 492355 49826 446fac 18 API calls 49716->49826 49717->49700 49727 492421 49718->49727 49728 492460 49718->49728 49722 447008 18 API calls 49719->49722 49720 4923a4 49830 446fac 18 API calls 49720->49830 49725 4923f4 49722->49725 49724 492360 PostMessageA 49827 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49724->49827 49730 4923fc RegisterClipboardFormatA 49725->49730 49726 4923b1 49831 446fac 18 API calls 49726->49831 49833 446fac 18 API calls 49727->49833 49736 49246f 49728->49736 49737 4924b4 49728->49737 49733 447288 5 API calls 49730->49733 49733->49692 49734 4923bc SendNotifyMessageA 49832 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49734->49832 49735 49242d 49834 446fac 18 API calls 49735->49834 49836 446fac 18 API calls 49736->49836 49746 492508 49737->49746 49747 4924c3 49737->49747 49741 49243a 49835 446fac 18 API calls 49741->49835 49742 49247b 49837 446fac 18 API calls 49742->49837 49745 492445 SendMessageA 49750 447288 5 API calls 49745->49750 49755 49256a 49746->49755 49756 492517 49746->49756 49840 446fac 18 API calls 49747->49840 49749 492488 49838 446fac 18 API calls 49749->49838 49750->49700 49751 4924cf 49841 446fac 18 API calls 49751->49841 49754 492493 PostMessageA 49839 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49754->49839 49763 492579 49755->49763 49764 4925f1 49755->49764 49759 447008 18 API calls 49756->49759 49757 4924dc 49842 446fac 18 API calls 49757->49842 49761 492524 49759->49761 49844 42e3a4 SetErrorMode 49761->49844 49762 4924e7 SendNotifyMessageA 49843 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49762->49843 49767 447008 18 API calls 49763->49767 49773 492600 49764->49773 49774 492626 49764->49774 49771 492588 49767->49771 49768 492531 49769 492547 GetLastError 49768->49769 49770 492537 49768->49770 49775 447288 5 API calls 49769->49775 49772 447288 5 API calls 49770->49772 49847 446fac 18 API calls 49771->49847 49776 492545 49772->49776 49852 446fac 18 API calls 49773->49852 49783 492658 49774->49783 49784 492635 49774->49784 49775->49776 49780 447288 5 API calls 49776->49780 49779 49260a FreeLibrary 49853 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49779->49853 49780->49692 49781 49259b GetProcAddress 49785 4925e1 49781->49785 49786 4925a7 49781->49786 49791 492667 49783->49791 49797 49269b 49783->49797 49787 447008 18 API calls 49784->49787 49851 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49785->49851 49848 446fac 18 API calls 49786->49848 49789 492641 49787->49789 49795 492649 CreateMutexA 49789->49795 49854 48c638 18 API calls 49791->49854 49792 4925b3 49849 446fac 18 API calls 49792->49849 49795->49692 49796 4925c0 49800 447288 5 API calls 49796->49800 49797->49692 49856 48c638 18 API calls 49797->49856 49799 492673 49801 492684 OemToCharBuffA 49799->49801 49802 4925d1 49800->49802 49855 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49801->49855 49850 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49802->49850 49805 4926b6 49806 4926c7 CharToOemBuffA 49805->49806 49857 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49806->49857 49809 447010 49808->49809 49862 436088 49809->49862 49811 44702f 49811->49682 49813 447290 49812->49813 49916 4363f0 VariantClear 49813->49916 49815 4472ca 49815->49692 49816 4472b3 49816->49815 49917 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49816->49917 49818->49677 49819->49695 49820->49702 49821->49706 49822->49714 49823->49703 49824->49710 49825->49716 49826->49724 49827->49700 49828->49712 49829->49720 49830->49726 49831->49734 49832->49692 49833->49735 49834->49741 49835->49745 49836->49742 49837->49749 49838->49754 49839->49700 49840->49751 49841->49757 49842->49762 49843->49692 49918 403738 49844->49918 49847->49781 49848->49792 49849->49796 49850->49700 49851->49700 49852->49779 49853->49692 49854->49799 49855->49692 49856->49805 49857->49692 49860 403426 49858->49860 49859 40344b 49860->49859 49861 402660 4 API calls 49860->49861 49861->49860 49863 436094 49862->49863 49879 4360b6 49862->49879 49863->49879 49882 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49863->49882 49864 436139 49891 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49864->49891 49866 436121 49886 403494 49866->49886 49867 436109 49871 403510 4 API calls 49867->49871 49868 4360fd 49883 403510 49868->49883 49869 43612d 49890 4040e8 18 API calls 49869->49890 49876 436112 49871->49876 49875 43614a 49875->49811 49876->49811 49877 436115 49877->49811 49879->49864 49879->49866 49879->49867 49879->49868 49879->49869 49879->49877 49880 436136 49880->49811 49882->49879 49892 4034e0 49883->49892 49888 403498 49886->49888 49887 4034ba 49887->49811 49888->49887 49889 402660 4 API calls 49888->49889 49889->49887 49890->49880 49891->49875 49897 4034bc 49892->49897 49894 4034f0 49902 403400 49894->49902 49898 4034c0 49897->49898 49899 4034dc 49897->49899 49906 402648 49898->49906 49899->49894 49901 4034c9 49901->49894 49903 403406 49902->49903 49904 40341f 49902->49904 49903->49904 49911 402660 49903->49911 49904->49811 49907 40264c 49906->49907 49908 402656 49906->49908 49907->49908 49910 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49907->49910 49908->49901 49908->49908 49910->49908 49912 402664 49911->49912 49913 40266e 49911->49913 49912->49913 49915 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49912->49915 49913->49904 49913->49913 49915->49913 49916->49816 49917->49815 49919 40373c LoadLibraryA 49918->49919 49919->49768 49920 402584 49921 402598 49920->49921 49922 4025ab 49920->49922 49950 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49921->49950 49924 4025c2 RtlEnterCriticalSection 49922->49924 49925 4025cc 49922->49925 49924->49925 49936 4023b4 13 API calls 49925->49936 49926 40259d 49926->49922 49928 4025a1 49926->49928 49929 4025d5 49930 4025d9 49929->49930 49937 402088 49929->49937 49932 402635 49930->49932 49933 40262b RtlLeaveCriticalSection 49930->49933 49933->49932 49934 4025e5 49934->49930 49951 402210 9 API calls 49934->49951 49936->49929 49938 40209c 49937->49938 49939 4020af 49937->49939 49958 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49938->49958 49941 4020c6 RtlEnterCriticalSection 49939->49941 49944 4020d0 49939->49944 49941->49944 49942 4020a1 49942->49939 49943 4020a5 49942->49943 49947 402106 49943->49947 49944->49947 49952 401f94 49944->49952 49947->49934 49948 4021f1 RtlLeaveCriticalSection 49949 4021fb 49948->49949 49949->49934 49950->49926 49951->49930 49955 401fa4 49952->49955 49953 401fd0 49957 401ff4 49953->49957 49964 401db4 49953->49964 49955->49953 49955->49957 49959 401f0c 49955->49959 49957->49948 49957->49949 49958->49942 49968 40178c 49959->49968 49962 401f29 49962->49955 49965 401e02 49964->49965 49966 401dd2 49964->49966 49965->49966 49991 401d1c 49965->49991 49966->49957 49972 4017a8 49968->49972 49970 4017b2 49987 401678 VirtualAlloc 49970->49987 49972->49970 49973 40180f 49972->49973 49976 401803 49972->49976 49979 4014e4 49972->49979 49988 4013e0 LocalAlloc 49972->49988 49973->49962 49978 401e80 9 API calls 49973->49978 49975 4017be 49975->49973 49989 4015c0 VirtualFree 49976->49989 49978->49962 49980 4014f3 VirtualAlloc 49979->49980 49982 401520 49980->49982 49983 401543 49980->49983 49990 401398 LocalAlloc 49982->49990 49983->49972 49985 40152c 49985->49983 49986 401530 VirtualFree 49985->49986 49986->49983 49987->49975 49988->49972 49989->49973 49990->49985 49992 401d2e 49991->49992 49993 401d51 49992->49993 49994 401d63 49992->49994 50004 401940 49993->50004 49995 401940 3 API calls 49994->49995 49997 401d61 49995->49997 49998 401d79 49997->49998 50014 401bf8 9 API calls 49997->50014 49998->49966 50000 401d88 50001 401da2 50000->50001 50015 401c4c 9 API calls 50000->50015 50016 401454 LocalAlloc 50001->50016 50005 401966 50004->50005 50013 4019bf 50004->50013 50017 40170c 50005->50017 50009 401983 50010 40199a 50009->50010 50022 4015c0 VirtualFree 50009->50022 50010->50013 50023 401454 LocalAlloc 50010->50023 50013->49997 50014->50000 50015->50001 50016->49998 50019 401743 50017->50019 50018 401783 50021 4013e0 LocalAlloc 50018->50021 50019->50018 50020 40175d VirtualFree 50019->50020 50020->50019 50021->50009 50022->50010 50023->50013 55819 48042c 55824 450ff0 55819->55824 55821 480440 55834 47f518 55821->55834 55823 480464 55825 450ffd 55824->55825 55827 451051 55825->55827 55840 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55825->55840 55828 450e74 InterlockedExchange 55827->55828 55829 451063 55828->55829 55831 451079 55829->55831 55841 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55829->55841 55833 4510bc 55831->55833 55842 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55831->55842 55833->55821 55843 40b5c8 55834->55843 55836 47f585 55836->55823 55837 4069e4 4 API calls 55839 47f53a 55837->55839 55839->55836 55839->55837 55847 4768b0 55839->55847 55840->55827 55841->55831 55842->55833 55844 40b5d3 55843->55844 55845 40b5f3 55844->55845 55863 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55844->55863 55845->55839 55857 47692a 55847->55857 55861 4768e1 55847->55861 55848 476975 55864 451280 55848->55864 55849 451280 21 API calls 55849->55861 55851 47698c 55853 403420 4 API calls 55851->55853 55852 4038a4 4 API calls 55852->55861 55855 4769a6 55853->55855 55854 4038a4 4 API calls 55854->55857 55855->55839 55856 403450 4 API calls 55856->55861 55857->55848 55857->55854 55859 403744 4 API calls 55857->55859 55860 403450 4 API calls 55857->55860 55862 451280 21 API calls 55857->55862 55858 403744 4 API calls 55858->55861 55859->55857 55860->55857 55861->55849 55861->55852 55861->55856 55861->55857 55861->55858 55862->55857 55863->55845 55865 451290 55864->55865 55866 45129b 55864->55866 55865->55851 55870 451224 21 API calls 55866->55870 55868 4512a6 55868->55865 55871 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55868->55871 55870->55868 55871->55865 55872 41ee64 55873 41ee73 IsWindowVisible 55872->55873 55874 41eea9 55872->55874 55873->55874 55875 41ee7d IsWindowEnabled 55873->55875 55875->55874 55876 41ee87 55875->55876 55877 402648 4 API calls 55876->55877 55878 41ee91 EnableWindow 55877->55878 55878->55874 55879 41fb68 55880 41fb71 55879->55880 55883 41fe0c 55880->55883 55882 41fb7e 55884 41fefe 55883->55884 55885 41fe23 55883->55885 55884->55882 55885->55884 55904 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 55885->55904 55887 41fe59 55888 41fe83 55887->55888 55889 41fe5d 55887->55889 55914 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 55888->55914 55905 41fbac 55889->55905 55893 41fe91 55895 41fe95 55893->55895 55896 41febb 55893->55896 55894 41fbac 10 API calls 55897 41fe81 55894->55897 55898 41fbac 10 API calls 55895->55898 55899 41fbac 10 API calls 55896->55899 55897->55882 55901 41fea7 55898->55901 55900 41fecd 55899->55900 55902 41fbac 10 API calls 55900->55902 55903 41fbac 10 API calls 55901->55903 55902->55897 55903->55897 55904->55887 55906 41fbc7 55905->55906 55907 41f94c 4 API calls 55906->55907 55908 41fbdd 55906->55908 55907->55908 55915 41f94c 55908->55915 55910 41fc25 55911 41fc48 SetScrollInfo 55910->55911 55923 41faac 55911->55923 55914->55893 55916 4181f0 55915->55916 55917 41f969 GetWindowLongA 55916->55917 55918 41f9a6 55917->55918 55919 41f986 55917->55919 55935 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 55918->55935 55934 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 55919->55934 55922 41f992 55922->55910 55924 41faba 55923->55924 55925 41fac2 55923->55925 55924->55894 55926 41fb01 55925->55926 55927 41faf1 55925->55927 55933 41faff 55925->55933 55937 417e58 IsWindowVisible ScrollWindow SetWindowPos 55926->55937 55936 417e58 IsWindowVisible ScrollWindow SetWindowPos 55927->55936 55928 41fb41 GetScrollPos 55928->55924 55931 41fb4c 55928->55931 55932 41fb5b SetScrollPos 55931->55932 55932->55924 55933->55928 55934->55922 55935->55922 55936->55933 55937->55933 55938 4205a8 55939 4205bb 55938->55939 55959 415b40 55939->55959 55941 4205f6 55942 420702 55941->55942 55943 420661 55941->55943 55952 420652 MulDiv 55941->55952 55946 420719 55942->55946 55966 4146e4 KiUserCallbackDispatcher 55942->55966 55964 420858 20 API calls 55943->55964 55945 420730 55949 420752 55945->55949 55968 420070 12 API calls 55945->55968 55946->55945 55967 414728 KiUserCallbackDispatcher 55946->55967 55951 42067a 55951->55942 55965 420070 12 API calls 55951->55965 55963 41a314 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 55952->55963 55955 420697 55956 4206b3 MulDiv 55955->55956 55957 4206d6 55955->55957 55956->55957 55957->55942 55958 4206df MulDiv 55957->55958 55958->55942 55960 415b52 55959->55960 55969 414480 55960->55969 55962 415b6a 55962->55941 55963->55943 55964->55951 55965->55955 55966->55946 55967->55945 55968->55949 55970 41449a 55969->55970 55973 410658 55970->55973 55972 4144b0 55972->55962 55976 40dea4 55973->55976 55975 41065e 55975->55972 55977 40df06 55976->55977 55978 40deb7 55976->55978 55983 40df14 55977->55983 55981 40df14 19 API calls 55978->55981 55982 40dee1 55981->55982 55982->55975 55985 40df24 55983->55985 55986 40df3a 55985->55986 55995 40e29c 55985->55995 56011 40d7e0 55985->56011 56014 40e14c 55986->56014 55989 40d7e0 5 API calls 55990 40df42 55989->55990 55990->55989 55991 40dfae 55990->55991 56017 40dd60 55990->56017 55993 40e14c 5 API calls 55991->55993 55994 40df10 55993->55994 55994->55975 56031 40eb6c 55995->56031 55997 403778 4 API calls 55999 40e2d7 55997->55999 55998 40e38d 56000 40e3b7 55998->56000 56001 40e3a8 55998->56001 55999->55997 55999->55998 56094 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 55999->56094 56095 40e280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 55999->56095 56091 40bc24 56000->56091 56040 40e5c0 56001->56040 56006 40e3b5 56008 403400 4 API calls 56006->56008 56009 40e45c 56008->56009 56009->55985 56012 40ec08 5 API calls 56011->56012 56013 40d7ea 56012->56013 56013->55985 56128 40d6bc 56014->56128 56137 40e154 56017->56137 56020 40eb6c 5 API calls 56021 40dd9e 56020->56021 56022 40eb6c 5 API calls 56021->56022 56023 40dda9 56022->56023 56024 40ddc4 56023->56024 56025 40ddbb 56023->56025 56030 40ddc1 56023->56030 56144 40dbd8 56024->56144 56147 40dcc8 19 API calls 56025->56147 56028 403420 4 API calls 56029 40de8f 56028->56029 56029->55990 56030->56028 56097 40d980 56031->56097 56034 4034e0 4 API calls 56035 40eb8f 56034->56035 56036 403744 4 API calls 56035->56036 56037 40eb96 56036->56037 56038 40d980 5 API calls 56037->56038 56039 40eba4 56038->56039 56039->55999 56041 40e5f6 56040->56041 56042 40e5ec 56040->56042 56044 40e711 56041->56044 56045 40e695 56041->56045 56046 40e6f6 56041->56046 56047 40e776 56041->56047 56048 40e638 56041->56048 56049 40e6d9 56041->56049 56050 40e67a 56041->56050 56051 40e6bb 56041->56051 56064 40e65c 56041->56064 56102 40d640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56042->56102 56055 40d964 5 API calls 56044->56055 56110 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56045->56110 56115 40ea90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56046->56115 56059 40d964 5 API calls 56047->56059 56103 40d964 56048->56103 56113 40eba8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56049->56113 56109 40da18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56050->56109 56112 40dfe4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56051->56112 56063 40e719 56055->56063 56058 403400 4 API calls 56065 40e7eb 56058->56065 56066 40e77e 56059->56066 56062 40e6a0 56111 40d670 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56062->56111 56074 40e723 56063->56074 56075 40e71d 56063->56075 56064->56058 56065->56006 56068 40e782 56066->56068 56069 40e79b 56066->56069 56067 40e6e4 56114 409f38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56067->56114 56076 40ec08 5 API calls 56068->56076 56122 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56069->56122 56071 40e661 56108 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56071->56108 56072 40e644 56106 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56072->56106 56116 40ec08 56074->56116 56080 40e73c 56075->56080 56084 40e721 56075->56084 56076->56064 56082 40ec08 5 API calls 56080->56082 56085 40e744 56082->56085 56083 40e64f 56107 40e46c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56083->56107 56120 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56084->56120 56119 40daa0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56085->56119 56088 40e766 56121 40e4d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56088->56121 56123 40bbd0 56091->56123 56094->55999 56095->55999 56096 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56096->56006 56100 40d98b 56097->56100 56098 40d9c5 56098->56034 56100->56098 56101 40d9cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56100->56101 56101->56100 56102->56041 56104 40ec08 5 API calls 56103->56104 56105 40d96e 56104->56105 56105->56071 56105->56072 56106->56083 56107->56064 56108->56064 56109->56064 56110->56062 56111->56064 56112->56064 56113->56067 56114->56064 56115->56064 56117 40d980 5 API calls 56116->56117 56118 40ec15 56117->56118 56118->56064 56119->56064 56120->56088 56121->56064 56122->56064 56124 40bbe2 56123->56124 56125 40bc07 56123->56125 56124->56125 56127 40bc84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56124->56127 56125->56006 56125->56096 56127->56125 56129 40ec08 5 API calls 56128->56129 56130 40d6c9 56129->56130 56131 40d6dc 56130->56131 56135 40ed0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56130->56135 56131->55990 56133 40d6d7 56136 40d658 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56133->56136 56135->56133 56136->56131 56138 40d964 5 API calls 56137->56138 56139 40e16b 56138->56139 56140 40ec08 5 API calls 56139->56140 56143 40dd93 56139->56143 56141 40e178 56140->56141 56141->56143 56148 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56141->56148 56143->56020 56149 40ad7c 19 API calls 56144->56149 56146 40dc00 56146->56030 56147->56030 56148->56143 56149->56146 50024 491444 50025 49147e 50024->50025 50026 49148a 50025->50026 50027 491480 50025->50027 50029 491499 50026->50029 50030 4914c2 50026->50030 50220 4090a0 MessageBeep 50027->50220 50032 447008 18 API calls 50029->50032 50036 4914fa 50030->50036 50037 4914d1 50030->50037 50031 403420 4 API calls 50034 491ad6 50031->50034 50033 4914a6 50032->50033 50221 406bb8 50033->50221 50038 403400 4 API calls 50034->50038 50044 491509 50036->50044 50045 491532 50036->50045 50041 447008 18 API calls 50037->50041 50039 491ade 50038->50039 50043 4914de 50041->50043 50229 406c08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50043->50229 50047 447008 18 API calls 50044->50047 50052 49155a 50045->50052 50053 491541 50045->50053 50049 491516 50047->50049 50048 4914e9 50230 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50048->50230 50231 406c3c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50049->50231 50058 491569 50052->50058 50059 49158e 50052->50059 50233 407288 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 50053->50233 50054 491521 50232 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50054->50232 50057 491549 50234 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50057->50234 50061 447008 18 API calls 50058->50061 50064 49159d 50059->50064 50065 4915c6 50059->50065 50062 491576 50061->50062 50235 4072b0 50062->50235 50067 447008 18 API calls 50064->50067 50071 4915fe 50065->50071 50072 4915d5 50065->50072 50066 49157e 50238 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50066->50238 50068 4915aa 50067->50068 50239 42c814 50068->50239 50077 49164a 50071->50077 50078 49160d 50071->50078 50074 447008 18 API calls 50072->50074 50076 4915e2 50074->50076 50249 407200 8 API calls 50076->50249 50085 491659 50077->50085 50086 491682 50077->50086 50080 447008 18 API calls 50078->50080 50082 49161c 50080->50082 50081 4915ed 50250 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50081->50250 50084 447008 18 API calls 50082->50084 50088 49162d 50084->50088 50089 447008 18 API calls 50085->50089 50094 4916ba 50086->50094 50095 491691 50086->50095 50087 491485 50087->50031 50251 491148 8 API calls 50088->50251 50090 491666 50089->50090 50253 42c8b4 50090->50253 50093 491639 50252 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50093->50252 50101 4916c9 50094->50101 50102 4916f2 50094->50102 50098 447008 18 API calls 50095->50098 50100 49169e 50098->50100 50259 42c8dc 50100->50259 50104 447008 18 API calls 50101->50104 50109 49172a 50102->50109 50110 491701 50102->50110 50106 4916d6 50104->50106 50268 42c90c LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50106->50268 50115 491739 50109->50115 50116 491762 50109->50116 50112 447008 18 API calls 50110->50112 50111 4916e1 50269 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50111->50269 50114 49170e 50112->50114 50270 42c93c 50114->50270 50119 447008 18 API calls 50115->50119 50122 4917ae 50116->50122 50123 491771 50116->50123 50121 491746 50119->50121 50276 42c964 50121->50276 50130 4917bd 50122->50130 50131 491800 50122->50131 50125 447008 18 API calls 50123->50125 50127 491780 50125->50127 50129 447008 18 API calls 50127->50129 50132 491791 50129->50132 50133 447008 18 API calls 50130->50133 50137 49180f 50131->50137 50138 491873 50131->50138 50282 42c508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50132->50282 50135 4917d0 50133->50135 50139 447008 18 API calls 50135->50139 50136 49179d 50283 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50136->50283 50142 447008 18 API calls 50137->50142 50146 4918b2 50138->50146 50147 491882 50138->50147 50140 4917e1 50139->50140 50284 491340 12 API calls 50140->50284 50144 49181c 50142->50144 50212 42c618 7 API calls 50144->50212 50145 4917ef 50285 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50145->50285 50155 4918f1 50146->50155 50156 4918c1 50146->50156 50150 447008 18 API calls 50147->50150 50152 49188f 50150->50152 50151 49182a 50153 49182e 50151->50153 50154 491863 50151->50154 50288 4528f4 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 50152->50288 50159 447008 18 API calls 50153->50159 50287 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50154->50287 50169 491930 50155->50169 50170 491900 50155->50170 50160 447008 18 API calls 50156->50160 50162 49183d 50159->50162 50164 4918ce 50160->50164 50161 49189c 50289 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50161->50289 50213 452c6c 50162->50213 50290 45275c 50164->50290 50166 4918ad 50166->50087 50167 49184d 50286 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50167->50286 50177 491978 50169->50177 50178 49193f 50169->50178 50173 447008 18 API calls 50170->50173 50172 4918db 50297 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50172->50297 50174 49190d 50173->50174 50298 452dfc Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 50174->50298 50183 4919c0 50177->50183 50184 491987 50177->50184 50180 447008 18 API calls 50178->50180 50179 49191a 50299 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50179->50299 50182 49194e 50180->50182 50185 447008 18 API calls 50182->50185 50189 4919d3 50183->50189 50196 491a89 50183->50196 50186 447008 18 API calls 50184->50186 50187 49195f 50185->50187 50188 491996 50186->50188 50193 447288 5 API calls 50187->50193 50190 447008 18 API calls 50188->50190 50191 447008 18 API calls 50189->50191 50192 4919a7 50190->50192 50194 491a00 50191->50194 50199 447288 5 API calls 50192->50199 50193->50087 50195 447008 18 API calls 50194->50195 50197 491a17 50195->50197 50196->50087 50303 446fac 18 API calls 50196->50303 50300 407de4 7 API calls 50197->50300 50199->50087 50200 491aa2 50304 42e8d8 FormatMessageA 50200->50304 50205 491a39 50206 447008 18 API calls 50205->50206 50207 491a4d 50206->50207 50301 408510 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50207->50301 50209 491a58 50302 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50209->50302 50211 491a64 50212->50151 50309 452710 50213->50309 50215 452c89 50215->50167 50216 452c85 50216->50215 50217 452cad MoveFileA GetLastError 50216->50217 50315 45274c 50217->50315 50220->50087 50222 406bc7 50221->50222 50223 406be0 50222->50223 50224 406be9 50222->50224 50225 403400 4 API calls 50223->50225 50318 403778 50224->50318 50226 406be7 50225->50226 50228 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50226->50228 50228->50087 50229->50048 50230->50087 50231->50054 50232->50087 50233->50057 50234->50087 50236 403738 50235->50236 50237 4072ba SetCurrentDirectoryA 50236->50237 50237->50066 50238->50087 50240 403738 50239->50240 50241 42c837 GetFullPathNameA 50240->50241 50242 42c843 50241->50242 50243 42c85a 50241->50243 50242->50243 50244 42c84b 50242->50244 50245 403494 4 API calls 50243->50245 50246 4034e0 4 API calls 50244->50246 50247 42c858 50245->50247 50246->50247 50248 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50247->50248 50248->50087 50249->50081 50250->50087 50251->50093 50252->50087 50325 42c7ac 50253->50325 50256 403778 4 API calls 50257 42c8d5 50256->50257 50258 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50257->50258 50258->50087 50340 42c684 50259->50340 50262 42c8f0 50264 403400 4 API calls 50262->50264 50263 42c8f9 50265 403778 4 API calls 50263->50265 50266 42c8f7 50264->50266 50265->50266 50267 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50266->50267 50267->50087 50268->50111 50269->50087 50271 42c7ac IsDBCSLeadByte 50270->50271 50272 42c94c 50271->50272 50273 403778 4 API calls 50272->50273 50274 42c95e 50273->50274 50275 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50274->50275 50275->50087 50277 42c7ac IsDBCSLeadByte 50276->50277 50278 42c974 50277->50278 50279 403778 4 API calls 50278->50279 50280 42c985 50279->50280 50281 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50280->50281 50281->50087 50282->50136 50283->50087 50284->50145 50285->50087 50286->50087 50287->50087 50288->50161 50289->50166 50291 452710 2 API calls 50290->50291 50292 452772 50291->50292 50293 452776 50292->50293 50294 452794 CreateDirectoryA GetLastError 50292->50294 50293->50172 50295 45274c Wow64RevertWow64FsRedirection 50294->50295 50296 4527ba 50295->50296 50296->50172 50297->50087 50298->50179 50299->50087 50300->50205 50301->50209 50302->50211 50303->50200 50305 42e8fe 50304->50305 50306 4034e0 4 API calls 50305->50306 50307 42e91b 50306->50307 50308 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50307->50308 50308->50087 50310 45271e 50309->50310 50311 45271a 50309->50311 50312 452727 Wow64DisableWow64FsRedirection 50310->50312 50313 452740 SetLastError 50310->50313 50311->50216 50314 45273b 50312->50314 50313->50314 50314->50216 50316 452751 Wow64RevertWow64FsRedirection 50315->50316 50317 45275b 50315->50317 50316->50317 50317->50167 50319 4037aa 50318->50319 50321 40377d 50318->50321 50320 403400 4 API calls 50319->50320 50322 4037a0 50320->50322 50321->50319 50323 403791 50321->50323 50322->50226 50324 4034e0 4 API calls 50323->50324 50324->50322 50330 42c68c 50325->50330 50327 42c80b 50327->50256 50329 42c7c1 50329->50327 50337 42c454 IsDBCSLeadByte 50329->50337 50333 42c69d 50330->50333 50331 42c701 50334 42c6fc 50331->50334 50339 42c454 IsDBCSLeadByte 50331->50339 50333->50331 50335 42c6bb 50333->50335 50334->50329 50335->50334 50338 42c454 IsDBCSLeadByte 50335->50338 50337->50329 50338->50335 50339->50334 50341 42c68c IsDBCSLeadByte 50340->50341 50342 42c68b 50341->50342 50342->50262 50342->50263 50343 41364c SetWindowLongA GetWindowLongA 50344 4136a9 SetPropA SetPropA 50343->50344 50345 41368b GetWindowLongA 50343->50345 50349 41f3ac 50344->50349 50345->50344 50346 41369a SetWindowLongA 50345->50346 50346->50344 50354 423a94 50349->50354 50361 415280 50349->50361 50368 423c1c 50349->50368 50350 4136f9 50355 423b1d 50354->50355 50356 423aa4 50354->50356 50355->50350 50356->50355 50357 423aaa EnumWindows 50356->50357 50357->50355 50358 423ac6 GetWindow GetWindowLongA 50357->50358 50462 423a2c GetWindow 50357->50462 50359 423ae5 50358->50359 50359->50355 50360 423b11 SetWindowPos 50359->50360 50360->50355 50360->50359 50362 41528d 50361->50362 50363 4152f3 50362->50363 50364 4152e8 50362->50364 50367 4152f1 50362->50367 50465 424b9c 13 API calls 50363->50465 50364->50367 50466 41506c 46 API calls 50364->50466 50367->50350 50371 423c52 50368->50371 50402 423c73 50371->50402 50467 423b78 50371->50467 50372 423cfc 50374 423d03 50372->50374 50375 423d37 50372->50375 50373 423c9d 50376 423ca3 50373->50376 50377 423d60 50373->50377 50380 423d09 50374->50380 50412 423fc1 50374->50412 50383 423d42 50375->50383 50384 4240aa IsIconic 50375->50384 50381 423cd5 50376->50381 50382 423ca8 50376->50382 50378 423d72 50377->50378 50379 423d7b 50377->50379 50387 423d88 50378->50387 50388 423d79 50378->50388 50476 4241a4 11 API calls 50379->50476 50390 423f23 SendMessageA 50380->50390 50401 423d17 50380->50401 50381->50402 50413 423cee 50381->50413 50414 423e4f 50381->50414 50392 423e06 50382->50392 50393 423cae 50382->50393 50385 4240e6 50383->50385 50386 423d4b 50383->50386 50391 4240be GetFocus 50384->50391 50384->50402 50511 424860 WinHelpA PostMessageA 50385->50511 50395 4240fd 50386->50395 50403 423cd0 50386->50403 50477 4241ec IsIconic 50387->50477 50485 423b94 NtdllDefWindowProc_A 50388->50485 50390->50402 50397 4240cf 50391->50397 50391->50402 50489 423b94 NtdllDefWindowProc_A 50392->50489 50398 423cb7 50393->50398 50399 423e2e PostMessageA 50393->50399 50410 424106 50395->50410 50411 42411b 50395->50411 50510 41f004 GetCurrentThreadId 73A25940 50397->50510 50407 423cc0 50398->50407 50408 423eb5 50398->50408 50495 423b94 NtdllDefWindowProc_A 50399->50495 50401->50402 50401->50403 50441 423f66 50401->50441 50402->50350 50403->50402 50475 423b94 NtdllDefWindowProc_A 50403->50475 50417 423cc9 50407->50417 50418 423dde IsIconic 50407->50418 50419 423ebe 50408->50419 50420 423eef 50408->50420 50409 423e49 50409->50402 50512 4244e4 50410->50512 50518 42453c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 50411->50518 50412->50402 50436 423fe7 IsWindowEnabled 50412->50436 50413->50403 50422 423e1b 50413->50422 50471 423b94 NtdllDefWindowProc_A 50414->50471 50416 4240d6 50416->50402 50426 4240de SetFocus 50416->50426 50417->50403 50427 423da1 50417->50427 50429 423dfa 50418->50429 50430 423dee 50418->50430 50497 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50419->50497 50472 423b94 NtdllDefWindowProc_A 50420->50472 50490 424188 50422->50490 50425 423e55 50433 423e93 50425->50433 50434 423e71 50425->50434 50426->50402 50427->50402 50486 422c5c ShowWindow PostMessageA PostQuitMessage 50427->50486 50488 423b94 NtdllDefWindowProc_A 50429->50488 50487 423bd0 15 API calls 50430->50487 50442 423a94 6 API calls 50433->50442 50496 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50434->50496 50435 423ec6 50444 423ed8 50435->50444 50498 41ef68 50435->50498 50436->50402 50445 423ff5 50436->50445 50439 423ef5 50446 423f0d 50439->50446 50473 41eeb4 GetCurrentThreadId 73A25940 50439->50473 50441->50402 50449 423f88 IsWindowEnabled 50441->50449 50450 423e9b PostMessageA 50442->50450 50504 423b94 NtdllDefWindowProc_A 50444->50504 50455 423ffc IsWindowVisible 50445->50455 50447 423a94 6 API calls 50446->50447 50447->50402 50448 423e79 PostMessageA 50448->50402 50449->50402 50454 423f96 50449->50454 50450->50402 50505 412320 7 API calls 50454->50505 50455->50402 50457 42400a GetFocus 50455->50457 50506 4181f0 50457->50506 50459 42401f SetFocus 50508 415250 50459->50508 50463 423a4d GetWindowLongA 50462->50463 50464 423a59 50462->50464 50463->50464 50465->50367 50466->50367 50468 423b82 50467->50468 50469 423b8d 50467->50469 50468->50469 50519 408728 GetSystemDefaultLCID 50468->50519 50469->50372 50469->50373 50471->50425 50472->50439 50474 41ef39 50473->50474 50474->50446 50475->50402 50476->50402 50478 424233 50477->50478 50479 4241fd SetActiveWindow 50477->50479 50478->50402 50594 42365c 50479->50594 50483 42421a 50483->50478 50484 42422d SetFocus 50483->50484 50484->50478 50485->50402 50486->50402 50487->50402 50488->50402 50489->50402 50607 41db40 50490->50607 50493 4241a0 50493->50402 50494 424194 LoadIconA 50494->50493 50495->50409 50496->50448 50497->50435 50499 41ef70 IsWindow 50498->50499 50500 41ef9c 50498->50500 50501 41ef8a 50499->50501 50502 41ef7f EnableWindow 50499->50502 50500->50444 50501->50499 50501->50500 50503 402660 4 API calls 50501->50503 50502->50501 50503->50501 50504->50402 50505->50402 50507 4181fa 50506->50507 50507->50459 50509 41526b SetFocus 50508->50509 50509->50402 50510->50416 50511->50409 50513 4244f0 50512->50513 50514 42450a 50512->50514 50515 4244f7 SendMessageA 50513->50515 50517 42451f 50513->50517 50516 402648 4 API calls 50514->50516 50515->50517 50516->50517 50517->50402 50518->50409 50574 408570 GetLocaleInfoA 50519->50574 50524 408570 5 API calls 50525 40877d 50524->50525 50526 408570 5 API calls 50525->50526 50527 4087a1 50526->50527 50586 4085bc GetLocaleInfoA 50527->50586 50530 4085bc GetLocaleInfoA 50531 4087d1 50530->50531 50532 408570 5 API calls 50531->50532 50533 4087eb 50532->50533 50534 4085bc GetLocaleInfoA 50533->50534 50535 408808 50534->50535 50536 408570 5 API calls 50535->50536 50537 408822 50536->50537 50538 403450 4 API calls 50537->50538 50539 40882f 50538->50539 50540 408570 5 API calls 50539->50540 50541 408844 50540->50541 50542 403450 4 API calls 50541->50542 50543 408851 50542->50543 50544 4085bc GetLocaleInfoA 50543->50544 50545 40885f 50544->50545 50546 408570 5 API calls 50545->50546 50547 408879 50546->50547 50548 403450 4 API calls 50547->50548 50549 408886 50548->50549 50550 408570 5 API calls 50549->50550 50551 40889b 50550->50551 50552 403450 4 API calls 50551->50552 50553 4088a8 50552->50553 50554 408570 5 API calls 50553->50554 50555 4088bd 50554->50555 50556 4088da 50555->50556 50557 4088cb 50555->50557 50558 403494 4 API calls 50556->50558 50559 403494 4 API calls 50557->50559 50575 408597 50574->50575 50576 4085a9 50574->50576 50577 4034e0 4 API calls 50575->50577 50578 403494 4 API calls 50576->50578 50579 4085a7 50577->50579 50578->50579 50580 403450 50579->50580 50581 403454 50580->50581 50584 403464 50580->50584 50583 4034bc 4 API calls 50581->50583 50581->50584 50582 403490 50582->50524 50583->50584 50584->50582 50585 402660 4 API calls 50584->50585 50585->50582 50587 4085d8 50586->50587 50587->50530 50603 423608 SystemParametersInfoA 50594->50603 50596 423675 ShowWindow 50599 423680 50596->50599 50600 423687 50596->50600 50606 423638 SystemParametersInfoA 50599->50606 50602 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50600->50602 50602->50483 50604 423626 50603->50604 50604->50596 50605 423638 SystemParametersInfoA 50604->50605 50605->50596 50606->50600 50610 41db64 50607->50610 50611 41db4a 50610->50611 50612 41db71 50610->50612 50611->50493 50611->50494 50612->50611 50619 40cc80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50612->50619 50614 41db8e 50614->50611 50615 41dba8 50614->50615 50616 41db9b 50614->50616 50620 41bd9c 11 API calls 50615->50620 50621 41b398 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50616->50621 50619->50614 50620->50611 50621->50611 50622 4804c6 50623 4804cf 50622->50623 50625 4804fa 50622->50625 50624 4804ec 50623->50624 50623->50625 51034 476b6c 188 API calls 50624->51034 50627 480539 50625->50627 51036 47efb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50625->51036 50628 48055d 50627->50628 50631 480550 50627->50631 50632 480552 50627->50632 50634 480599 50628->50634 50635 48057b 50628->50635 50630 48052c 51037 47f018 42 API calls 50630->51037 50641 47eff4 42 API calls 50631->50641 51038 47f088 42 API calls 50632->51038 50633 4804f1 50633->50625 51035 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50633->51035 51041 47ee48 24 API calls 50634->51041 50638 480590 50635->50638 51039 47f018 42 API calls 50635->51039 51040 47ee48 24 API calls 50638->51040 50641->50628 50644 480597 50645 4805a9 50644->50645 50646 4805af 50644->50646 50647 4805ad 50645->50647 50748 47eff4 50645->50748 50646->50647 50649 47eff4 42 API calls 50646->50649 50753 47c3a4 50647->50753 50649->50647 51110 47eadc 42 API calls 50748->51110 50750 47f00f 51111 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50750->51111 51112 42d8a8 GetWindowsDirectoryA 50753->51112 50755 47c3c2 50756 403450 4 API calls 50755->50756 50757 47c3cf 50756->50757 51114 42d8d4 GetSystemDirectoryA 50757->51114 50759 47c3d7 50760 403450 4 API calls 50759->50760 50761 47c3e4 50760->50761 51116 42d900 50761->51116 50763 47c3ec 50764 403450 4 API calls 50763->50764 50765 47c3f9 50764->50765 50766 47c402 50765->50766 50767 47c41e 50765->50767 51172 42d218 50766->51172 50769 403400 4 API calls 50767->50769 50773 47c41c 50769->50773 50771 403450 4 API calls 50771->50773 50772 47c463 51120 47c22c 50772->51120 50773->50772 50775 42c8dc 5 API calls 50773->50775 50777 47c43e 50775->50777 50779 403450 4 API calls 50777->50779 50778 403450 4 API calls 50780 47c47f 50778->50780 50781 47c44b 50779->50781 50782 47c49d 50780->50782 50784 4035c0 4 API calls 50780->50784 50781->50772 50783 403450 4 API calls 50781->50783 50785 47c22c 8 API calls 50782->50785 50783->50772 50784->50782 50786 47c4ac 50785->50786 50787 403450 4 API calls 50786->50787 50788 47c4b9 50787->50788 50789 47c4e1 50788->50789 50791 42c40c 5 API calls 50788->50791 50790 47c548 50789->50790 50795 47c22c 8 API calls 50789->50795 50793 47c572 50790->50793 50794 47c551 50790->50794 50792 47c4cf 50791->50792 50796 4035c0 4 API calls 50792->50796 50798 47c4f9 50795->50798 50796->50789 51034->50633 51036->50630 51037->50627 51038->50628 51039->50638 51040->50644 51041->50644 51110->50750 51113 42d8c9 51112->51113 51113->50755 51115 42d8f5 51114->51115 51115->50759 51117 403400 4 API calls 51116->51117 51118 42d910 GetModuleHandleA GetProcAddress 51117->51118 51119 42d929 51118->51119 51119->50763 51182 42de2c 51120->51182 51122 47c252 51123 47c256 51122->51123 51124 47c278 51122->51124 51185 42dd5c 51123->51185 51125 403400 4 API calls 51124->51125 51127 47c27f 51125->51127 51127->50778 51129 47c26d RegCloseKey 51129->51127 51130 403400 4 API calls 51130->51129 51173 4038a4 4 API calls 51172->51173 51174 42d22b 51173->51174 51175 42d242 GetEnvironmentVariableA 51174->51175 51179 42d255 51174->51179 51220 42dbe0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51174->51220 51175->51174 51176 42d24e 51175->51176 51177 403400 4 API calls 51176->51177 51177->51179 51179->50771 51183 42de37 51182->51183 51184 42de3d RegOpenKeyExA 51182->51184 51183->51184 51184->51122 51188 42dc10 51185->51188 51189 42dc36 RegQueryValueExA 51188->51189 51190 42dc7b 51189->51190 51195 42dc59 51189->51195 51191 403400 4 API calls 51190->51191 51193 42dd47 51191->51193 51192 42dc73 51194 403400 4 API calls 51192->51194 51193->51129 51193->51130 51194->51190 51195->51190 51195->51192 51196 4034e0 4 API calls 51195->51196 51205 403744 51195->51205 51196->51195 51198 42dcb0 RegQueryValueExA 51198->51189 51199 42dccc 51198->51199 51199->51190 51209 4038a4 51199->51209 51206 40374a 51205->51206 51208 40375b 51205->51208 51207 4034bc 4 API calls 51206->51207 51206->51208 51207->51208 51208->51198 51210 4038b1 51209->51210 51217 4038e1 51209->51217 51211 4038da 51210->51211 51213 4038bd 51210->51213 51214 4034bc 4 API calls 51211->51214 51212 403400 4 API calls 51215 4038cb 51212->51215 51218 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51213->51218 51214->51217 51217->51212 51218->51215 51220->51174 53276 46be48 53277 46be7c 53276->53277 53314 46c254 53276->53314 53281 46bf14 53277->53281 53282 46bef2 53277->53282 53283 46bf03 53277->53283 53284 46bed0 53277->53284 53285 46bee1 53277->53285 53292 46beb8 53277->53292 53278 403400 4 API calls 53279 46c293 53278->53279 53289 403400 4 API calls 53279->53289 53594 46bdd8 45 API calls 53281->53594 53327 46ba08 53282->53327 53593 46bbc8 67 API calls 53283->53593 53591 46b758 47 API calls 53284->53591 53592 46b8c0 42 API calls 53285->53592 53294 46c29b 53289->53294 53292->53314 53362 468fe0 53292->53362 53293 46bed6 53293->53292 53293->53314 53295 46bf50 53297 494770 18 API calls 53295->53297 53313 46bf93 53295->53313 53295->53314 53297->53313 53298 46c0b6 53595 48300c 123 API calls 53298->53595 53301 46c0d1 53301->53314 53302 42cbd0 6 API calls 53302->53313 53303 414af8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53303->53313 53305 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53305->53313 53306 46b2a0 23 API calls 53306->53313 53309 46c136 53310 457d58 24 API calls 53309->53310 53315 46c155 53310->53315 53311 46b2a0 23 API calls 53311->53314 53312 46c18e 53441 46b2a0 53312->53441 53313->53298 53313->53302 53313->53303 53313->53305 53313->53306 53313->53309 53313->53312 53313->53314 53323 46c17c 53313->53323 53365 468f1c 53313->53365 53373 46b00c 53313->53373 53380 46a26c 53313->53380 53518 482b0c 53313->53518 53604 46b514 19 API calls 53313->53604 53314->53278 53317 457d58 24 API calls 53315->53317 53317->53323 53318 46c19b 53319 46c1c4 SetActiveWindow 53318->53319 53320 46c1dc 53318->53320 53319->53320 53476 46a60c 53320->53476 53322 46c1ff 53322->53323 53324 46c21a 53322->53324 53323->53311 53596 46b11c 53324->53596 53605 46c6cc 53327->53605 53330 46bb8a 53332 403420 4 API calls 53330->53332 53334 46bba4 53332->53334 53333 46ba56 53360 46bb76 53333->53360 53612 455f70 13 API calls 53333->53612 53335 403400 4 API calls 53334->53335 53338 46bbac 53335->53338 53337 403450 4 API calls 53337->53330 53340 403400 4 API calls 53338->53340 53339 46ba74 53361 46bad9 53339->53361 53613 46696c 53339->53613 53341 46bbb4 53340->53341 53341->53292 53342 42cd58 7 API calls 53344 46bb12 53342->53344 53343 42cd58 7 API calls 53346 46bb4f 53343->53346 53347 451444 4 API calls 53344->53347 53355 46bb39 53344->53355 53351 451444 4 API calls 53346->53351 53346->53360 53349 46bb29 53347->53349 53618 47eadc 42 API calls 53349->53618 53350 46696c 19 API calls 53353 46bab4 53350->53353 53354 46bb66 53351->53354 53356 451414 4 API calls 53353->53356 53619 47eadc 42 API calls 53354->53619 53355->53330 53355->53343 53355->53360 53358 46bac9 53356->53358 53617 47eadc 42 API calls 53358->53617 53360->53330 53360->53337 53361->53330 53361->53342 53361->53355 53363 468f1c 19 API calls 53362->53363 53364 468fef 53363->53364 53364->53295 53367 468f4b 53365->53367 53366 4078fc 19 API calls 53368 468f84 53366->53368 53367->53366 53370 468f8c 53367->53370 53740 453330 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53368->53740 53371 403400 4 API calls 53370->53371 53372 468fa4 53371->53372 53372->53313 53374 46b01d 53373->53374 53375 46b018 53373->53375 53826 469dec 46 API calls 53374->53826 53378 46b01b 53375->53378 53741 46aa78 53375->53741 53378->53313 53379 46b025 53379->53313 53381 403400 4 API calls 53380->53381 53382 46a299 53381->53382 53849 47d9bc 53382->53849 53384 46a2f8 53385 46a315 53384->53385 53386 46a2fc 53384->53386 53387 46a306 53385->53387 53859 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53385->53859 53856 466b6c 53386->53856 53391 46a434 53387->53391 53392 46a49f 53387->53392 53440 46a5a9 53387->53440 53390 46a331 53390->53387 53394 46a339 53390->53394 53395 403494 4 API calls 53391->53395 53396 403494 4 API calls 53392->53396 53393 403420 4 API calls 53397 46a5d3 53393->53397 53398 46b2a0 23 API calls 53394->53398 53399 46a441 53395->53399 53400 46a4ac 53396->53400 53397->53313 53408 46a346 53398->53408 53401 40357c 4 API calls 53399->53401 53402 40357c 4 API calls 53400->53402 53403 46a44e 53401->53403 53404 46a4b9 53402->53404 53405 40357c 4 API calls 53403->53405 53406 40357c 4 API calls 53404->53406 53409 46a45b 53405->53409 53407 46a4c6 53406->53407 53411 40357c 4 API calls 53407->53411 53414 46a387 53408->53414 53415 46a36f SetActiveWindow 53408->53415 53410 40357c 4 API calls 53409->53410 53412 46a468 53410->53412 53413 46a4d3 53411->53413 53416 466b6c 20 API calls 53412->53416 53417 40357c 4 API calls 53413->53417 53860 42f570 53414->53860 53415->53414 53418 46a476 53416->53418 53419 46a4e1 53417->53419 53420 40357c 4 API calls 53418->53420 53421 414b28 4 API calls 53419->53421 53424 46a47f 53420->53424 53431 46a49d 53421->53431 53426 40357c 4 API calls 53424->53426 53429 46a48c 53426->53429 53428 46a3d8 53432 46b11c 21 API calls 53428->53432 53430 414b28 4 API calls 53429->53430 53430->53431 53877 466ea4 53431->53877 53433 46a40a 53432->53433 53433->53313 53434 46a503 53435 414b28 4 API calls 53434->53435 53434->53440 53440->53393 53442 468fe0 19 API calls 53441->53442 53443 46b2b8 53442->53443 53444 46b2da 53443->53444 53445 465638 7 API calls 53443->53445 53996 465638 53444->53996 53445->53444 53449 46b2f2 53450 46b11c 21 API calls 53449->53450 53451 46b32a 53450->53451 53452 414b28 4 API calls 53451->53452 53453 46b33e 53452->53453 53454 46b374 53453->53454 53455 46b34a 53453->53455 53457 46b393 53454->53457 53458 46b3bd 53454->53458 53456 414b28 4 API calls 53455->53456 53459 46b35e 53456->53459 53460 414b28 4 API calls 53457->53460 53461 414b28 4 API calls 53458->53461 53462 414b28 4 API calls 53459->53462 53463 46b3a7 53460->53463 53464 46b3d1 53461->53464 53465 46b372 53462->53465 53466 414b28 4 API calls 53463->53466 53467 414b28 4 API calls 53464->53467 54013 46b034 53465->54013 53466->53465 53467->53465 53471 468fe0 19 API calls 53474 46b46f 53471->53474 53472 46b40f 53472->53471 53473 46b4d2 53473->53318 53474->53473 54018 4946bc 18 API calls 53474->54018 53478 46a637 53476->53478 53477 46a66e 53480 46a7e3 53477->53480 53491 46a682 53477->53491 53478->53477 54038 47dc30 53478->54038 53481 46a95a 53480->53481 53482 46a817 53480->53482 53487 46a801 53480->53487 53483 403400 4 API calls 53481->53483 53488 414b28 4 API calls 53482->53488 53489 46a97f 53483->53489 53484 46a7c0 53490 46a7db 53484->53490 53494 402660 4 API calls 53484->53494 53485 402660 4 API calls 53485->53491 53486 402648 4 API calls 53486->53491 53492 414b28 4 API calls 53487->53492 53493 46a815 53488->53493 53489->53322 53490->53322 53491->53485 53491->53486 53502 46a6f5 53491->53502 53492->53493 54050 495520 MulDiv 53493->54050 53494->53490 53495 46a78c 53497 457d58 24 API calls 53495->53497 53497->53484 53499 46a838 53501 466ea4 11 API calls 53499->53501 53500 457d58 24 API calls 53500->53502 53502->53484 53502->53495 53502->53500 53506 40357c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53502->53506 54049 403ba4 7 API calls 53502->54049 53506->53502 53519 46c6cc 48 API calls 53518->53519 53520 482b4f 53519->53520 53521 482b58 53520->53521 54266 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53520->54266 53523 414af8 4 API calls 53521->53523 53524 482b68 53523->53524 53525 403450 4 API calls 53524->53525 53526 482b75 53525->53526 54076 46ca24 53526->54076 53529 482b85 53531 414af8 4 API calls 53529->53531 53532 482b95 53531->53532 53533 403450 4 API calls 53532->53533 53534 482ba2 53533->53534 53535 469bd4 SendMessageA 53534->53535 53536 482bbb 53535->53536 53537 482c0c 53536->53537 54268 479c64 23 API calls 53536->54268 53539 4241ec 11 API calls 53537->53539 53540 482c16 53539->53540 53541 482c3c 53540->53541 53542 482c27 SetActiveWindow 53540->53542 54105 481f3c 53541->54105 53542->53541 53591->53293 53592->53292 53593->53292 53594->53292 53595->53301 53597 468f1c 19 API calls 53596->53597 53604->53313 53620 46c764 53605->53620 53608 414af8 53609 414b06 53608->53609 53610 4034e0 4 API calls 53609->53610 53611 414b13 53610->53611 53611->53333 53612->53339 53614 466986 53613->53614 53615 4078fc 19 API calls 53614->53615 53616 4669c1 53615->53616 53616->53350 53617->53361 53618->53355 53619->53360 53621 414af8 4 API calls 53620->53621 53622 46c798 53621->53622 53681 466c04 53622->53681 53626 46c7aa 53627 46c7b9 53626->53627 53630 46c7d2 53626->53630 53716 47eadc 42 API calls 53627->53716 53629 46c7cd 53631 403420 4 API calls 53629->53631 53633 46c819 53630->53633 53634 46c800 53630->53634 53632 46ba3a 53631->53632 53632->53330 53632->53608 53635 46c87e 53633->53635 53648 46c81d 53633->53648 53717 47eadc 42 API calls 53634->53717 53719 42cb5c CharNextA 53635->53719 53638 46c88d 53639 46c891 53638->53639 53642 46c8aa 53638->53642 53720 47eadc 42 API calls 53639->53720 53641 46c865 53718 47eadc 42 API calls 53641->53718 53643 46c8ce 53642->53643 53695 466d74 53642->53695 53721 47eadc 42 API calls 53643->53721 53647 46c8be 53647->53643 53700 466da4 53647->53700 53648->53641 53648->53642 53651 46c8e7 53652 403778 4 API calls 53651->53652 53653 46c8fd 53652->53653 53704 42c9ac 53653->53704 53656 46c90e 53722 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53656->53722 53657 46c93f 53659 42c8dc 5 API calls 53657->53659 53661 46c94a 53659->53661 53660 46c921 53662 451444 4 API calls 53660->53662 53663 42c40c 5 API calls 53661->53663 53664 46c92e 53662->53664 53665 46c955 53663->53665 53723 47eadc 42 API calls 53664->53723 53667 42cbd0 6 API calls 53665->53667 53668 46c960 53667->53668 53708 46c6f8 53668->53708 53670 46c968 53671 42cd58 7 API calls 53670->53671 53672 46c970 53671->53672 53673 46c974 53672->53673 53674 46c98a 53672->53674 53724 47eadc 42 API calls 53673->53724 53674->53629 53676 46c994 53674->53676 53685 466c1e 53681->53685 53682 406bb8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53682->53685 53684 42cbd0 6 API calls 53684->53685 53685->53682 53685->53684 53686 403450 4 API calls 53685->53686 53687 466c67 53685->53687 53726 42cabc 53685->53726 53686->53685 53688 403420 4 API calls 53687->53688 53689 466c81 53688->53689 53690 414b28 53689->53690 53691 414af8 4 API calls 53690->53691 53692 414b4c 53691->53692 53693 403400 4 API calls 53692->53693 53694 414b7d 53693->53694 53694->53626 53698 466d7e 53695->53698 53696 466d9f 53696->53647 53697 466d91 53697->53647 53698->53696 53698->53697 53737 42cb4c CharNextA 53698->53737 53701 466dae 53700->53701 53702 466ddb 53701->53702 53738 42cb4c CharNextA 53701->53738 53702->53643 53702->53651 53705 42ca05 53704->53705 53706 42c9c2 53704->53706 53705->53656 53705->53657 53706->53705 53739 42cb4c CharNextA 53706->53739 53709 46c75d 53708->53709 53710 46c70b 53708->53710 53709->53670 53710->53709 53711 41eeb4 2 API calls 53710->53711 53712 46c71b 53711->53712 53713 46c735 SHPathPrepareForWriteA 53712->53713 53714 41ef68 6 API calls 53713->53714 53715 46c755 53714->53715 53715->53670 53716->53629 53717->53629 53718->53629 53719->53638 53720->53629 53721->53629 53722->53660 53723->53629 53724->53629 53727 403494 4 API calls 53726->53727 53728 42cacc 53727->53728 53729 403744 4 API calls 53728->53729 53732 42cb02 53728->53732 53735 42c454 IsDBCSLeadByte 53728->53735 53729->53728 53731 42cb46 53731->53685 53732->53731 53734 4037b8 4 API calls 53732->53734 53736 42c454 IsDBCSLeadByte 53732->53736 53734->53732 53735->53728 53736->53732 53737->53698 53738->53701 53739->53706 53740->53370 53743 46aabf 53741->53743 53742 46af37 53744 46af52 53742->53744 53745 46af83 53742->53745 53743->53742 53746 46ab7a 53743->53746 53749 403494 4 API calls 53743->53749 53748 403494 4 API calls 53744->53748 53750 403494 4 API calls 53745->53750 53747 46ab9b 53746->53747 53751 46abdc 53746->53751 53752 403494 4 API calls 53747->53752 53753 46af60 53748->53753 53754 46aafe 53749->53754 53755 46af91 53750->53755 53759 403400 4 API calls 53751->53759 53756 46aba9 53752->53756 53844 4694c8 12 API calls 53753->53844 53758 414af8 4 API calls 53754->53758 53845 4694c8 12 API calls 53755->53845 53761 414af8 4 API calls 53756->53761 53763 46ab1f 53758->53763 53764 46abda 53759->53764 53766 46abca 53761->53766 53762 46af6e 53765 403400 4 API calls 53762->53765 53767 403634 4 API calls 53763->53767 53784 46acc0 53764->53784 53827 469bd4 53764->53827 53769 46afb4 53765->53769 53771 403634 4 API calls 53766->53771 53772 46ab2f 53767->53772 53775 403400 4 API calls 53769->53775 53770 46ad48 53773 403400 4 API calls 53770->53773 53771->53764 53776 414af8 4 API calls 53772->53776 53777 46ad46 53773->53777 53774 46abfc 53778 46ac02 53774->53778 53779 46ac3a 53774->53779 53780 46afbc 53775->53780 53781 46ab43 53776->53781 53839 46a010 43 API calls 53777->53839 53782 403494 4 API calls 53778->53782 53785 403400 4 API calls 53779->53785 53783 403420 4 API calls 53780->53783 53781->53746 53790 414af8 4 API calls 53781->53790 53786 46ac10 53782->53786 53787 46afc9 53783->53787 53784->53770 53788 46ad07 53784->53788 53789 46ac38 53785->53789 53793 47bfd8 43 API calls 53786->53793 53787->53378 53794 403494 4 API calls 53788->53794 53833 469ec8 53789->53833 53791 46ab6a 53790->53791 53795 403634 4 API calls 53791->53795 53797 46ac28 53793->53797 53798 46ad15 53794->53798 53795->53746 53796 46ad71 53804 46add2 53796->53804 53805 46ad7c 53796->53805 53799 403634 4 API calls 53797->53799 53800 414af8 4 API calls 53798->53800 53799->53789 53802 46ad36 53800->53802 53806 403634 4 API calls 53802->53806 53803 46ac61 53809 46acc2 53803->53809 53810 46ac6c 53803->53810 53807 403400 4 API calls 53804->53807 53808 403494 4 API calls 53805->53808 53806->53777 53811 46adda 53807->53811 53816 46ad8a 53808->53816 53813 403400 4 API calls 53809->53813 53812 403494 4 API calls 53810->53812 53814 46add0 53811->53814 53825 46ae83 53811->53825 53818 46ac7a 53812->53818 53813->53784 53814->53811 53840 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53814->53840 53816->53811 53816->53814 53819 403634 4 API calls 53816->53819 53817 46adfd 53817->53825 53841 49490c 18 API calls 53817->53841 53818->53784 53821 403634 4 API calls 53818->53821 53819->53816 53821->53818 53823 46af24 53843 429154 SendMessageA SendMessageA 53823->53843 53842 429104 SendMessageA 53825->53842 53826->53379 53846 42a050 SendMessageA 53827->53846 53829 469be3 53830 469c03 53829->53830 53847 42a050 SendMessageA 53829->53847 53830->53774 53832 469bf3 53832->53774 53837 469ef5 53833->53837 53834 469f57 53835 403400 4 API calls 53834->53835 53836 469f6c 53835->53836 53836->53803 53837->53834 53848 469e4c 43 API calls 53837->53848 53839->53796 53840->53817 53841->53825 53842->53823 53843->53742 53844->53762 53845->53762 53846->53829 53847->53832 53848->53837 53850 47d9cf 53849->53850 53853 47da0c 53849->53853 53881 455cf8 53850->53881 53853->53384 53855 47da1f 53855->53384 53936 466a80 53856->53936 53859->53390 53861 42f57c 53860->53861 53862 42f59f GetActiveWindow GetFocus 53861->53862 53863 41eeb4 2 API calls 53862->53863 53864 42f5b6 53863->53864 53865 42f5d3 53864->53865 53866 42f5c3 RegisterClassA 53864->53866 53867 42f662 SetFocus 53865->53867 53868 42f5e1 CreateWindowExA 53865->53868 53866->53865 53870 403400 4 API calls 53867->53870 53868->53867 53869 42f614 53868->53869 53957 42428c 53869->53957 53872 42f67e 53870->53872 53876 49490c 18 API calls 53872->53876 53873 42f63c 53874 42f644 CreateWindowExA 53873->53874 53874->53867 53875 42f65a ShowWindow 53874->53875 53875->53867 53876->53428 53963 44b524 53877->53963 53879 466eab 53879->53434 53882 455d09 53881->53882 53883 455d16 53882->53883 53884 455d0d 53882->53884 53915 455adc 29 API calls 53883->53915 53907 4559fc 53884->53907 53887 455d13 53887->53853 53888 47d628 53887->53888 53891 47d726 53888->53891 53892 47d665 53888->53892 53889 403420 4 API calls 53890 47d80e 53889->53890 53890->53855 53894 47954c 19 API calls 53891->53894 53901 47d77c 53891->53901 53903 47d6c9 53891->53903 53892->53891 53895 4797f0 4 API calls 53892->53895 53898 47bfd8 43 API calls 53892->53898 53892->53903 53905 47d6d2 53892->53905 53924 47968c 53892->53924 53894->53891 53895->53892 53896 47bfd8 43 API calls 53896->53901 53897 4540ec 20 API calls 53897->53901 53898->53892 53899 47bfd8 43 API calls 53899->53905 53900 47d713 53900->53903 53901->53891 53901->53896 53901->53897 53901->53900 53902 42c93c 5 API calls 53902->53905 53903->53889 53904 42c964 5 API calls 53904->53905 53905->53892 53905->53899 53905->53900 53905->53902 53905->53904 53935 47d334 52 API calls 53905->53935 53908 42de2c RegOpenKeyExA 53907->53908 53910 455a19 53908->53910 53909 455a67 53909->53887 53910->53909 53916 455930 53910->53916 53913 455930 6 API calls 53914 455a48 RegCloseKey 53913->53914 53914->53887 53915->53887 53921 42dd68 53916->53921 53918 403420 4 API calls 53919 4559e2 53918->53919 53919->53913 53920 455958 53920->53918 53922 42dc10 6 API calls 53921->53922 53923 42dd71 53922->53923 53923->53920 53925 4796a2 53924->53925 53926 47969e 53924->53926 53927 403450 4 API calls 53925->53927 53926->53892 53928 4796af 53927->53928 53929 4796b5 53928->53929 53930 4796cf 53928->53930 53931 47954c 19 API calls 53929->53931 53932 47954c 19 API calls 53930->53932 53933 4796cb 53931->53933 53932->53933 53934 403400 4 API calls 53933->53934 53934->53926 53935->53905 53937 403494 4 API calls 53936->53937 53938 466aae 53937->53938 53939 42dbd8 5 API calls 53938->53939 53940 466ac0 53939->53940 53941 42dbd8 5 API calls 53940->53941 53942 466ad2 53941->53942 53943 46696c 19 API calls 53942->53943 53944 466adc 53943->53944 53945 42dbd8 5 API calls 53944->53945 53946 466aeb 53945->53946 53953 4669e4 53946->53953 53949 42dbd8 5 API calls 53950 466b04 53949->53950 53951 403400 4 API calls 53950->53951 53952 466b19 53951->53952 53952->53387 53954 466a04 53953->53954 53955 4078fc 19 API calls 53954->53955 53956 466a4e 53955->53956 53956->53949 53958 4242be 53957->53958 53959 42429e GetWindowTextA 53957->53959 53961 403494 4 API calls 53958->53961 53960 4034e0 4 API calls 53959->53960 53962 4242bc 53960->53962 53961->53962 53962->53873 53966 44b39c 53963->53966 53965 44b537 53965->53879 53967 44b3cf 53966->53967 53968 414af8 4 API calls 53967->53968 53969 44b3e2 53968->53969 53970 44b40f 73A1A570 53969->53970 53971 40357c 4 API calls 53969->53971 53977 41a1f8 53970->53977 53971->53970 53974 44b440 53985 44b0d0 53974->53985 53976 44b454 73A1A480 53976->53965 53978 41a223 53977->53978 53979 41a2bf 53977->53979 53982 403520 4 API calls 53978->53982 53980 403400 4 API calls 53979->53980 53981 41a2d7 SelectObject 53980->53981 53981->53974 53983 41a27b 53982->53983 53984 41a2b3 CreateFontIndirectA 53983->53984 53984->53979 53986 44b0e7 53985->53986 53987 44b17a 53986->53987 53988 44b163 53986->53988 53989 44b0fa 53986->53989 53987->53976 53991 44b173 DrawTextA 53988->53991 53989->53987 53990 402648 4 API calls 53989->53990 53992 44b10b 53990->53992 53991->53987 53993 44b129 MultiByteToWideChar DrawTextW 53992->53993 53994 402660 4 API calls 53993->53994 53995 44b15b 53994->53995 53995->53976 53998 465643 53996->53998 53997 46571e 54007 4673f8 53997->54007 53998->53997 54002 465693 53998->54002 54019 421a2c 53998->54019 53999 4656d6 53999->53997 54025 4185c8 7 API calls 53999->54025 54002->53999 54003 4656cd 54002->54003 54004 4656d8 54002->54004 54005 421a2c 7 API calls 54003->54005 54006 421a2c 7 API calls 54004->54006 54005->53999 54006->53999 54008 467428 54007->54008 54009 467409 54007->54009 54008->53449 54010 414b28 4 API calls 54009->54010 54011 467417 54010->54011 54012 414b28 4 API calls 54011->54012 54012->54008 54015 46b041 54013->54015 54014 421a2c 7 API calls 54016 46b0cc 54014->54016 54015->54014 54016->53472 54017 466ecc 18 API calls 54016->54017 54017->53472 54018->53473 54020 421a84 54019->54020 54024 421a3a 54019->54024 54020->54002 54021 421a69 54021->54020 54034 421d38 SetFocus GetFocus 54021->54034 54024->54021 54026 408cc4 54024->54026 54025->53997 54027 408cd0 54026->54027 54035 406df4 LoadStringA 54027->54035 54030 403450 4 API calls 54031 408d01 54030->54031 54032 403400 4 API calls 54031->54032 54033 408d16 54032->54033 54033->54021 54034->54020 54036 4034e0 4 API calls 54035->54036 54037 406e21 54036->54037 54037->54030 54039 402648 4 API calls 54038->54039 54040 47dc4c 54039->54040 54041 47d628 61 API calls 54040->54041 54042 47dc6b 54041->54042 54048 47dc7f 54042->54048 54054 47da48 54042->54054 54044 47dcab 54045 402660 4 API calls 54044->54045 54047 402660 4 API calls 54047->54048 54048->54044 54048->54047 54049->53502 54050->53499 54055 403494 4 API calls 54054->54055 54056 47da75 54055->54056 54069 42c93c 5 API calls 54056->54069 54071 47dac8 54056->54071 54074 42e8b0 CharNextA 54056->54074 54069->54056 54074->54056 54077 46ca4d 54076->54077 54078 414af8 4 API calls 54077->54078 54088 46ca9a 54077->54088 54079 46ca63 54078->54079 54275 466c90 6 API calls 54079->54275 54080 403420 4 API calls 54081 46cb44 54080->54081 54081->53529 54267 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54081->54267 54083 46ca6b 54084 414b28 4 API calls 54083->54084 54085 46ca79 54084->54085 54086 46ca86 54085->54086 54090 46ca9f 54085->54090 54276 47eadc 42 API calls 54086->54276 54088->54080 54089 46cab7 54277 47eadc 42 API calls 54089->54277 54090->54089 54091 466d74 CharNextA 54090->54091 54093 46cab3 54091->54093 54093->54089 54094 46cacd 54093->54094 54095 46cad3 54094->54095 54096 46cae9 54094->54096 54278 47eadc 42 API calls 54095->54278 54098 42c9ac CharNextA 54096->54098 54099 46caf6 54098->54099 54099->54088 54279 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54099->54279 54101 46cb0d 54102 451444 4 API calls 54101->54102 54103 46cb1a 54102->54103 54280 47eadc 42 API calls 54103->54280 54106 481f8d 54105->54106 54107 481f5f 54105->54107 54109 475dbc 54106->54109 54281 4946bc 18 API calls 54107->54281 54110 457b4c 24 API calls 54109->54110 54111 475e08 54110->54111 54112 4072b0 SetCurrentDirectoryA 54111->54112 54113 475e12 54112->54113 54282 46e5b0 54113->54282 54117 475e22 54268->53537 54275->54083 54276->54088 54277->54088 54278->54088 54279->54101 54280->54088 54281->54106 54283 46e623 54282->54283 54285 46e5cd 54282->54285 54286 46e628 54283->54286 54284 47968c 19 API calls 54284->54285 54285->54283 54285->54284 54287 46e64e 54286->54287 54730 44fb08 54287->54730 54289 46e6aa 54289->54117 54733 44fb1c 54730->54733 54734 44fb2d 54733->54734 54735 44fb19 54734->54735 54736 44fb57 MulDiv 54734->54736 54735->54289 54737 4181f0 54736->54737 54738 44fb82 SendMessageA 54737->54738 54738->54735 56150 498578 56208 403344 56150->56208 56152 498586 56211 4056a0 56152->56211 56154 49858b 56214 406334 GetModuleHandleA GetProcAddress 56154->56214 56160 49859a 56231 410964 56160->56231 56162 49859f 56235 412938 56162->56235 56164 4985a9 56240 419050 GetVersion 56164->56240 56481 4032fc 56208->56481 56210 403349 GetModuleHandleA GetCommandLineA 56210->56152 56213 4056db 56211->56213 56482 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56211->56482 56213->56154 56215 406350 56214->56215 56216 406357 GetProcAddress 56214->56216 56215->56216 56217 406366 56216->56217 56218 40636d GetProcAddress 56216->56218 56217->56218 56219 406380 56218->56219 56220 40637c SetProcessDEPPolicy 56218->56220 56221 409954 56219->56221 56220->56219 56483 40902c 56221->56483 56226 408728 7 API calls 56227 409977 56226->56227 56498 409078 GetVersionExA 56227->56498 56230 409b88 6F551CD0 56230->56160 56232 41096e 56231->56232 56233 4109ad GetCurrentThreadId 56232->56233 56234 4109c8 56233->56234 56234->56162 56500 40af0c 56235->56500 56239 412964 56239->56164 56512 41de34 8 API calls 56240->56512 56242 419069 56481->56210 56482->56213 56484 408cc4 5 API calls 56483->56484 56485 40903d 56484->56485 56486 4085e4 GetSystemDefaultLCID 56485->56486 56489 40861a 56486->56489 56487 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56487->56489 56488 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56488->56489 56489->56487 56489->56488 56490 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56489->56490 56494 40867c 56489->56494 56490->56489 56491 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56491->56494 56492 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56492->56494 56493 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56493->56494 56494->56491 56494->56492 56494->56493 56495 4086ff 56494->56495 56496 403420 4 API calls 56495->56496 56497 408719 56496->56497 56497->56226 56499 40908f 56498->56499 56499->56230 56502 40af13 56500->56502 56501 40af32 56504 41101c 56501->56504 56502->56501 56511 40ae44 19 API calls 56502->56511 56505 41103e 56504->56505 56506 406df4 5 API calls 56505->56506 56507 403450 4 API calls 56505->56507 56508 41105d 56505->56508 56506->56505 56507->56505 56509 403400 4 API calls 56508->56509 56510 411072 56509->56510 56510->56239 56511->56502 56513 41deae 56512->56513 56513->56242 57789 42f530 57790 42f53f NtdllDefWindowProc_A 57789->57790 57791 42f53b 57789->57791 57790->57791 55782 416b52 55783 416bfa 55782->55783 55784 416b6a 55782->55784 55801 41532c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55783->55801 55786 416b84 SendMessageA 55784->55786 55787 416b78 55784->55787 55797 416bd8 55786->55797 55788 416b82 CallWindowProcA 55787->55788 55789 416b9e 55787->55789 55788->55797 55798 41a068 GetSysColor 55789->55798 55792 416ba9 SetTextColor 55793 416bbe 55792->55793 55799 41a068 GetSysColor 55793->55799 55795 416bc3 SetBkColor 55800 41a6f0 GetSysColor CreateBrushIndirect 55795->55800 55798->55792 55799->55795 55800->55797 55801->55797 57792 4358f0 57794 435905 57792->57794 57793 43591f 57794->57793 57798 4352d8 57794->57798 57802 435322 57798->57802 57804 435308 57798->57804 57799 403400 4 API calls 57800 435727 57799->57800 57800->57793 57811 435738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57800->57811 57801 446db4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57801->57804 57802->57799 57803 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57803->57804 57804->57801 57804->57802 57804->57803 57805 402648 4 API calls 57804->57805 57806 431cb0 4 API calls 57804->57806 57808 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57804->57808 57809 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57804->57809 57812 4343c0 57804->57812 57824 434b84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57804->57824 57805->57804 57806->57804 57808->57804 57809->57804 57811->57793 57813 43447d 57812->57813 57814 4343ed 57812->57814 57843 434320 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57813->57843 57815 403494 4 API calls 57814->57815 57817 4343fb 57815->57817 57818 403778 4 API calls 57817->57818 57822 43441c 57818->57822 57819 403400 4 API calls 57820 4344cd 57819->57820 57820->57804 57821 43446f 57821->57819 57822->57821 57825 494314 57822->57825 57824->57804 57826 49434c 57825->57826 57827 4943e4 57825->57827 57828 403494 4 API calls 57826->57828 57844 448940 57827->57844 57833 494357 57828->57833 57830 494367 57831 403400 4 API calls 57830->57831 57832 494408 57831->57832 57834 403400 4 API calls 57832->57834 57833->57830 57835 4037b8 4 API calls 57833->57835 57836 494410 57834->57836 57837 494380 57835->57837 57836->57822 57837->57830 57838 4037b8 4 API calls 57837->57838 57839 4943a3 57838->57839 57840 403778 4 API calls 57839->57840 57841 4943d4 57840->57841 57842 403634 4 API calls 57841->57842 57842->57827 57843->57821 57845 448965 57844->57845 57846 4489a8 57844->57846 57847 403494 4 API calls 57845->57847 57848 4489bc 57846->57848 57856 44853c 57846->57856 57849 448970 57847->57849 57851 403400 4 API calls 57848->57851 57853 4037b8 4 API calls 57849->57853 57852 4489ef 57851->57852 57852->57830 57854 44898c 57853->57854 57855 4037b8 4 API calls 57854->57855 57855->57846 57857 403494 4 API calls 57856->57857 57858 448572 57857->57858 57859 4037b8 4 API calls 57858->57859 57860 448584 57859->57860 57861 403778 4 API calls 57860->57861 57862 4485a5 57861->57862 57863 4037b8 4 API calls 57862->57863 57864 4485bd 57863->57864 57865 403778 4 API calls 57864->57865 57866 4485e8 57865->57866 57867 4037b8 4 API calls 57866->57867 57878 448600 57867->57878 57868 448638 57870 403420 4 API calls 57868->57870 57869 4486d3 57874 4486db GetProcAddress 57869->57874 57871 448718 57870->57871 57871->57848 57872 44865b LoadLibraryExA 57872->57878 57873 44866d LoadLibraryA 57873->57878 57875 4486ee 57874->57875 57875->57868 57876 403b80 4 API calls 57876->57878 57877 403450 4 API calls 57877->57878 57878->57868 57878->57869 57878->57872 57878->57873 57878->57876 57878->57877 57880 43da98 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57878->57880 57880->57878 57881 40ce34 57884 406f18 WriteFile 57881->57884 57885 406f35 57884->57885 55802 416654 55803 416661 55802->55803 55804 4166bb 55802->55804 55810 416560 CreateWindowExA 55803->55810 55811 4162da 55803->55811 55805 416668 SetPropA SetPropA 55805->55804 55806 41669b 55805->55806 55807 4166ae SetWindowPos 55806->55807 55807->55804 55810->55805 55812 416306 55811->55812 55813 4162e6 GetClassInfoA 55811->55813 55812->55805 55813->55812 55814 4162fa GetClassInfoA 55813->55814 55814->55812 57886 4222f4 57887 422303 57886->57887 57892 421284 57887->57892 57890 422323 57893 4212f3 57892->57893 57894 421293 57892->57894 57895 421304 57893->57895 57917 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 57893->57917 57894->57893 57916 408d34 19 API calls 57894->57916 57897 421332 57895->57897 57900 4213ca 57895->57900 57899 4213a5 57897->57899 57905 42134d 57897->57905 57898 4213a3 57901 4213f6 57898->57901 57919 421e3c 11 API calls 57898->57919 57899->57898 57907 4213b9 57899->57907 57900->57898 57902 4213de SetMenu 57900->57902 57920 4211cc 10 API calls 57901->57920 57902->57898 57905->57898 57910 421370 GetMenu 57905->57910 57906 4213fd 57906->57890 57915 4221f8 10 API calls 57906->57915 57909 4213c2 SetMenu 57907->57909 57909->57898 57911 421393 57910->57911 57912 42137a 57910->57912 57918 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 57911->57918 57914 42138d SetMenu 57912->57914 57914->57911 57915->57890 57916->57894 57917->57895 57918->57898 57919->57901 57920->57906 57921 40d07c 57922 40d084 57921->57922 57923 40d0b2 57922->57923 57924 40d0a7 57922->57924 57929 40d0ae 57922->57929 57926 40d0b6 57923->57926 57927 40d0c8 57923->57927 57934 4062a0 GlobalHandle GlobalUnlock GlobalFree 57924->57934 57933 406274 GlobalAlloc GlobalLock 57926->57933 57935 406284 GlobalHandle GlobalUnlock GlobalReAlloc GlobalLock 57927->57935 57931 40d0c4 57931->57929 57932 408cc4 5 API calls 57931->57932 57932->57929 57933->57931 57934->57929 57935->57931 57936 44b4b8 57937 44b4c6 57936->57937 57939 44b4e5 57936->57939 57938 44b39c 11 API calls 57937->57938 57937->57939 57938->57939 57940 448738 57941 448766 57940->57941 57942 44876d 57940->57942 57946 403400 4 API calls 57941->57946 57943 448781 57942->57943 57944 44853c 7 API calls 57942->57944 57943->57941 57945 403494 4 API calls 57943->57945 57944->57943 57947 44879a 57945->57947 57948 448917 57946->57948 57949 4037b8 4 API calls 57947->57949 57950 4487b6 57949->57950 57951 4037b8 4 API calls 57950->57951 57952 4487d2 57951->57952 57952->57941 57953 4487e6 57952->57953 57954 4037b8 4 API calls 57953->57954 57955 448800 57954->57955 57956 431be0 4 API calls 57955->57956 57957 448822 57956->57957 57958 431cb0 4 API calls 57957->57958 57965 448842 57957->57965 57958->57957 57959 448898 57972 442344 57959->57972 57960 448880 57960->57959 57984 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57960->57984 57964 4488cc GetLastError 57985 4484d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57964->57985 57965->57960 57983 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57965->57983 57967 4488db 57986 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57967->57986 57969 4488f0 57987 443630 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57969->57987 57971 4488f8 57973 443322 57972->57973 57974 44237d 57972->57974 57976 403400 4 API calls 57973->57976 57975 403400 4 API calls 57974->57975 57977 442385 57975->57977 57978 443337 57976->57978 57979 431be0 4 API calls 57977->57979 57978->57964 57980 442391 57979->57980 57981 443312 57980->57981 57988 441a1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57980->57988 57981->57964 57983->57965 57984->57959 57985->57967 57986->57969 57987->57971 57988->57980 57989 4165fc 73A25CF0 57990 42e3ff SetErrorMode
                                                                                        Strings
                                                                                        • Will register the file (a type library) later., xrefs: 004717A1
                                                                                        • Time stamp of existing file: (failed to read), xrefs: 00470CDF
                                                                                        • Version of our file: %u.%u.%u.%u, xrefs: 00470D98
                                                                                        • Version of existing file: (none), xrefs: 00470FA2
                                                                                        • Existing file is a newer version. Skipping., xrefs: 00470EAA
                                                                                        • -- File entry --, xrefs: 004709A3
                                                                                        • Failed to strip read-only attribute., xrefs: 0047117B
                                                                                        • Skipping due to "onlyifdestfileexists" flag., xrefs: 004711A2
                                                                                        • Skipping due to "onlyifdoesntexist" flag., xrefs: 00470C76
                                                                                        • Same version. Skipping., xrefs: 00470F8D
                                                                                        • Existing file is protected by Windows File Protection. Skipping., xrefs: 00471094
                                                                                        • Dest file exists., xrefs: 00470C63
                                                                                        • Stripped read-only attribute., xrefs: 0047116F
                                                                                        • Same time stamp. Skipping., xrefs: 00470FFD
                                                                                        • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470F6C
                                                                                        • Installing the file., xrefs: 004711B1
                                                                                        • Uninstaller requires administrator: %s, xrefs: 0047141D
                                                                                        • Dest file is protected by Windows File Protection., xrefs: 00470B95
                                                                                        • Version of existing file: %u.%u.%u.%u, xrefs: 00470E24
                                                                                        • Installing into GAC, xrefs: 004719A2
                                                                                        • , xrefs: 00470E77, 00471048, 004710C6
                                                                                        • Dest filename: %s, xrefs: 00470B3C
                                                                                        • Time stamp of our file: %s, xrefs: 00470C43
                                                                                        • Incrementing shared file count (64-bit)., xrefs: 0047181A
                                                                                        • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470F5D
                                                                                        • User opted not to overwrite the existing file. Skipping., xrefs: 004710F5
                                                                                        • @, xrefs: 00470A58
                                                                                        • Incrementing shared file count (32-bit)., xrefs: 00471833
                                                                                        • Time stamp of our file: (failed to read), xrefs: 00470C4F
                                                                                        • Non-default bitness: 64-bit, xrefs: 00470B57
                                                                                        • InUn, xrefs: 004713ED
                                                                                        • Existing file has a later time stamp. Skipping., xrefs: 00471077
                                                                                        • Will register the file (a DLL/OCX) later., xrefs: 004717AD
                                                                                        • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0047113E
                                                                                        • Version of our file: (none), xrefs: 00470DA4
                                                                                        • Non-default bitness: 32-bit, xrefs: 00470B63
                                                                                        • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470F78
                                                                                        • .tmp, xrefs: 0047125F
                                                                                        • Time stamp of existing file: %s, xrefs: 00470CD3
                                                                                        • Couldn't read time stamp. Skipping., xrefs: 00470FDD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                                        • API String ID: 0-4021121268
                                                                                        • Opcode ID: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                                                        • Instruction ID: 00dcbbebc37e67597ddb11db3b00c056d98a3663d13b65a1c96947d1bb872b77
                                                                                        • Opcode Fuzzy Hash: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                                                        • Instruction Fuzzy Hash: 2C927534A04288DFDB11DFA9C845BDDBBB5AF05304F5480ABE848AB392C7789E45CB59

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1546 42e0ac-42e0bd 1547 42e0c8-42e0ed AllocateAndInitializeSid 1546->1547 1548 42e0bf-42e0c3 1546->1548 1549 42e297-42e29f 1547->1549 1550 42e0f3-42e110 GetVersion 1547->1550 1548->1549 1551 42e112-42e127 GetModuleHandleA GetProcAddress 1550->1551 1552 42e129-42e12b 1550->1552 1551->1552 1553 42e152-42e16c GetCurrentThread OpenThreadToken 1552->1553 1554 42e12d-42e13b CheckTokenMembership 1552->1554 1557 42e1a3-42e1cb GetTokenInformation 1553->1557 1558 42e16e-42e178 GetLastError 1553->1558 1555 42e141-42e14d 1554->1555 1556 42e279-42e28f FreeSid 1554->1556 1555->1556 1559 42e1e6-42e20a call 402648 GetTokenInformation 1557->1559 1560 42e1cd-42e1d5 GetLastError 1557->1560 1561 42e184-42e197 GetCurrentProcess OpenProcessToken 1558->1561 1562 42e17a-42e17f call 4031bc 1558->1562 1573 42e218-42e220 1559->1573 1574 42e20c-42e216 call 4031bc * 2 1559->1574 1560->1559 1564 42e1d7-42e1e1 call 4031bc * 2 1560->1564 1561->1557 1563 42e199-42e19e call 4031bc 1561->1563 1562->1549 1563->1549 1564->1549 1576 42e222-42e223 1573->1576 1577 42e253-42e271 call 402660 CloseHandle 1573->1577 1574->1549 1580 42e225-42e238 EqualSid 1576->1580 1584 42e23a-42e247 1580->1584 1585 42e24f-42e251 1580->1585 1584->1585 1588 42e249-42e24d 1584->1588 1585->1577 1585->1580 1588->1577
                                                                                        APIs
                                                                                        • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0E6
                                                                                        • GetVersion.KERNEL32(00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E103
                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E11C
                                                                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E122
                                                                                        • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E137
                                                                                        • FreeSid.ADVAPI32(00000000,0042E297,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E28A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                                        • String ID: CheckTokenMembership$advapi32.dll
                                                                                        • API String ID: 2252812187-1888249752
                                                                                        • Opcode ID: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                                                        • Instruction ID: 1c76bb1748f4203a7925b196b2d5623075850b54fd141b793a49aa5c8bf5bf77
                                                                                        • Opcode Fuzzy Hash: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                                                        • Instruction Fuzzy Hash: 22517571B44615EEEB10EAE6A842BBF7BACDB09304F9404BBB501F7282D57C9904867D

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1610 4502ac-4502b9 1611 4502bf-4502cc GetVersion 1610->1611 1612 450368-450372 1610->1612 1611->1612 1613 4502d2-4502e8 LoadLibraryA 1611->1613 1613->1612 1614 4502ea-450363 GetProcAddress * 6 1613->1614 1614->1612
                                                                                        APIs
                                                                                        • GetVersion.KERNEL32(00480618), ref: 004502BF
                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480618), ref: 004502D7
                                                                                        • GetProcAddress.KERNEL32(6E380000,RmStartSession), ref: 004502F5
                                                                                        • GetProcAddress.KERNEL32(6E380000,RmRegisterResources), ref: 0045030A
                                                                                        • GetProcAddress.KERNEL32(6E380000,RmGetList), ref: 0045031F
                                                                                        • GetProcAddress.KERNEL32(6E380000,RmShutdown), ref: 00450334
                                                                                        • GetProcAddress.KERNEL32(6E380000,RmRestart), ref: 00450349
                                                                                        • GetProcAddress.KERNEL32(6E380000,RmEndSession), ref: 0045035E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoadVersion
                                                                                        • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                                        • API String ID: 1968650500-3419246398
                                                                                        • Opcode ID: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                                                        • Instruction ID: 1cbd638475316f18669290cc5db137bdc69b0bbe350ace6e5bf0246856dda450
                                                                                        • Opcode Fuzzy Hash: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                                                        • Instruction Fuzzy Hash: CC11A5B4541740DBDA10FBA5BB85A2A32E9E72C715B08563BEC44AA1A2DB7C4448CF9C

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1674 423c1c-423c50 1675 423c52-423c53 1674->1675 1676 423c84-423c9b call 423b78 1674->1676 1677 423c55-423c71 call 40b44c 1675->1677 1682 423cfc-423d01 1676->1682 1683 423c9d 1676->1683 1703 423c73-423c7b 1677->1703 1704 423c80-423c82 1677->1704 1684 423d03 1682->1684 1685 423d37-423d3c 1682->1685 1686 423ca3-423ca6 1683->1686 1687 423d60-423d70 1683->1687 1691 423fc1-423fc9 1684->1691 1692 423d09-423d11 1684->1692 1695 423d42-423d45 1685->1695 1696 4240aa-4240b8 IsIconic 1685->1696 1693 423cd5-423cd8 1686->1693 1694 423ca8 1686->1694 1689 423d72-423d77 1687->1689 1690 423d7b-423d83 call 4241a4 1687->1690 1705 423d88-423d90 call 4241ec 1689->1705 1706 423d79-423d9c call 423b94 1689->1706 1699 424162-42416a 1690->1699 1691->1699 1700 423fcf-423fda call 4181f0 1691->1700 1708 423f23-423f4a SendMessageA 1692->1708 1709 423d17-423d1c 1692->1709 1701 423db9-423dc0 1693->1701 1702 423cde-423cdf 1693->1702 1711 423e06-423e16 call 423b94 1694->1711 1712 423cae-423cb1 1694->1712 1697 4240e6-4240fb call 424860 1695->1697 1698 423d4b-423d4c 1695->1698 1696->1699 1710 4240be-4240c9 GetFocus 1696->1710 1697->1699 1715 423d52-423d55 1698->1715 1716 4240fd-424104 1698->1716 1713 424181-424187 1699->1713 1700->1699 1762 423fe0-423fef call 4181f0 IsWindowEnabled 1700->1762 1701->1699 1725 423dc6-423dcd 1701->1725 1726 423ce5-423ce8 1702->1726 1727 423f4f-423f56 1702->1727 1703->1713 1704->1676 1704->1677 1705->1699 1706->1699 1708->1699 1728 423d22-423d23 1709->1728 1729 42405a-424065 1709->1729 1710->1699 1720 4240cf-4240d8 call 41f004 1710->1720 1711->1699 1721 423cb7-423cba 1712->1721 1722 423e2e-423e4a PostMessageA call 423b94 1712->1722 1731 424130-424137 1715->1731 1732 423d5b 1715->1732 1742 424106-424119 call 4244e4 1716->1742 1743 42411b-42412e call 42453c 1716->1743 1720->1699 1775 4240de-4240e4 SetFocus 1720->1775 1739 423cc0-423cc3 1721->1739 1740 423eb5-423ebc 1721->1740 1722->1699 1725->1699 1745 423dd3-423dd9 1725->1745 1746 423cee-423cf1 1726->1746 1747 423e4f-423e6f call 423b94 1726->1747 1727->1699 1735 423f5c-423f61 call 404e54 1727->1735 1748 424082-42408d 1728->1748 1749 423d29-423d2c 1728->1749 1729->1699 1733 42406b-42407d 1729->1733 1766 42414a-424159 1731->1766 1767 424139-424148 1731->1767 1750 42415b-42415c call 423b94 1732->1750 1733->1699 1735->1699 1757 423cc9-423cca 1739->1757 1758 423dde-423dec IsIconic 1739->1758 1759 423ebe-423ed1 call 423b24 1740->1759 1760 423eef-423f00 call 423b94 1740->1760 1742->1699 1743->1699 1745->1699 1763 423cf7 1746->1763 1764 423e1b-423e29 call 424188 1746->1764 1789 423e93-423eb0 call 423a94 PostMessageA 1747->1789 1790 423e71-423e8e call 423b24 PostMessageA 1747->1790 1748->1699 1751 424093-4240a5 1748->1751 1768 423d32 1749->1768 1769 423f66-423f6e 1749->1769 1798 424161 1750->1798 1751->1699 1776 423cd0 1757->1776 1777 423da1-423da9 1757->1777 1783 423dfa-423e01 call 423b94 1758->1783 1784 423dee-423df5 call 423bd0 1758->1784 1803 423ee3-423eea call 423b94 1759->1803 1804 423ed3-423edd call 41ef68 1759->1804 1808 423f02-423f08 call 41eeb4 1760->1808 1809 423f16-423f1e call 423a94 1760->1809 1762->1699 1805 423ff5-424004 call 4181f0 IsWindowVisible 1762->1805 1763->1750 1764->1699 1766->1699 1767->1699 1768->1750 1769->1699 1774 423f74-423f7b 1769->1774 1774->1699 1791 423f81-423f90 call 4181f0 IsWindowEnabled 1774->1791 1775->1699 1776->1750 1777->1699 1792 423daf-423db4 call 422c5c 1777->1792 1783->1699 1784->1699 1789->1699 1790->1699 1791->1699 1821 423f96-423fac call 412320 1791->1821 1792->1699 1798->1699 1803->1699 1804->1803 1805->1699 1826 42400a-424055 GetFocus call 4181f0 SetFocus call 415250 SetFocus 1805->1826 1819 423f0d-423f10 1808->1819 1809->1699 1819->1809 1821->1699 1829 423fb2-423fbc 1821->1829 1826->1699 1829->1699
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                                                        • Instruction ID: adb1057a9d0d7329e5210459a6b6756db00cf693e958207d3a560887342e2c6b
                                                                                        • Opcode Fuzzy Hash: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                                                        • Instruction Fuzzy Hash: EBE1A230700125EFD704EF69E989A6EB7B5EF94304F9480A6E545AB352C73CEE81DB08

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1989 467710-467726 1990 467730-4677e7 call 49514c call 402b30 * 6 1989->1990 1991 467728-46772b call 402d30 1989->1991 2008 467824-46783d 1990->2008 2009 4677e9-467810 call 41464c 1990->2009 1991->1990 2013 46783f-467866 call 41462c 2008->2013 2014 46787a-467888 call 495454 2008->2014 2015 467815-46781f call 41460c 2009->2015 2016 467812 2009->2016 2022 46786b-467875 call 4145ec 2013->2022 2023 467868 2013->2023 2024 46788a-467899 call 49529c 2014->2024 2025 46789b-46789d call 4953c0 2014->2025 2015->2008 2016->2015 2022->2014 2023->2022 2029 4678a2-4678f5 call 494db0 call 41a3e0 * 2 2024->2029 2025->2029 2037 467906-46791b call 451444 call 414b28 2029->2037 2038 4678f7-467904 call 414b28 2029->2038 2043 467920-467927 2037->2043 2038->2043 2045 46796f-467df5 call 4951ec call 495510 call 41462c * 3 call 4146cc call 4145ec * 3 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f80 call 460fd4 LoadBitmapA call 41d6c0 call 460fa4 call 460fbc call 4674ec call 469000 call 466b6c call 40357c call 414b28 call 466ea4 call 466eac call 466b6c call 40357c * 2 call 414b28 call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 414b28 * 2 call 469000 call 414b28 * 2 call 466ea4 call 41460c call 466ea4 call 41460c call 469000 call 414b28 call 466ea4 call 466eac call 469000 call 414b28 call 466ea4 call 41460c * 2 call 414b28 call 466ea4 call 41460c 2043->2045 2046 467929-46796a call 4146cc call 414710 call 420fa8 call 420fd4 call 420b78 call 420ba4 2043->2046 2176 467df7-467e4f call 41460c call 414b28 call 466ea4 call 41460c 2045->2176 2177 467e51-467e6a call 414a54 * 2 2045->2177 2046->2045 2184 467e6f-467f20 call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2176->2184 2177->2184 2203 467f22-467f3d 2184->2203 2204 467f5a-468190 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 4181f0 call 42ed48 call 414b28 call 4951ec call 495510 call 41462c call 466b6c call 414b28 call 466ea4 call 41460c call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 41460c call 466eac call 466b6c call 414b28 call 466ea4 2184->2204 2205 467f42-467f55 call 41460c 2203->2205 2206 467f3f 2203->2206 2265 468192-46819b 2204->2265 2266 4681d1-46828a call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2204->2266 2205->2204 2206->2205 2265->2266 2268 46819d-4681cc call 414a54 call 466eac 2265->2268 2284 4682c4-4686e5 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 414b28 call 4951ec call 495510 call 41462c call 414b28 call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 42bbe0 call 495520 call 44e8c0 call 466b6c call 469000 call 466b6c call 469000 call 466b6c call 469000 * 2 call 414b28 call 466ea4 call 466eac call 469000 call 494db0 call 41a3e0 call 466b6c call 40357c call 414b28 call 466ea4 call 41460c call 414b28 * 2 call 495520 call 403494 call 40357c * 2 call 414b28 2266->2284 2285 46828c-4682a7 2266->2285 2268->2266 2384 4686e7-468704 call 44ffc8 call 450124 2284->2384 2385 468709-468710 2284->2385 2286 4682ac-4682bf call 41460c 2285->2286 2287 4682a9 2285->2287 2286->2284 2287->2286 2384->2385 2387 468734-46873b 2385->2387 2388 468712-46872f call 44ffc8 call 450124 2385->2388 2389 46875f-4687a5 call 4181f0 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 4690f4 2387->2389 2390 46873d-46875a call 44ffc8 call 450124 2387->2390 2388->2387 2405 4687a7-4687ae 2389->2405 2406 4687bf 2389->2406 2390->2389 2408 4687b0-4687b9 2405->2408 2409 4687bb-4687bd 2405->2409 2407 4687c1-4687d0 2406->2407 2410 4687d2-4687d9 2407->2410 2411 4687ea 2407->2411 2408->2406 2408->2409 2409->2407 2412 4687e6-4687e8 2410->2412 2413 4687db-4687e4 2410->2413 2414 4687ec-468806 2411->2414 2412->2414 2413->2411 2413->2412 2415 4688af-4688b6 2414->2415 2416 46880c-468815 2414->2416 2419 4688bc-4688df call 47bfd8 call 403450 2415->2419 2420 468949-468957 call 414b28 2415->2420 2417 468817-46886e call 47bfd8 call 414b28 call 47bfd8 call 414b28 call 47bfd8 call 414b28 2416->2417 2418 468870-4688aa call 414b28 * 3 2416->2418 2417->2415 2418->2415 2439 4688f0-468904 call 403494 2419->2439 2440 4688e1-4688ee call 47c178 2419->2440 2425 46895c-468965 2420->2425 2429 468a75-468aa4 call 42b97c call 44e84c 2425->2429 2430 46896b-468983 call 429fe8 2425->2430 2464 468b52-468b56 2429->2464 2465 468aaa-468aae 2429->2465 2447 468985-468989 2430->2447 2448 4689fa-4689fe 2430->2448 2460 468916-468947 call 42c814 call 42cbd0 call 403494 call 414b28 2439->2460 2461 468906-468911 call 403494 2439->2461 2440->2460 2455 46898b-4689c5 call 40b44c call 47bfd8 2447->2455 2453 468a00-468a09 2448->2453 2454 468a4e-468a52 2448->2454 2453->2454 2462 468a0b-468a16 2453->2462 2458 468a66-468a70 call 42a06c 2454->2458 2459 468a54-468a64 call 42a06c 2454->2459 2523 4689c7-4689ce 2455->2523 2524 4689f4-4689f8 2455->2524 2458->2429 2459->2429 2460->2425 2461->2460 2462->2454 2472 468a18-468a1c 2462->2472 2475 468bd5-468bd9 2464->2475 2476 468b58-468b5f 2464->2476 2474 468ab0-468ac2 call 40b44c 2465->2474 2480 468a1e-468a41 call 40b44c call 406acc 2472->2480 2495 468af4-468b2b call 47bfd8 call 44cb1c 2474->2495 2496 468ac4-468af2 call 47bfd8 call 44cbec 2474->2496 2483 468c42-468c4b 2475->2483 2484 468bdb-468bf2 call 40b44c 2475->2484 2476->2475 2485 468b61-468b68 2476->2485 2533 468a43-468a46 2480->2533 2534 468a48-468a4c 2480->2534 2493 468c4d-468c65 call 40b44c call 469d68 2483->2493 2494 468c6a-468c7f call 46724c call 466fc8 2483->2494 2506 468bf4-468c30 call 40b44c call 469d68 * 2 call 469c08 2484->2506 2507 468c32-468c40 call 469d68 2484->2507 2485->2475 2487 468b6a-468b75 2485->2487 2487->2494 2499 468b7b-468b7f 2487->2499 2493->2494 2541 468cd1-468cdb call 414a54 2494->2541 2542 468c81-468ca4 call 42a050 call 40b44c 2494->2542 2543 468b30-468b34 2495->2543 2496->2543 2508 468b81-468b97 call 40b44c 2499->2508 2506->2494 2507->2494 2539 468bca-468bce 2508->2539 2540 468b99-468bc5 call 42a06c call 469d68 call 469c08 2508->2540 2523->2524 2525 4689d0-4689e2 call 406acc 2523->2525 2524->2448 2524->2455 2525->2524 2552 4689e4-4689ee 2525->2552 2533->2454 2534->2454 2534->2480 2539->2508 2551 468bd0 2539->2551 2540->2494 2553 468ce0-468cff call 414a54 2541->2553 2571 468ca6-468cad 2542->2571 2572 468caf-468cbe call 414a54 2542->2572 2549 468b36-468b3d 2543->2549 2550 468b3f-468b41 2543->2550 2549->2550 2557 468b48-468b4c 2549->2557 2550->2557 2551->2494 2552->2524 2558 4689f0 2552->2558 2567 468d01-468d24 call 42a050 call 469ec8 2553->2567 2568 468d29-468d4c call 47bfd8 call 403450 2553->2568 2557->2464 2557->2474 2558->2524 2567->2568 2586 468d4e-468d57 2568->2586 2587 468d68-468d71 2568->2587 2571->2572 2576 468cc0-468ccf call 414a54 2571->2576 2572->2553 2576->2553 2586->2587 2588 468d59-468d66 call 47c178 2586->2588 2589 468d87-468d97 call 403494 2587->2589 2590 468d73-468d85 call 403684 2587->2590 2597 468da9-468dc0 call 414b28 2588->2597 2589->2597 2590->2589 2598 468d99-468da4 call 403494 2590->2598 2602 468df6-468e00 call 414a54 2597->2602 2603 468dc2-468dc9 2597->2603 2598->2597 2609 468e05-468e2a call 403400 * 3 2602->2609 2604 468dd6-468de0 call 42b0f4 2603->2604 2605 468dcb-468dd4 2603->2605 2607 468de5-468df4 call 414a54 2604->2607 2605->2604 2605->2607 2607->2609
                                                                                        APIs
                                                                                          • Part of subcall function 0049529C: GetWindowRect.USER32(00000000), ref: 004952B2
                                                                                        • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467ADF
                                                                                          • Part of subcall function 0041D6C0: GetObjectA.GDI32(?,00000018,00467AF9), ref: 0041D6EB
                                                                                          • Part of subcall function 004674EC: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                                                          • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                                                          • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                                                          • Part of subcall function 00466EAC: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                                                          • Part of subcall function 00495520: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 0049552A
                                                                                          • Part of subcall function 0042ED48: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                                          • Part of subcall function 0042ED48: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                                          • Part of subcall function 004951EC: 73A1A570.USER32(00000000,?,?,?), ref: 0049520E
                                                                                          • Part of subcall function 004951EC: SelectObject.GDI32(?,00000000), ref: 00495234
                                                                                          • Part of subcall function 004951EC: 73A1A480.USER32(00000000,?,00495292,0049528B,?,00000000,?,?,?), ref: 00495285
                                                                                          • Part of subcall function 00495510: MulDiv.KERNEL32(0000004B,?,00000006), ref: 0049551A
                                                                                        • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,02159D90,0215B97C,?,?,0215B9AC,?,?,0215B9FC,?), ref: 00468769
                                                                                        • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046877A
                                                                                        • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468792
                                                                                          • Part of subcall function 0042A06C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A082
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$AppendExtractIconObject$A480A570AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectSelectSendSystemUserWindow
                                                                                        • String ID: $(Default)$STOPIMAGE$k H
                                                                                        • API String ID: 3271511185-4041106330
                                                                                        • Opcode ID: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                                                        • Instruction ID: 2b4e5e33b1fbe28ecfb2af168a793b611adbc31a6fcb8730d9662ddd01b2079a
                                                                                        • Opcode Fuzzy Hash: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                                                        • Instruction Fuzzy Hash: 6CF2C7386005208FCB00EB59D9D9F9973F5BF49304F1582BAF5049B36ADB74AC46CB9A
                                                                                        APIs
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 00475251
                                                                                        • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047532E
                                                                                        • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047533C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseFirstNext
                                                                                        • String ID: unins$unins???.*
                                                                                        • API String ID: 3541575487-1009660736
                                                                                        • Opcode ID: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                                                        • Instruction ID: 9ba6e551af2be01ae54f2bf6d4feb37662207b66b60327addd096aea054bc42d
                                                                                        • Opcode Fuzzy Hash: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                                                        • Instruction Fuzzy Hash: 333153706005489FDB10EB65D981ADE77B9EF44344F5080F6A80CAB3B2DBB89F418B58
                                                                                        APIs
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A89
                                                                                        • GetLastError.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileFindFirstLast
                                                                                        • String ID:
                                                                                        • API String ID: 873889042-0
                                                                                        • Opcode ID: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                                                        • Instruction ID: 2517da8cadb6fb7e7a3bde91136fc32a544ec95f0d2c756002249f4fd287b9db
                                                                                        • Opcode Fuzzy Hash: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                                                        • Instruction Fuzzy Hash: B9F0F971A04604AB8B20DBA69D0149EB7ACEB46725710467BFC14E3292EAB94E048558
                                                                                        APIs
                                                                                        • GetVersion.KERNEL32(00000502,0046E422), ref: 0046E396
                                                                                        • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,00000502,0046E422), ref: 0046E3B2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateInstanceVersion
                                                                                        • String ID:
                                                                                        • API String ID: 1462612201-0
                                                                                        • Opcode ID: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                                                        • Instruction ID: ca204bcfc643a6eeda20b237376823326e775e7ff9cf44b6f5c5a065e078b710
                                                                                        • Opcode Fuzzy Hash: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                                                        • Instruction Fuzzy Hash: 80F0A035282200DEEB1097AADC45B4A37C1BB20718F40007BF440D7391E3FDD8908A5F
                                                                                        APIs
                                                                                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 2299586839-0
                                                                                        • Opcode ID: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                                                        • Instruction ID: d3b8e551ebd18b966166ca098383beb9494d3946d3c482517005b7019d2e894c
                                                                                        • Opcode Fuzzy Hash: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                                                        • Instruction Fuzzy Hash: EEE0D87170021467D711A95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE8046ED
                                                                                        APIs
                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424161,?,00000000,0042416C), ref: 00423BBE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: NtdllProc_Window
                                                                                        • String ID:
                                                                                        • API String ID: 4255912815-0
                                                                                        • Opcode ID: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                                                        • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                                                        • Opcode Fuzzy Hash: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                                                        • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: NameUser
                                                                                        • String ID:
                                                                                        • API String ID: 2645101109-0
                                                                                        • Opcode ID: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                                                        • Instruction ID: 445fb77b721d6e8bc33303137c5d79e403f1e24c04085a252f4bbff9531eb306
                                                                                        • Opcode Fuzzy Hash: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                                                        • Instruction Fuzzy Hash: 6AD0C271304704A3C700AAA99C825AA35DD8B84315F00483F3CC6DA3C3FABDDA481696
                                                                                        APIs
                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F54C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: NtdllProc_Window
                                                                                        • String ID:
                                                                                        • API String ID: 4255912815-0
                                                                                        • Opcode ID: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                                                        • Instruction ID: 55aff4e3ab0814f5b97a0c0db1ec4da333d3f7c11773d115dc143ade784a7ab4
                                                                                        • Opcode Fuzzy Hash: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                                                        • Instruction Fuzzy Hash: BAD05E7120010C7B9B00DE9CE840C6B33BC9B88700BA08825F918C7202C634ED5187A8

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 406 46f300-46f332 407 46f334-46f33b 406->407 408 46f34f 406->408 409 46f346-46f34d 407->409 410 46f33d-46f344 407->410 411 46f356-46f38e call 403634 call 403738 call 42ded0 408->411 409->411 410->408 410->409 418 46f390-46f3a4 call 403738 call 42ded0 411->418 419 46f3a9-46f3d2 call 403738 call 42ddf4 411->419 418->419 427 46f3d4-46f3dd call 46efd0 419->427 428 46f3e2-46f40b call 46f0ec 419->428 427->428 432 46f41d-46f420 call 403400 428->432 433 46f40d-46f41b call 403494 428->433 437 46f425-46f470 call 46f0ec call 42c40c call 46f134 call 46f0ec 432->437 433->437 446 46f486-46f4a7 call 455588 call 46f0ec 437->446 447 46f472-46f485 call 46f15c 437->447 454 46f4fd-46f504 446->454 455 46f4a9-46f4fc call 46f0ec call 431414 call 46f0ec call 431414 call 46f0ec 446->455 447->446 456 46f506-46f543 call 431414 call 46f0ec call 431414 call 46f0ec 454->456 457 46f544-46f54b 454->457 455->454 456->457 461 46f58c-46f5b1 call 40b44c call 46f0ec 457->461 462 46f54d-46f58b call 46f0ec * 3 457->462 481 46f5b3-46f5be call 47bfd8 461->481 482 46f5c0-46f5c9 call 403494 461->482 462->461 491 46f5ce-46f5d9 call 478d20 481->491 482->491 496 46f5e2 491->496 497 46f5db-46f5e0 491->497 498 46f5e7-46f7b1 call 403778 call 46f0ec call 47bfd8 call 46f134 call 403494 call 40357c * 2 call 46f0ec call 403494 call 40357c * 2 call 46f0ec call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 496->498 497->498 561 46f7c7-46f7d5 call 46f15c 498->561 562 46f7b3-46f7c5 call 46f0ec 498->562 566 46f7da 561->566 567 46f7db-46f824 call 46f15c call 46f190 call 46f0ec call 47bfd8 call 46f1f4 562->567 566->567 578 46f826-46f849 call 46f15c * 2 567->578 579 46f84a-46f857 567->579 578->579 581 46f926-46f92d 579->581 582 46f85d-46f864 579->582 583 46f987-46f99d RegCloseKey 581->583 584 46f92f-46f965 call 4946bc 581->584 586 46f866-46f86d 582->586 587 46f8d1-46f8e0 582->587 584->583 586->587 591 46f86f-46f893 call 430bdc 586->591 590 46f8e3-46f8f0 587->590 594 46f907-46f920 call 430c18 call 46f15c 590->594 595 46f8f2-46f8ff 590->595 591->590 601 46f895-46f896 591->601 604 46f925 594->604 595->594 597 46f901-46f905 595->597 597->581 597->594 603 46f898-46f8be call 40b44c call 47954c 601->603 609 46f8c0-46f8c6 call 430bdc 603->609 610 46f8cb-46f8cd 603->610 604->581 609->610 610->603 612 46f8cf 610->612 612->590
                                                                                        APIs
                                                                                          • Part of subcall function 0046F0EC: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                                                          • Part of subcall function 0046F15C: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                                                        • RegCloseKey.ADVAPI32(?,0046F9A5,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F9F0,?,?,0049C1D0,00000000), ref: 0046F998
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value$Close
                                                                                        • String ID: " /SILENT$5.5.0 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                                        • API String ID: 3391052094-1769338133
                                                                                        • Opcode ID: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                                                        • Instruction ID: 138fe2a8aa43a8f2517aa1aee13eacc10811dc4b0cf032f1bf39601b5d09dcc5
                                                                                        • Opcode Fuzzy Hash: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                                                        • Instruction Fuzzy Hash: 96126331A001089BCB04EB55F891ADE77F5FB49304F60807BE841AB396EB79BD49CB59

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1027 492208-49223c call 403684 1030 49223e-49224d call 446fac Sleep 1027->1030 1031 492252-49225f call 403684 1027->1031 1036 4926e2-4926fc call 403420 1030->1036 1037 49228e-49229b call 403684 1031->1037 1038 492261-492284 call 447008 call 403738 FindWindowA call 447288 1031->1038 1046 4922ca-4922d7 call 403684 1037->1046 1047 49229d-4922c5 call 447008 call 403738 FindWindowA call 447288 1037->1047 1056 492289 1038->1056 1054 4922d9-49231b call 446fac * 4 SendMessageA call 447288 1046->1054 1055 492320-49232d call 403684 1046->1055 1047->1036 1054->1036 1064 49237c-492389 call 403684 1055->1064 1065 49232f-492377 call 446fac * 4 PostMessageA call 4470e0 1055->1065 1056->1036 1076 4923d8-4923e5 call 403684 1064->1076 1077 49238b-4923d3 call 446fac * 4 SendNotifyMessageA call 4470e0 1064->1077 1065->1036 1089 492412-49241f call 403684 1076->1089 1090 4923e7-49240d call 447008 call 403738 RegisterClipboardFormatA call 447288 1076->1090 1077->1036 1102 492421-49245b call 446fac * 3 SendMessageA call 447288 1089->1102 1103 492460-49246d call 403684 1089->1103 1090->1036 1102->1036 1115 49246f-4924af call 446fac * 3 PostMessageA call 4470e0 1103->1115 1116 4924b4-4924c1 call 403684 1103->1116 1115->1036 1128 492508-492515 call 403684 1116->1128 1129 4924c3-492503 call 446fac * 3 SendNotifyMessageA call 4470e0 1116->1129 1140 49256a-492577 call 403684 1128->1140 1141 492517-492535 call 447008 call 42e3a4 1128->1141 1129->1036 1151 492579-4925a5 call 447008 call 403738 call 446fac GetProcAddress 1140->1151 1152 4925f1-4925fe call 403684 1140->1152 1158 492547-492555 GetLastError call 447288 1141->1158 1159 492537-492545 call 447288 1141->1159 1183 4925e1-4925ec call 4470e0 1151->1183 1184 4925a7-4925dc call 446fac * 2 call 447288 call 4470e0 1151->1184 1164 492600-492621 call 446fac FreeLibrary call 4470e0 1152->1164 1165 492626-492633 call 403684 1152->1165 1170 49255a-492565 call 447288 1158->1170 1159->1170 1164->1036 1180 492658-492665 call 403684 1165->1180 1181 492635-492653 call 447008 call 403738 CreateMutexA 1165->1181 1170->1036 1191 49269b-4926a8 call 403684 1180->1191 1192 492667-492699 call 48c638 call 403574 call 403738 OemToCharBuffA call 48c650 1180->1192 1181->1036 1183->1036 1184->1036 1204 4926aa-4926dc call 48c638 call 403574 call 403738 CharToOemBuffA call 48c650 1191->1204 1205 4926de 1191->1205 1192->1036 1204->1036 1205->1036
                                                                                        APIs
                                                                                        • Sleep.KERNEL32(00000000,00000000,004926FD,?,?,?,?,00000000,00000000,00000000), ref: 00492248
                                                                                        • FindWindowA.USER32(00000000,00000000), ref: 00492279
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FindSleepWindow
                                                                                        • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                                        • API String ID: 3078808852-3310373309
                                                                                        • Opcode ID: c1ec15085ba63eb54c7011cdac0519612329d97296155b19e28ce0d5a23e6700
                                                                                        • Instruction ID: d4b9d66e752ac066ee841e8e0b6dcdad2790022369f15f3c2d7e05b7c0e56f01
                                                                                        • Opcode Fuzzy Hash: c1ec15085ba63eb54c7011cdac0519612329d97296155b19e28ce0d5a23e6700
                                                                                        • Instruction Fuzzy Hash: 7BC18360B042003BDB14BE3E8D4651F599AAF98704B21DA3FB446EB78BDE7DDC0A4359

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1589 4834fc-483521 GetModuleHandleA GetProcAddress 1590 483588-48358d GetSystemInfo 1589->1590 1591 483523-483539 GetNativeSystemInfo GetProcAddress 1589->1591 1592 483592-48359b 1590->1592 1591->1592 1593 48353b-483546 GetCurrentProcess 1591->1593 1594 4835ab-4835b2 1592->1594 1595 48359d-4835a1 1592->1595 1593->1592 1600 483548-48354c 1593->1600 1599 4835cd-4835d2 1594->1599 1597 4835a3-4835a7 1595->1597 1598 4835b4-4835bb 1595->1598 1601 4835a9-4835c6 1597->1601 1602 4835bd-4835c4 1597->1602 1598->1599 1600->1592 1603 48354e-483555 call 452708 1600->1603 1601->1599 1602->1599 1603->1592 1607 483557-483564 GetProcAddress 1603->1607 1607->1592 1608 483566-48357d GetModuleHandleA GetProcAddress 1607->1608 1608->1592 1609 48357f-483586 1608->1609 1609->1592
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0048350D
                                                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0048351A
                                                                                        • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483528
                                                                                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483530
                                                                                        • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 0048353C
                                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 0048355D
                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483570
                                                                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483576
                                                                                        • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0048358D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                                        • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                                        • API String ID: 2230631259-2623177817
                                                                                        • Opcode ID: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                                                        • Instruction ID: aef9cc714e700b71c16e3c25fef244724f393c0ebf8792b51c17ae6c670cb8ad
                                                                                        • Opcode Fuzzy Hash: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                                                        • Instruction Fuzzy Hash: 3C11B181104341B4DA22BB799C4AB7FA5C88B14F1EF084C3B6C41662C2DBBCCF45972E

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1615 4690f4-46912c call 47bfd8 1618 469132-469142 call 478d40 1615->1618 1619 46930e-469328 call 403420 1615->1619 1624 469147-46918c call 4078fc call 403738 call 42de2c 1618->1624 1630 469191-469193 1624->1630 1631 469304-469308 1630->1631 1632 469199-4691ae 1630->1632 1631->1619 1631->1624 1633 4691c3-4691ca 1632->1633 1634 4691b0-4691be call 42dd5c 1632->1634 1636 4691f7-4691fe 1633->1636 1637 4691cc-4691ee call 42dd5c call 42dd74 1633->1637 1634->1633 1639 469257-46925e 1636->1639 1640 469200-469225 call 42dd5c * 2 1636->1640 1637->1636 1656 4691f0 1637->1656 1643 4692a4-4692ab 1639->1643 1644 469260-469272 call 42dd5c 1639->1644 1661 469227-469230 call 431508 1640->1661 1662 469235-469247 call 42dd5c 1640->1662 1646 4692e6-4692fc RegCloseKey 1643->1646 1647 4692ad-4692e1 call 42dd5c * 3 1643->1647 1657 469274-46927d call 431508 1644->1657 1658 469282-469294 call 42dd5c 1644->1658 1647->1646 1656->1636 1657->1658 1658->1643 1668 469296-46929f call 431508 1658->1668 1661->1662 1662->1639 1672 469249-469252 call 431508 1662->1672 1668->1643 1672->1639
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegCloseKey.ADVAPI32(?,0046930E,?,?,00000001,00000000,00000000,00469329,?,00000000,00000000,?), ref: 004692F7
                                                                                        Strings
                                                                                        • %s\%s_is1, xrefs: 00469171
                                                                                        • Inno Setup: Selected Tasks, xrefs: 00469263
                                                                                        • Inno Setup: Deselected Tasks, xrefs: 00469285
                                                                                        • Inno Setup: User Info: Name, xrefs: 004692B3
                                                                                        • Inno Setup: Selected Components, xrefs: 00469216
                                                                                        • Inno Setup: No Icons, xrefs: 004691DF
                                                                                        • Inno Setup: User Info: Serial, xrefs: 004692D9
                                                                                        • Inno Setup: User Info: Organization, xrefs: 004692C6
                                                                                        • Inno Setup: App Path, xrefs: 004691B6
                                                                                        • Inno Setup: Deselected Components, xrefs: 00469238
                                                                                        • Inno Setup: Setup Type, xrefs: 00469206
                                                                                        • Inno Setup: Icon Group, xrefs: 004691D2
                                                                                        • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00469153
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                        • API String ID: 47109696-1093091907
                                                                                        • Opcode ID: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                                                        • Instruction ID: 061cd232f3236ea8aa9d1be5d6e88d15b117e94232a8cb9589ebe07a9024ca8b
                                                                                        • Opcode Fuzzy Hash: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                                                        • Instruction Fuzzy Hash: 2451A530A007049BCB11DB65D991BDEB7F9EF49304F5084BAE841A7391E778AE05CB59

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1944 47cb30-47cb86 call 42c40c call 4035c0 call 47c7a8 call 4525c4 1953 47cb92-47cba1 call 4525c4 1944->1953 1954 47cb88-47cb8d call 453330 1944->1954 1958 47cba3-47cba9 1953->1958 1959 47cbbb-47cbc1 1953->1959 1954->1953 1960 47cbcb-47cbd3 call 403494 1958->1960 1961 47cbab-47cbb1 1958->1961 1962 47cbc3-47cbc9 1959->1962 1963 47cbd8-47cc00 call 42e3a4 * 2 1959->1963 1960->1963 1961->1959 1964 47cbb3-47cbb9 1961->1964 1962->1960 1962->1963 1970 47cc27-47cc41 GetProcAddress 1963->1970 1971 47cc02-47cc22 call 4078fc call 453330 1963->1971 1964->1959 1964->1960 1972 47cc43-47cc48 call 453330 1970->1972 1973 47cc4d-47cc6a call 403400 * 2 1970->1973 1971->1970 1972->1973
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(6F9D0000,SHGetFolderPathA), ref: 0047CC32
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: -rI$Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                                        • API String ID: 190572456-1821436788
                                                                                        • Opcode ID: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                                                        • Instruction ID: 6634b889f1a60bd4549a24dd6789ad2f54a0d6468ac2a8038bb9781f42ef23c6
                                                                                        • Opcode Fuzzy Hash: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                                                        • Instruction Fuzzy Hash: 8531E970A00109DFCF11EFA9D9D29EEB7B5EB44304B60847BE808E7241D738AE458B6D

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1982 406334-40634e GetModuleHandleA GetProcAddress 1983 406350 1982->1983 1984 406357-406364 GetProcAddress 1982->1984 1983->1984 1985 406366 1984->1985 1986 40636d-40637a GetProcAddress 1984->1986 1985->1986 1987 406380-406381 1986->1987 1988 40637c-40637e SetProcessDEPPolicy 1986->1988 1988->1987
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModulePolicyProcess
                                                                                        • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                        • API String ID: 3256987805-3653653586
                                                                                        • Opcode ID: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                                                        • Instruction ID: d0a9e1fb4642b92a4408cab99680119fc9d423cfedcded744397bec81fc197df
                                                                                        • Opcode Fuzzy Hash: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                                                        • Instruction Fuzzy Hash: C6E026A1380701ACEA1436F20D82F7B10488B40B64B2A14373D5AB91C3D9BDD92459BD

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2618 423884-42388e 2619 4239b7-4239bb 2618->2619 2620 423894-4238b6 call 41f3d4 GetClassInfoA 2618->2620 2623 4238e7-4238f0 GetSystemMetrics 2620->2623 2624 4238b8-4238cf RegisterClassA 2620->2624 2625 4238f2 2623->2625 2626 4238f5-4238ff GetSystemMetrics 2623->2626 2624->2623 2627 4238d1-4238e2 call 408cc4 call 40311c 2624->2627 2625->2626 2629 423901 2626->2629 2630 423904-423960 call 403738 call 406300 call 403400 call 42365c SetWindowLongA 2626->2630 2627->2623 2629->2630 2641 423962-423975 call 424188 SendMessageA 2630->2641 2642 42397a-4239a8 GetSystemMenu DeleteMenu * 2 2630->2642 2641->2642 2642->2619 2644 4239aa-4239b2 DeleteMenu 2642->2644 2644->2619
                                                                                        APIs
                                                                                          • Part of subcall function 0041F3D4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                                        • GetClassInfoA.USER32(00400000,0042368C), ref: 004238AF
                                                                                        • RegisterClassA.USER32(00499630), ref: 004238C7
                                                                                        • GetSystemMetrics.USER32(00000000), ref: 004238E9
                                                                                        • GetSystemMetrics.USER32(00000001), ref: 004238F8
                                                                                        • SetWindowLongA.USER32(00410660,000000FC,0042369C), ref: 00423954
                                                                                        • SendMessageA.USER32(00410660,00000080,00000001,00000000), ref: 00423975
                                                                                        • GetSystemMenu.USER32(00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 00423980
                                                                                        • DeleteMenu.USER32(00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 0042398F
                                                                                        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042399C
                                                                                        • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239B2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                                        • String ID:
                                                                                        • API String ID: 183575631-0
                                                                                        • Opcode ID: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                                                        • Instruction ID: c8b20579a229f032ee7a03b4d787949f367ffe63dd75f0d430c9c3a529dbdbac
                                                                                        • Opcode Fuzzy Hash: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                                                        • Instruction Fuzzy Hash: 813172B17402006AEB10AF65AC82F6B36989B14308F10017BFA40AE2D3C6BDDD40876D

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2646 4674ec-467596 call 41462c call 41464c call 41462c call 41464c SHGetFileInfo 2655 4675cb-4675d6 call 478d20 2646->2655 2656 467598-46759f 2646->2656 2661 467627-46763a call 47cff4 2655->2661 2662 4675d8-46761d call 42c40c call 40357c call 403738 ExtractIconA call 46742c 2655->2662 2656->2655 2657 4675a1-4675c6 ExtractIconA call 46742c 2656->2657 2657->2655 2667 46763c-467646 call 47cff4 2661->2667 2668 46764b-46764f 2661->2668 2683 467622 2662->2683 2667->2668 2671 467651-467674 call 403738 SHGetFileInfo 2668->2671 2672 4676a9-4676dd call 403400 * 2 2668->2672 2671->2672 2682 467676-46767d 2671->2682 2682->2672 2685 46767f-4676a4 ExtractIconA call 46742c 2682->2685 2683->2672 2685->2672
                                                                                        APIs
                                                                                        • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                                                        • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                                                          • Part of subcall function 0046742C: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 004674C4
                                                                                          • Part of subcall function 0046742C: DestroyCursor.USER32(00000000), ref: 004674DA
                                                                                        • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                                                        • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 0046766D
                                                                                        • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467693
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                                        • String ID: c:\directory$k H$shell32.dll
                                                                                        • API String ID: 3376378930-433663191
                                                                                        • Opcode ID: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                                                        • Instruction ID: 265839c963417482dd86c951db209f81288bb0a388fd09f062db7983cc26d63d
                                                                                        • Opcode Fuzzy Hash: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                                                        • Instruction Fuzzy Hash: B2516070604604AFDB10EF69CD89FDFB7E8EB48318F1081A6F9049B391D6399E81CA59

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2688 42f570-42f57a 2689 42f584-42f5c1 call 402b30 GetActiveWindow GetFocus call 41eeb4 2688->2689 2690 42f57c-42f57f call 402d30 2688->2690 2696 42f5d3-42f5db 2689->2696 2697 42f5c3-42f5cd RegisterClassA 2689->2697 2690->2689 2698 42f662-42f67e SetFocus call 403400 2696->2698 2699 42f5e1-42f612 CreateWindowExA 2696->2699 2697->2696 2699->2698 2700 42f614-42f658 call 42428c call 403738 CreateWindowExA 2699->2700 2700->2698 2707 42f65a-42f65d ShowWindow 2700->2707 2707->2698
                                                                                        APIs
                                                                                        • GetActiveWindow.USER32 ref: 0042F59F
                                                                                        • GetFocus.USER32 ref: 0042F5A7
                                                                                        • RegisterClassA.USER32(004997AC), ref: 0042F5C8
                                                                                        • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F69C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F606
                                                                                        • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F64C
                                                                                        • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F65D
                                                                                        • SetFocus.USER32(00000000,00000000,0042F67F,?,?,?,00000001,00000000,?,00458696,00000000,0049B628), ref: 0042F664
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                                        • String ID: TWindowDisabler-Window
                                                                                        • API String ID: 3167913817-1824977358
                                                                                        • Opcode ID: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                                                        • Instruction ID: 092f1afd63313efa57bcf667ad1f00c9caddf595d34af2871f870ebe591ae418
                                                                                        • Opcode Fuzzy Hash: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                                                        • Instruction Fuzzy Hash: 20219F70740710BAE710EF62AD03F1A76A8EB04B04FA1413AF504AB2D1D7B96D5586ED
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                        • API String ID: 1646373207-2130885113
                                                                                        • Opcode ID: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                                                        • Instruction ID: 5e931287d6eebe3694b70f0ad3549e6df422da746536320e83a51589c54bb73f
                                                                                        • Opcode Fuzzy Hash: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                                                        • Instruction Fuzzy Hash: 5B017570240B45AFD711AF73AD02F167658E705B57F6044BBFC0096286D77C8A088EAD
                                                                                        APIs
                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C893
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C89C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                        • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup
                                                                                        • API String ID: 1375471231-1421604804
                                                                                        • Opcode ID: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                                                        • Instruction ID: 2e7cf1fa8793a22cdcb7cccf6aa375e82942df810c5d1ff78a46bc34c798803d
                                                                                        • Opcode Fuzzy Hash: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                                                        • Instruction Fuzzy Hash: 65411474A001099BDB00EFA5D8C2ADEB7B9EB44309F50857BE91477392DB389E058B69
                                                                                        APIs
                                                                                        • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430958
                                                                                        • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430967
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00430981
                                                                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 004309A2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                                        • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                                        • API String ID: 4130936913-2943970505
                                                                                        • Opcode ID: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                                                        • Instruction ID: fe08fc0df2a0eca0a869f0df0621173a2940aa0bc2523ddfe777e35bb070d714
                                                                                        • Opcode Fuzzy Hash: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                                                        • Instruction Fuzzy Hash: 30F082B0958340CEE300EB25994271A7BE0EF58318F00467FF498A63E2D7399900CB5F
                                                                                        APIs
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951), ref: 00472591
                                                                                        • FindClose.KERNEL32(000000FF,004725BC,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951,?), ref: 004725AF
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951), ref: 004726B3
                                                                                        • FindClose.KERNEL32(000000FF,004726DE,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951,?), ref: 004726D1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$CloseFileNext
                                                                                        • String ID: "*G$"*G
                                                                                        • API String ID: 2066263336-450946878
                                                                                        • Opcode ID: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                                                        • Instruction ID: 3872decae14ce2498a692a517acaa1cf84d86a609609514027ee2c14d85ef847
                                                                                        • Opcode Fuzzy Hash: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                                                        • Instruction Fuzzy Hash: 6CB13E7490424DAFCF11DFA5C981ADEBBB9FF49304F5081AAE808B3251D7789A46CF58
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218,00000000), ref: 004551A6
                                                                                        • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218), ref: 004551B3
                                                                                          • Part of subcall function 00454F68: WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                                                          • Part of subcall function 00454F68: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                                                          • Part of subcall function 00454F68: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                                                          • Part of subcall function 00454F68: CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                                        • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                                        • API String ID: 854858120-615399546
                                                                                        • Opcode ID: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                                                        • Instruction ID: 314af404618b4f06b129018ed763823481dfe4f790e250d6c958622b2bfe97d6
                                                                                        • Opcode Fuzzy Hash: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                                                        • Instruction Fuzzy Hash: 12515A30A0074DABDB11EF95C892BEEBBB9AF44705F50407BB804B7282D7785A49CB59
                                                                                        APIs
                                                                                        • LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                                        • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                                        • OemToCharA.USER32(?,?), ref: 0042376C
                                                                                        • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Char$FileIconLoadLowerModuleName
                                                                                        • String ID: 2$MAINICON
                                                                                        • API String ID: 3935243913-3181700818
                                                                                        • Opcode ID: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                                                        • Instruction ID: fd9f9c5161a85cdd37c149357dc6ae372d2e201a3957992c444bec056041847b
                                                                                        • Opcode Fuzzy Hash: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                                                        • Instruction Fuzzy Hash: 89319270A042549ADF14EF2998857C67BE8AF14308F4441BAE844DB393D7BED988CB99
                                                                                        APIs
                                                                                        • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F4D
                                                                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F6E
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00418F89
                                                                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00418FAA
                                                                                          • Part of subcall function 004230D8: 73A1A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                                          • Part of subcall function 004230D8: EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                                          • Part of subcall function 004230D8: 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                                          • Part of subcall function 004230D8: 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                                          • Part of subcall function 0042369C: LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                                          • Part of subcall function 0042369C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                                          • Part of subcall function 0042369C: OemToCharA.USER32(?,?), ref: 0042376C
                                                                                          • Part of subcall function 0042369C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                                          • Part of subcall function 0041F128: GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                                          • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                                          • Part of subcall function 0041F128: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                                          • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                                          • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                                          • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                                          • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                                          • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                                          • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                                          • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                                          • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                                          • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                                          • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                                          • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A24620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                                                        • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                                        • API String ID: 3864787166-2767913252
                                                                                        • Opcode ID: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                                                        • Instruction ID: 147b0fd3ac44816fa50e213e98ef70cab9cb63b371fef283777c7ccc396f8742
                                                                                        • Opcode Fuzzy Hash: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                                                        • Instruction Fuzzy Hash: BB112EB06142409AC740FF76A94265A7BE1DB64318F40843FF448EB2D1DB7D99448B5F
                                                                                        APIs
                                                                                        • SetWindowLongA.USER32(?,000000FC,?), ref: 00413674
                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 0041367F
                                                                                        • GetWindowLongA.USER32(?,000000F4), ref: 00413691
                                                                                        • SetWindowLongA.USER32(?,000000F4,?), ref: 004136A4
                                                                                        • SetPropA.USER32(?,00000000,00000000), ref: 004136BB
                                                                                        • SetPropA.USER32(?,00000000,00000000), ref: 004136D2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: LongWindow$Prop
                                                                                        • String ID:
                                                                                        • API String ID: 3887896539-0
                                                                                        • Opcode ID: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                                                        • Instruction ID: 955d73ee8c9e489f8eb805393a0cdbf9fe7b6d9765079e051d97cf620cdedb95
                                                                                        • Opcode Fuzzy Hash: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                                                        • Instruction Fuzzy Hash: D811C975500248BFDB00DF9DDC84EDA3BE8EB19364F144666B918DB2A1D738DD908BA8
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045585B,?,00000000,0045589B), ref: 004557A1
                                                                                        Strings
                                                                                        • PendingFileRenameOperations2, xrefs: 00455770
                                                                                        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455724
                                                                                        • PendingFileRenameOperations, xrefs: 00455740
                                                                                        • WININIT.INI, xrefs: 004557D0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                                        • API String ID: 47109696-2199428270
                                                                                        • Opcode ID: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                                                        • Instruction ID: 5ff55985f0d79b0cf99ef6a0ef0ae12f56fe6c83aec1de8438bfb9543cdeefde
                                                                                        • Opcode Fuzzy Hash: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                                                        • Instruction Fuzzy Hash: BB519670E006089FDB10FF61DC51AEEB7B9EF45305F50857BE804A7292DB7CAA49CA58
                                                                                        APIs
                                                                                        • EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                                        • GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                                        • SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$EnumLongWindows
                                                                                        • String ID: lAB
                                                                                        • API String ID: 4191631535-3476862382
                                                                                        • Opcode ID: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                                                        • Instruction ID: 20c146af1fa2ebf8fe73d6cd857ce812a249192cdefe4c29475ac4fba41381ea
                                                                                        • Opcode Fuzzy Hash: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                                                        • Instruction Fuzzy Hash: 4E115E70700610ABDB109F28DD85F6A77E8EB04725F50026AF9A49B2E7C378ED40CB59
                                                                                        APIs
                                                                                        • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE60
                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFFB,00000000,0042E013,?,?,?,?,00000006,?,00000000,0049722D), ref: 0042DE7B
                                                                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE81
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressDeleteHandleModuleProc
                                                                                        • String ID: RegDeleteKeyExA$advapi32.dll
                                                                                        • API String ID: 588496660-1846899949
                                                                                        • Opcode ID: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                                                        • Instruction ID: 51feda2b41882886fdb541a0ee71ee95ad591444612597d61ea777cd3c773b46
                                                                                        • Opcode Fuzzy Hash: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                                                        • Instruction Fuzzy Hash: 3EE06DB1B41B30AAD72032A57C8AB932629DB75326F658537F005AE1D183FC2C50CE9D
                                                                                        Strings
                                                                                        • Need to restart Windows? %s, xrefs: 0046C172
                                                                                        • PrepareToInstall failed: %s, xrefs: 0046C14B
                                                                                        • NextButtonClick, xrefs: 0046BF84
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                                        • API String ID: 0-2329492092
                                                                                        • Opcode ID: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                                                        • Instruction ID: 1202268df95ceb0eead913a0caf14b6b564ec17a2e6689a58d7256d675820d07
                                                                                        • Opcode Fuzzy Hash: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                                                        • Instruction Fuzzy Hash: 64C16D34A04208DFCB00DB98C9D5AEE77B5EF05304F1444B7E840AB362D778AE41DBAA
                                                                                        APIs
                                                                                        • SetActiveWindow.USER32(?,?,00000000,00482E54), ref: 00482C30
                                                                                        • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00482CC5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ActiveChangeNotifyWindow
                                                                                        • String ID: $Need to restart Windows? %s
                                                                                        • API String ID: 1160245247-4200181552
                                                                                        • Opcode ID: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                                                        • Instruction ID: 8ca071c16d970d9f92bb59f1fa37784b4b8a51c549d6f2244aaf7164950ab745
                                                                                        • Opcode Fuzzy Hash: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                                                        • Instruction Fuzzy Hash: 2191B4346042458FDB10EB69D9C5BAD77F4AF59308F0084BBE8009B3A2CBB8AD05CB5D
                                                                                        APIs
                                                                                          • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                                        • GetLastError.KERNEL32(00000000,0046FF81,?,?,0049C1D0,00000000), ref: 0046FE5E
                                                                                        • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FED8
                                                                                        • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FEFD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                                        • String ID: Creating directory: %s
                                                                                        • API String ID: 2451617938-483064649
                                                                                        • Opcode ID: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                                                        • Instruction ID: bdf8a9d00633064e3922ce557b3b2562df44373322d6b4000fae74d311730630
                                                                                        • Opcode Fuzzy Hash: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                                                        • Instruction Fuzzy Hash: AE513F74A00248ABDB04DFA5D582BDEB7F5AF09304F50817BE850B7382D7786E08CB69
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E6E
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F34), ref: 00454ED8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressByteCharMultiProcWide
                                                                                        • String ID: SfcIsFileProtected$sfc.dll
                                                                                        • API String ID: 2508298434-591603554
                                                                                        • Opcode ID: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                                                        • Instruction ID: 1a17c74f1ac94ad93f17d87dc1e08c5ddb540f3824a5df31749c88666692504e
                                                                                        • Opcode Fuzzy Hash: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                                                        • Instruction Fuzzy Hash: 6A41A630A042189BEB10DB69DC85B9D77B8AB4430DF5081B7E908A7293D7785F88CF59
                                                                                        APIs
                                                                                        • 73A1A570.USER32(00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B411
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0044B434
                                                                                        • 73A1A480.USER32(00000000,?,0044B474,00000000,0044B46D,?,00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B467
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A480A570ObjectSelect
                                                                                        • String ID: k H
                                                                                        • API String ID: 1230475511-1447039187
                                                                                        • Opcode ID: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                                                        • Instruction ID: b5872ed9d16ca79c431bae9e7544c15e8f802733be01f045b529408bc148fe47
                                                                                        • Opcode Fuzzy Hash: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                                                        • Instruction Fuzzy Hash: 6D217470A04248AFEB15DFA5C851B9EBBB9EB49304F51807AF504E7282D77CD940CB69
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B15C,?,k H,?,?), ref: 0044B12E
                                                                                        • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B141
                                                                                        • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B175
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: DrawText$ByteCharMultiWide
                                                                                        • String ID: k H
                                                                                        • API String ID: 65125430-1447039187
                                                                                        • Opcode ID: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                                                        • Instruction ID: 2dd5a1fcad8022b5ecdd36c3e8438632fadfe976456551c737a9f8dd3ea145e1
                                                                                        • Opcode Fuzzy Hash: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                                                        • Instruction Fuzzy Hash: A3110BB6700604BFE700DB5A9C91D6F77ECD749750F10413BF504D72D0C6389E018668
                                                                                        APIs
                                                                                        • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                                          • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                          • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                          • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                        • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                                        • String ID: SHAutoComplete$shlwapi.dll
                                                                                        • API String ID: 395431579-1506664499
                                                                                        • Opcode ID: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                                                        • Instruction ID: a33720f3aac7210c00664dabe11b621525643aa7ae94b1405928deeb439ddd4e
                                                                                        • Opcode Fuzzy Hash: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                                                        • Instruction Fuzzy Hash: 1611A331B00318BBDB11EB62ED81B8E7BA8DB55704F90407BF400A6691DBB8AE05C65D
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegCloseKey.ADVAPI32(?,00455A67,?,00000001,00000000), ref: 00455A5A
                                                                                        Strings
                                                                                        • PendingFileRenameOperations2, xrefs: 00455A3B
                                                                                        • PendingFileRenameOperations, xrefs: 00455A2C
                                                                                        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A08
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                        • API String ID: 47109696-2115312317
                                                                                        • Opcode ID: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                                                        • Instruction ID: a84b10804161a04e9b7828e63518c67389a2277fb2d5ef6d9c2d81c30e1ce2e0
                                                                                        • Opcode Fuzzy Hash: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                                                        • Instruction Fuzzy Hash: 49F09671714A04BFEB05D665DC72E3A739CD744B15FA1446BF800C6682DA7DBE04951C
                                                                                        APIs
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?,00000000), ref: 0047F8AA
                                                                                        • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?), ref: 0047F8B7
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D), ref: 0047F9AC
                                                                                        • FindClose.KERNEL32(000000FF,0047F9D7,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?), ref: 0047F9CA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$CloseFileNext
                                                                                        • String ID:
                                                                                        • API String ID: 2066263336-0
                                                                                        • Opcode ID: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                                                        • Instruction ID: d4c1b09f85a1e3ce5f066f5119f691750f955bf6e0a6470712ab8dbd39f482a6
                                                                                        • Opcode Fuzzy Hash: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                                                        • Instruction Fuzzy Hash: 80513E71A00648AFCB10EF65CC45ADEB7B8AB88315F1085BAA818E7351D7389F49CF59
                                                                                        APIs
                                                                                        • GetMenu.USER32(00000000), ref: 00421371
                                                                                        • SetMenu.USER32(00000000,00000000), ref: 0042138E
                                                                                        • SetMenu.USER32(00000000,00000000), ref: 004213C3
                                                                                        • SetMenu.USER32(00000000,00000000), ref: 004213DF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu
                                                                                        • String ID:
                                                                                        • API String ID: 3711407533-0
                                                                                        • Opcode ID: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                                                        • Instruction ID: 7918b5ac66a49b7c70f092078a7f06842b1ce09055eaa5e04548cec6233339c2
                                                                                        • Opcode Fuzzy Hash: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                                                        • Instruction Fuzzy Hash: 7D41A13070025447EB20EA79A9857AB26969F69318F4805BFFC44DF3A3CA7DDC45839D
                                                                                        APIs
                                                                                        • SendMessageA.USER32(?,?,?,?), ref: 00416B94
                                                                                        • SetTextColor.GDI32(?,00000000), ref: 00416BAE
                                                                                        • SetBkColor.GDI32(?,00000000), ref: 00416BC8
                                                                                        • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BF0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Color$CallMessageProcSendTextWindow
                                                                                        • String ID:
                                                                                        • API String ID: 601730667-0
                                                                                        • Opcode ID: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                                                        • Instruction ID: 7a78515b3e46194db8101330e18da160614de8b80347fcfd5663145ee8fb6c7e
                                                                                        • Opcode Fuzzy Hash: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                                                        • Instruction Fuzzy Hash: 27115EB6600A04AFC710EE6ECC84E8773ECDF48314715883EB59ADB612D638F8418B69
                                                                                        APIs
                                                                                        • 73A1A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                                        • EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                                        • 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                                        • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A24620A480A570EnumFonts
                                                                                        • String ID:
                                                                                        • API String ID: 2630238358-0
                                                                                        • Opcode ID: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                                                        • Instruction ID: 16e9332b6476af0d686f12fa818e5571f82757a24bc5219822a197079b30e1ec
                                                                                        • Opcode Fuzzy Hash: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                                                        • Instruction Fuzzy Hash: D80192717447106AE710BF7A5C86B9B36649F04719F40427BF804AF2C7D6BE9C05476E
                                                                                        APIs
                                                                                          • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                                        • FlushFileBuffers.KERNEL32(?), ref: 0045C7FD
                                                                                        Strings
                                                                                        • EndOffset range exceeded, xrefs: 0045C731
                                                                                        • NumRecs range exceeded, xrefs: 0045C6FA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$BuffersFlush
                                                                                        • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                                        • API String ID: 3593489403-659731555
                                                                                        • Opcode ID: 794c48d8177613dd3f63bd91f05815d926f9d199b7ec90082a892dce85f7227f
                                                                                        • Instruction ID: 42c6ccb15965a4bc01c0ab80d29458e35b3cecf9486565f2d0e9c4cbdba5a9bf
                                                                                        • Opcode Fuzzy Hash: 794c48d8177613dd3f63bd91f05815d926f9d199b7ec90082a892dce85f7227f
                                                                                        • Instruction Fuzzy Hash: A5617134A002988FDB24DF25C891AD9B7B5EF49305F0084DAED89AB352D774AEC9CF54
                                                                                        APIs
                                                                                          • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498586), ref: 0040334B
                                                                                          • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498586), ref: 00403356
                                                                                          • Part of subcall function 00406334: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                                                          • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                                          • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                                          • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                                          • Part of subcall function 00406334: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                                                          • Part of subcall function 00409B88: 6F551CD0.COMCTL32(0049859A), ref: 00409B88
                                                                                          • Part of subcall function 00410964: GetCurrentThreadId.KERNEL32 ref: 004109B2
                                                                                          • Part of subcall function 00419050: GetVersion.KERNEL32(004985AE), ref: 00419050
                                                                                          • Part of subcall function 0044F754: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                                                          • Part of subcall function 0044F754: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                                                          • Part of subcall function 0044FBFC: GetVersionExA.KERNEL32(0049B790,004985C7), ref: 0044FC0B
                                                                                          • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                                                          • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                                                          • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                                                          • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                                                          • Part of subcall function 00456EEC: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                                                          • Part of subcall function 00464960: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                                                          • Part of subcall function 00464960: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                                                          • Part of subcall function 0046D098: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                                                          • Part of subcall function 00478B3C: GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                                                          • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                                                          • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                                                          • Part of subcall function 00495584: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 0049559D
                                                                                        • SetErrorMode.KERNEL32(00000001,00000000,0049863C), ref: 0049860E
                                                                                          • Part of subcall function 00498338: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                                                          • Part of subcall function 00498338: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                                                          • Part of subcall function 004244E4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424503
                                                                                          • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                        • ShowWindow.USER32(?,00000005,00000000,0049863C), ref: 0049866F
                                                                                          • Part of subcall function 00482050: SetActiveWindow.USER32(?), ref: 004820FE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF551FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                                        • String ID: Setup
                                                                                        • API String ID: 3870281231-3839654196
                                                                                        • Opcode ID: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                                                        • Instruction ID: d131c851e578025af209eb9e9c2d0e6aaf1cfb04eb4cc82699b843ce611002a7
                                                                                        • Opcode Fuzzy Hash: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                                                        • Instruction Fuzzy Hash: 5C31D4702046409ED601BBBBED5352E3B98EB8A718B61487FF804D6553CE3D6C148A3E
                                                                                        APIs
                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A56
                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A5F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                        • String ID: .tmp
                                                                                        • API String ID: 1375471231-2986845003
                                                                                        • Opcode ID: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                                                        • Instruction ID: fcbeb811eea92760dd82faa40bdacdd366465f8a5342b7af386d3ee3900427bd
                                                                                        • Opcode Fuzzy Hash: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                                                        • Instruction Fuzzy Hash: 5A213375A00208ABDB01EFA1C8429DEB7B9EB48305F50457BE801B7342DA789F058AA5
                                                                                        APIs
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C596,00000000,0047C5AC,?,?,?,?,00000000), ref: 0047C372
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close
                                                                                        • String ID: RegisteredOrganization$RegisteredOwner
                                                                                        • API String ID: 3535843008-1113070880
                                                                                        • Opcode ID: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                                                        • Instruction ID: cd6b81515cbcb541a42d20c803a6709c30f964b406f28b15d8fe69fce277d2ff
                                                                                        • Opcode Fuzzy Hash: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                                                        • Instruction Fuzzy Hash: 41F09030704204ABEB00D669ECD2BAA33A99746304F60C03FA9088B392D6799E01CB5C
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754E1
                                                                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754F8
                                                                                          • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateErrorFileHandleLast
                                                                                        • String ID: CreateFile
                                                                                        • API String ID: 2528220319-823142352
                                                                                        • Opcode ID: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                                                        • Instruction ID: 40e201e46ebb19b1d9bf90fbf766f72b309683208074062896c4944ddf319cda
                                                                                        • Opcode Fuzzy Hash: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                                                        • Instruction Fuzzy Hash: CDE065702403447FDA10F769CCC6F4577889B14729F10C155B5446F3D2C5B9EC408628
                                                                                        APIs
                                                                                        • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Open
                                                                                        • String ID: System\CurrentControlSet\Control\Windows$c6H
                                                                                        • API String ID: 71445658-1548894351
                                                                                        • Opcode ID: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                                                        • Instruction ID: b14c86e398362f8621ba381b59967aff518ca924b2daa5b46ce173f8349262a2
                                                                                        • Opcode Fuzzy Hash: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                                                        • Instruction Fuzzy Hash: BFD0C772950128BBDB00DA89DC41DFB775DDB15760F45441BFD049B141C1B4EC5197F8
                                                                                        APIs
                                                                                          • Part of subcall function 00456E7C: CoInitialize.OLE32(00000000), ref: 00456E82
                                                                                          • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                          • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                        • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                                        • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                                        • API String ID: 2906209438-2320870614
                                                                                        • Opcode ID: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                                                        • Instruction ID: 6d1f0b9ea2f83cf17b9d56af39d37ffc4890966232cc80b75afa5f9be50b51f8
                                                                                        • Opcode Fuzzy Hash: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                                                        • Instruction Fuzzy Hash: 97C04CA1B4169096CB00B7FAA54361F2414DB5075FB96C07FBD40BB687CE7D8848AA2E
                                                                                        APIs
                                                                                          • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                          • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                        • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressErrorLibraryLoadModeProc
                                                                                        • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                        • API String ID: 2492108670-2683653824
                                                                                        • Opcode ID: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                                                        • Instruction ID: 608de25eae135e4754017d8cf95b07e3007941af04aa8fd5541e4ba3120ba520
                                                                                        • Opcode Fuzzy Hash: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                                                        • Instruction Fuzzy Hash: 69B092E0F056008ACF00A7F6984260A10059B8071DF90807B7440BB395EA3E840AAB6F
                                                                                        APIs
                                                                                        • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448719), ref: 0044865C
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486DD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressLibraryLoadProc
                                                                                        • String ID:
                                                                                        • API String ID: 2574300362-0
                                                                                        • Opcode ID: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                                                        • Instruction ID: bcb50df029510264ac3c8269deb9aca16d778d72fab4f9fb4f479d94b6d7f3fe
                                                                                        • Opcode Fuzzy Hash: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                                                        • Instruction Fuzzy Hash: 09514170A00105AFDB40EFA5C491A9EBBF9EB54315F11817EA414BB392DA389E05CB99
                                                                                        APIs
                                                                                        • GetSystemMenu.USER32(00000000,00000000,00000000,0048183C), ref: 004817D4
                                                                                        • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004817E5
                                                                                        • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004817FD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Append$System
                                                                                        • String ID:
                                                                                        • API String ID: 1489644407-0
                                                                                        • Opcode ID: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                                                        • Instruction ID: b36482c1273671328963914ac1a7ecaae55131090c894365c145815d0470a156
                                                                                        • Opcode Fuzzy Hash: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                                                        • Instruction Fuzzy Hash: 02318E307043445AD721FB359D82BAE3A989B15318F54593FB900AA3E3CA7C9C4A87AD
                                                                                        APIs
                                                                                        • 74D41520.VERSION(00000000,?,?,?,004972D0), ref: 0045251C
                                                                                        • 74D41500.VERSION(00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452549
                                                                                        • 74D41540.VERSION(?,004525C0,?,?,00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452563
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: D41500D41520D41540
                                                                                        • String ID:
                                                                                        • API String ID: 2153611984-0
                                                                                        • Opcode ID: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                                                        • Instruction ID: b47a7e64509d5cca070909842564d4f4e78a1d1ae8fea26b0cdd83eea50adb12
                                                                                        • Opcode Fuzzy Hash: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                                                        • Instruction Fuzzy Hash: 6B218371A00148AFDB01DAA989519AFB7FCEB4A300F55447BFC00E3342E6B99E04CB65
                                                                                        APIs
                                                                                        • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424422
                                                                                        • TranslateMessage.USER32(?), ref: 0042449F
                                                                                        • DispatchMessageA.USER32(?), ref: 004244A9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$DispatchPeekTranslate
                                                                                        • String ID:
                                                                                        • API String ID: 4217535847-0
                                                                                        • Opcode ID: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                                                        • Instruction ID: 520fb342982be2dd3794930026bb259c1cd38a4fe19eb968f01b3c53081bdda3
                                                                                        • Opcode Fuzzy Hash: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                                                        • Instruction Fuzzy Hash: 781191307043205AEE20FA64AD41B9B73D4DFD1708F80481EF9D997382D77D9E49879A
                                                                                        APIs
                                                                                        • SetPropA.USER32(00000000,00000000), ref: 0041667A
                                                                                        • SetPropA.USER32(00000000,00000000), ref: 0041668F
                                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Prop$Window
                                                                                        • String ID:
                                                                                        • API String ID: 3363284559-0
                                                                                        • Opcode ID: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                                                        • Instruction ID: 2262f6f032fbfc8c948eb6af5e1566575da4c35a9ecfa624f63ddadf83d7b404
                                                                                        • Opcode Fuzzy Hash: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                                                        • Instruction Fuzzy Hash: E3F0B271701210ABD710AB599C85FA632DCAB09719F160176BD09EF286C778DC40C7A8
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$AllocFree
                                                                                        • String ID: $=l
                                                                                        • API String ID: 2087232378-4008268515
                                                                                        • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                                        • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                                                        • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                                        • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                                                        APIs
                                                                                        • IsWindowVisible.USER32(?), ref: 0041EE74
                                                                                        • IsWindowEnabled.USER32(?), ref: 0041EE7E
                                                                                        • EnableWindow.USER32(?,00000000), ref: 0041EEA4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$EnableEnabledVisible
                                                                                        • String ID:
                                                                                        • API String ID: 3234591441-0
                                                                                        • Opcode ID: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                                                        • Instruction ID: eab114e884733e02e348d5fb54c1eeaedaab2d2a8f53f62e6f3f1b5b82b3488b
                                                                                        • Opcode Fuzzy Hash: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                                                        • Instruction Fuzzy Hash: 90E0EDB9100300AAE711AB2BEC81A57769CBB94314F45843BAC099B293DA3EDC409B78
                                                                                        APIs
                                                                                        • SetActiveWindow.USER32(?), ref: 0046A378
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ActiveWindow
                                                                                        • String ID: PrepareToInstall
                                                                                        • API String ID: 2558294473-1101760603
                                                                                        • Opcode ID: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                                                        • Instruction ID: 163d609461ff3b9580316b21a780dec1cd9204125e937a74b025edb926540d27
                                                                                        • Opcode Fuzzy Hash: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                                                        • Instruction Fuzzy Hash: 90A10A34A00109DFCB00EB99D985EEEB7F5AF88304F1580B6E404AB362D738AE45DF59
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: /:*?"<>|
                                                                                        • API String ID: 0-4078764451
                                                                                        • Opcode ID: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                                                        • Instruction ID: b706238f5af82f8a54f925a22e06db4ee79b372672e861a4edd763b161806009
                                                                                        • Opcode Fuzzy Hash: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                                                        • Instruction Fuzzy Hash: 6F7197B0B44244AADB20E766DCC2BEE77A19F41704F108167F5807B392E7B99D45878E
                                                                                        APIs
                                                                                        • SetActiveWindow.USER32(?), ref: 004820FE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ActiveWindow
                                                                                        • String ID: InitializeWizard
                                                                                        • API String ID: 2558294473-2356795471
                                                                                        • Opcode ID: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                                                        • Instruction ID: b8891c381381d1a0014b65a4ce29d1dfbbdf9d421e77ac889de6892087eb3363
                                                                                        • Opcode Fuzzy Hash: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                                                        • Instruction Fuzzy Hash: BE118234205204DFD711EBA5FE96B2977E4EB55314F20143BE5008B3A1DA796C50CB6D
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C472,00000000,0047C5AC), ref: 0047C271
                                                                                        Strings
                                                                                        • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C241
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                                        • API String ID: 47109696-1019749484
                                                                                        • Opcode ID: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                                                        • Instruction ID: 70811ca8e083c9a3dbfae153db117623eb743e792d78c4ccda021ebaf15ccddc
                                                                                        • Opcode Fuzzy Hash: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                                                        • Instruction Fuzzy Hash: 8EF08931B0411467DA00A5DA5C82B9E56DD8B55758F20407FF508EB253D9B99D02036C
                                                                                        APIs
                                                                                        • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                                                        Strings
                                                                                        • Inno Setup: Setup Version, xrefs: 0046F10D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value
                                                                                        • String ID: Inno Setup: Setup Version
                                                                                        • API String ID: 3702945584-4166306022
                                                                                        • Opcode ID: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                                                        • Instruction ID: 253732d940e31991125f8b939195b5ca02eb4333684dc2ddbbcc15e62aa31341
                                                                                        • Opcode Fuzzy Hash: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                                                        • Instruction Fuzzy Hash: 3BE06D713012047FD710AA6B9C85F5BBADDDF993A5F10403AB908DB392D578DD4081A8
                                                                                        APIs
                                                                                        • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value
                                                                                        • String ID: NoModify
                                                                                        • API String ID: 3702945584-1699962838
                                                                                        • Opcode ID: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                                                        • Instruction ID: dfbc78ba79a393f528aadc4bccb3a1e1d52346a2df28baf9fde3d1272b39f611
                                                                                        • Opcode Fuzzy Hash: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                                                        • Instruction Fuzzy Hash: D8E04FB4604304BFEB04DB55DD4AF6B77ECDB48750F10415ABA04DB281E674EE00C668
                                                                                        APIs
                                                                                        • GetACP.KERNEL32(?,?,00000001,00000000,0047E25F,?,-0000001A,004800D8,-00000010,?,00000004,0000001B,00000000,00480425,?,0045DECC), ref: 0047DFF6
                                                                                          • Part of subcall function 0042E32C: 73A1A570.USER32(00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0042E33B
                                                                                          • Part of subcall function 0042E32C: EnumFontsA.GDI32(?,00000000,0042E318,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E366
                                                                                          • Part of subcall function 0042E32C: 73A1A480.USER32(00000000,?,0042E38B,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E37E
                                                                                        • SendNotifyMessageA.USER32(00020440,00000496,00002711,-00000001), ref: 0047E1C6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A480A570EnumFontsMessageNotifySend
                                                                                        • String ID:
                                                                                        • API String ID: 2685184028-0
                                                                                        • Opcode ID: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                                                        • Instruction ID: 0ea8e5e95b90053dcc80dc26f94e29a170662e2b3e10ca2db4d961c35622b213
                                                                                        • Opcode Fuzzy Hash: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                                                        • Instruction Fuzzy Hash: 2651A6746001508BD710FF27D9C16963799EB88308B90C6BBA8089F367C77CDD068B9D
                                                                                        APIs
                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DC4C
                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DCBC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: QueryValue
                                                                                        • String ID:
                                                                                        • API String ID: 3660427363-0
                                                                                        • Opcode ID: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                                                        • Instruction ID: 0afc69acb925fd444515a6cbe8b6240f093bd173affdd4b5aabebdcedbe93bcc
                                                                                        • Opcode Fuzzy Hash: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                                                        • Instruction Fuzzy Hash: E0414F71E00529ABDB11DF95D881BAFB7B8AB00714F90846AE800F7241D778AE00CBA9
                                                                                        APIs
                                                                                        • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DF7C
                                                                                        • RegCloseKey.ADVAPI32(?,0042DFED,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DFE0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseEnum
                                                                                        • String ID:
                                                                                        • API String ID: 2818636725-0
                                                                                        • Opcode ID: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                                                        • Instruction ID: 2fe76ac110d60e281b9c8dcd8425dafac1d5c60e45ccd2ae84570cbaedcb928d
                                                                                        • Opcode Fuzzy Hash: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                                                        • Instruction Fuzzy Hash: 52319170F04258AEDB11DFA2DD82BAEB7B9EB48304F91407BE501E7281D6785A01CA2D
                                                                                        APIs
                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452828
                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452830
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateErrorLastProcess
                                                                                        • String ID:
                                                                                        • API String ID: 2919029540-0
                                                                                        • Opcode ID: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                                                        • Instruction ID: 3ad6dec6d32dc5e6ab031f6e5884ad9a987dc2d9ff381773f4694f698bcb58b9
                                                                                        • Opcode Fuzzy Hash: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                                                        • Instruction Fuzzy Hash: D3117972600208AF8B00DEADDD41DABB7ECEB4E310B10456BFD08E3201D678AE148BA4
                                                                                        APIs
                                                                                        • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AFF2
                                                                                        • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B14F,00000000,0040B167,?,?,?,00000000), ref: 0040B003
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$FindFree
                                                                                        • String ID:
                                                                                        • API String ID: 4097029671-0
                                                                                        • Opcode ID: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                                                        • Instruction ID: 22447e907da962d806d3eb032de74b702d5affa043e15eb070a4a3d902aeafed
                                                                                        • Opcode Fuzzy Hash: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                                                        • Instruction Fuzzy Hash: 0001DF71300604AFD710FF69DC92E1B77A9DB8A718711807AF500AB7D0DA79AC0096AD
                                                                                        APIs
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                        • 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A25940CurrentThread
                                                                                        • String ID:
                                                                                        • API String ID: 2655091166-0
                                                                                        • Opcode ID: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                                                        • Instruction ID: 3b2ca51acea6f31c20bceb620234c512699c69eae89bb1383ecfa3b3ac64bed2
                                                                                        • Opcode Fuzzy Hash: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                                                        • Instruction Fuzzy Hash: FD013976A04604BFDB06CF6BDC1195ABBE9E789720B22887BEC04D36A0E6355810DE18
                                                                                        APIs
                                                                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CAE
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,00452CD4), ref: 00452CB6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastMove
                                                                                        • String ID:
                                                                                        • API String ID: 55378915-0
                                                                                        • Opcode ID: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                                                        • Instruction ID: 8cb4f6990e07c72a34a39c3d349ee9eec810a974928c7dd1f8c60ebce1e721cc
                                                                                        • Opcode Fuzzy Hash: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                                                        • Instruction Fuzzy Hash: D5014971B00204BB8B11DF799D414AEB7ECEB4A32531045BBFC08E3243EAB84E048558
                                                                                        APIs
                                                                                        • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,00401973), ref: 00401766
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeVirtual
                                                                                        • String ID: $=l
                                                                                        • API String ID: 1263568516-4008268515
                                                                                        • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                                        • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                                                        • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                                        • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                                        APIs
                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527BB), ref: 00452795
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,004527BB), ref: 0045279D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 1375471231-0
                                                                                        • Opcode ID: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                                                        • Instruction ID: 7517b5081c7c6af98826394809c6fe2d976c468da5ddf52a6f68070703836f12
                                                                                        • Opcode Fuzzy Hash: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                                                        • Instruction Fuzzy Hash: 40F0FC71A04704AFCF00DF759D4199EB7E8DB0E715B5049B7FC14E3242E7B94E1485A8
                                                                                        APIs
                                                                                        • LoadCursorA.USER32(00000000,00007F00), ref: 00423259
                                                                                        • LoadCursorA.USER32(00000000,00000000), ref: 00423283
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CursorLoad
                                                                                        • String ID:
                                                                                        • API String ID: 3238433803-0
                                                                                        • Opcode ID: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                                                        • Instruction ID: c8375b04fab070422f53c3d6524130e38f027298e82d6ab835706982cf041ecc
                                                                                        • Opcode Fuzzy Hash: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                                                        • Instruction Fuzzy Hash: 0FF0A711704114AADA105D7E6CC0E2B7268DB91B36B6103BBFA3AD72D1C62E1D41457D
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                        • LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLibraryLoadMode
                                                                                        • String ID:
                                                                                        • API String ID: 2987862817-0
                                                                                        • Opcode ID: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                                                        • Instruction ID: 98bcbcc3e9aaf4c66058534b39987ccdd7eb12bd14468eaf88ad72af9e5505e3
                                                                                        • Opcode Fuzzy Hash: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                                                        • Instruction Fuzzy Hash: D5F05E70A14744BEDF119F779C6282ABAACE749B1179248B6F810A3691E67D48108928
                                                                                        APIs
                                                                                        • GetClassInfoA.USER32(00400000,?,?), ref: 004162F1
                                                                                        • GetClassInfoA.USER32(00000000,?,?), ref: 00416301
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClassInfo
                                                                                        • String ID:
                                                                                        • API String ID: 3534257612-0
                                                                                        • Opcode ID: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                                                        • Instruction ID: dc9e2acc6f173dd0cc3aa24d84b637cb0067f0ccc6b7cec6a0fcec59befe77f5
                                                                                        • Opcode Fuzzy Hash: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                                                        • Instruction Fuzzy Hash: 22E012B26015155ADB10DB999D81EE326DCDB09310B110167BE14CA246D764DD005BA4
                                                                                        APIs
                                                                                        • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,004703F1,?,00000000), ref: 004508FA
                                                                                        • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,004703F1,?,00000000), ref: 00450902
                                                                                          • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$FilePointer
                                                                                        • String ID:
                                                                                        • API String ID: 1156039329-0
                                                                                        • Opcode ID: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                                                        • Instruction ID: a22a311b57bf1dff13f45894218d9c0eaf9de3d8271a2984ee0ce7717fd7efee
                                                                                        • Opcode Fuzzy Hash: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                                                        • Instruction Fuzzy Hash: E0E012B53042059BFB00FA6599C1F3B63DCDB44315F00447AB984CF187D674CC155B29
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Global$AllocLock
                                                                                        • String ID:
                                                                                        • API String ID: 15508794-0
                                                                                        • Opcode ID: 3aab631d28e9500c64151c0aeb9b91af43aad549cba5a5fa87d1f146672bdb4f
                                                                                        • Instruction ID: 0263706b80ae8aebac4b2aeda69df254121a1764ed820e2db5cbcbfbef09bb73
                                                                                        • Opcode Fuzzy Hash: 3aab631d28e9500c64151c0aeb9b91af43aad549cba5a5fa87d1f146672bdb4f
                                                                                        • Instruction Fuzzy Hash: 3D9002C4C10B01A4DC0432B24C0BC3F0C2CD8C072C3C0486F7018B6183883C8800083C
                                                                                        APIs
                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,0040871A), ref: 00408603
                                                                                          • Part of subcall function 00406DF4: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E11
                                                                                          • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                        • String ID:
                                                                                        • API String ID: 1658689577-0
                                                                                        • Opcode ID: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                                                        • Instruction ID: ea6634d2ed8774f5e90a5a6f355d63bed973dafba18e0ec7d48b30ffe24ea089
                                                                                        • Opcode Fuzzy Hash: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                                                        • Instruction Fuzzy Hash: C4314375E001199BCF01DF95C8819EEB7B9FF84314F15857BE815AB286E738AE018B98
                                                                                        APIs
                                                                                        • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC49
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoScroll
                                                                                        • String ID:
                                                                                        • API String ID: 629608716-0
                                                                                        • Opcode ID: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                                                        • Instruction ID: 2c7078d87c5cd90d2d28a279248f0ceb63a34b6d02ec849610dd04de18f9c6e3
                                                                                        • Opcode Fuzzy Hash: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                                                        • Instruction Fuzzy Hash: AA213EB1608745AFD350DF39D4407AABBE4BB48314F04893EA498C3741E778E99ACBD6
                                                                                        APIs
                                                                                          • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                          • Part of subcall function 0041EEB4: 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                                        • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C756,?,00000000,?,?,0046C968,?,00000000,0046C9DC), ref: 0046C73A
                                                                                          • Part of subcall function 0041EF68: IsWindow.USER32(?), ref: 0041EF76
                                                                                          • Part of subcall function 0041EF68: EnableWindow.USER32(?,00000001), ref: 0041EF85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$A25940CurrentEnablePathPrepareThreadWrite
                                                                                        • String ID:
                                                                                        • API String ID: 390483697-0
                                                                                        • Opcode ID: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                                                        • Instruction ID: 552ca42e7a4f22222615ff1de8f8c20df724e6475abae56b3c63f202feb1ec23
                                                                                        • Opcode Fuzzy Hash: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                                                        • Instruction Fuzzy Hash: 28F0E270248300FFEB059BB2EDD6B2577E8E319716F91043BF504866D0EA795D40C96E
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3934441357-0
                                                                                        • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                        • Instruction ID: d0e136ad155d69288fc423feb27b218c22c44688115b59a91c3ffefc647f2292
                                                                                        • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                        • Instruction Fuzzy Hash: F0F0FF70509209DBBB1CCF54D0919AF7B71EB59310F20806FE907877A0D6346A80D759
                                                                                        APIs
                                                                                        • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416595
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateWindow
                                                                                        • String ID:
                                                                                        • API String ID: 716092398-0
                                                                                        • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                                        • Instruction ID: 39ad6e161323637dbb8254467e02d50acedd081d31d6b9d15e1adfc5f54150e8
                                                                                        • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                                        • Instruction Fuzzy Hash: 6EF02BB2200510AFDB84CF9CD9C0F9373ECEB0C210B0481A6FA08CF24AD220EC108BB0
                                                                                        APIs
                                                                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149FF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallbackDispatcherUser
                                                                                        • String ID:
                                                                                        • API String ID: 2492992576-0
                                                                                        • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                        • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                                        • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                        • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004507F0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                                                        • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                                                        • Opcode Fuzzy Hash: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                                                        • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD24,?,00000001,?,?,00000000,?,0042CD76,00000000,00452A11,00000000,00452A32,?,00000000), ref: 0042CD07
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID:
                                                                                        • API String ID: 3188754299-0
                                                                                        • Opcode ID: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                                                        • Instruction ID: bebe06870d533199fa05ec681e6f815a7bc371a3e359dcca221b2f893a48d47d
                                                                                        • Opcode Fuzzy Hash: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                                                        • Instruction Fuzzy Hash: 0AE06571304308BFD701EB62EC92A5EBBECD749714B914476B400D7592D5B86E008458
                                                                                        APIs
                                                                                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FormatMessage
                                                                                        • String ID:
                                                                                        • API String ID: 1306739567-0
                                                                                        • Opcode ID: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                                                        • Instruction ID: 1e04b5e42f682bd3307758a00633d1e15c64123c11c882a5e2d093d9edca25ee
                                                                                        • Opcode Fuzzy Hash: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                                                        • Instruction Fuzzy Hash: E7E0D86178432126F23524166C43B7B110E43C0704FD080267A809F3D6D6EE9949425E
                                                                                        APIs
                                                                                        • CreateWindowExA.USER32(00000000,0042368C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00406329
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateWindow
                                                                                        • String ID:
                                                                                        • API String ID: 716092398-0
                                                                                        • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                        • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                                                        • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                        • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                                                        APIs
                                                                                        • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                                                        • Instruction ID: 00bf656f3cc58d957e3fc120c7d975a7f6f089e768df8f95d2ce2a55afbcf34e
                                                                                        • Opcode Fuzzy Hash: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                                                        • Instruction Fuzzy Hash: 69E07EB2600119AF9B40DE8CDC81EEB37ADAB1D350F414016FA08E7200C274EC519BB4
                                                                                        APIs
                                                                                        • FindClose.KERNEL32(00000000,000000FF,00470C14,00000000,00471A10,?,00000000,00471A59,?,00000000,00471B92,?,00000000,?,00000000), ref: 00454BFA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseFind
                                                                                        • String ID:
                                                                                        • API String ID: 1863332320-0
                                                                                        • Opcode ID: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                                                        • Instruction ID: 3c3cb6916585ff7422749358fc170cdffb6a73b651657da6609ae8be1e4b77d0
                                                                                        • Opcode Fuzzy Hash: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                                                        • Instruction Fuzzy Hash: A7E065B0A056004BCB15DF3A858021A76D25FC5325F05C96AAC58CF397D63C84955656
                                                                                        APIs
                                                                                        • KiUserCallbackDispatcher.NTDLL(004953B6,?,004953D8,?,?,00000000,004953B6,?,?), ref: 004146AB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallbackDispatcherUser
                                                                                        • String ID:
                                                                                        • API String ID: 2492992576-0
                                                                                        • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                        • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                                        • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                        • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                                        APIs
                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F2C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3934441357-0
                                                                                        • Opcode ID: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                                                        • Instruction ID: 1f586823f232578dbf745533d190da316c23ef772c10fc749b20f2ce5ea51255
                                                                                        • Opcode Fuzzy Hash: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                                                        • Instruction Fuzzy Hash: E0D05B723091117AD620955F6C44DA76BDCCBC5770F11063EB558D72C1D7309C01C675
                                                                                        APIs
                                                                                          • Part of subcall function 00423608: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042361D
                                                                                        • ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                          • Part of subcall function 00423638: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423654
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoParametersSystem$ShowWindow
                                                                                        • String ID:
                                                                                        • API String ID: 3202724764-0
                                                                                        • Opcode ID: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                                                        • Instruction ID: 40ba6511a88705317f68f90b714cf273492cbff5df7e869aa0dea3a735aecdb5
                                                                                        • Opcode Fuzzy Hash: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                                                        • Instruction Fuzzy Hash: 89D05E123831B03106307BB72805ACB86AC8D966AB389047BB5409B302E91E8A0A61AC
                                                                                        APIs
                                                                                        • SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: TextWindow
                                                                                        • String ID:
                                                                                        • API String ID: 530164218-0
                                                                                        • Opcode ID: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                                                        • Instruction ID: 772c2b490b6417829154bcce5d0a54014a2db275ddfc333997dbbca6f26d49c5
                                                                                        • Opcode Fuzzy Hash: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                                                        • Instruction Fuzzy Hash: 7ED05EE27011702BCB01BAED54C4AC667CC9B8825AB1940BBF904EF257C678CE4083A8
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,004515B7,00000000), ref: 0042CD3F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID:
                                                                                        • API String ID: 3188754299-0
                                                                                        • Opcode ID: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                                                        • Instruction ID: 866207c2a99293721dc17515f5e31636ca325c5e587501d47fbe5ff4e718b97c
                                                                                        • Opcode Fuzzy Hash: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                                                        • Instruction Fuzzy Hash: 77C08CE03222001A9A20A6BD2CC950F06CC891437A3A41F77B439E72E2D23DD8162018
                                                                                        APIs
                                                                                        • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallbackDispatcherUser
                                                                                        • String ID:
                                                                                        • API String ID: 2492992576-0
                                                                                        • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                        • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                                        • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                        • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A8D4,0040CE80,?,00000000,?), ref: 00406EE5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                                                        • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                                        • Opcode Fuzzy Hash: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                                                        • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                                        APIs
                                                                                        • SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                                          • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLast
                                                                                        • String ID:
                                                                                        • API String ID: 734332943-0
                                                                                        • Opcode ID: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                                                        • Instruction ID: d892f33e09ba9bc7304af59ed1bd982b4427bde6cd355302a364b0e8927efaaf
                                                                                        • Opcode Fuzzy Hash: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                                                        • Instruction Fuzzy Hash: 2DC04CA9300101879F00BAAE95D190663D85E583057504066B944CF207D668D8144A18
                                                                                        APIs
                                                                                        • SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentDirectory
                                                                                        • String ID:
                                                                                        • API String ID: 1611563598-0
                                                                                        • Opcode ID: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                                                        • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                                                        • Opcode Fuzzy Hash: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                                                        • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(?,0042E41D), ref: 0042E410
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode
                                                                                        • String ID:
                                                                                        • API String ID: 2340568224-0
                                                                                        • Opcode ID: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                                        • Instruction ID: 55140b1eedf56d48a55774d01a07de49d55d18186a895614534630d02c3c9fff
                                                                                        • Opcode Fuzzy Hash: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                                        • Instruction Fuzzy Hash: D4B09B7671C6105DFB05D695745152D63D4D7C57203E14577F010D7580D53D58004D18
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                                                        • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                                                        • Opcode Fuzzy Hash: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                                                        • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                                                        • Instruction ID: 3a42617683b163d9d3e29dc322e321d1f787465d7b697eb1a78dfeb7447b1e7e
                                                                                        • Opcode Fuzzy Hash: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                                                        • Instruction Fuzzy Hash: CB518574E042099FEB01EFA9C892AAEBBF5EF49314F50417AE500E7351DB389D45CB98
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0047DC20,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DBDA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 626452242-0
                                                                                        • Opcode ID: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                                                        • Instruction ID: a4a2cf2857c8d8ea8b604d5a3bb359359cf50968c17c86877c7e7666634e0114
                                                                                        • Opcode Fuzzy Hash: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                                                        • Instruction Fuzzy Hash: 79519C30A04248AFDB20DF65D8C5BAABBB8EB18304F118077E804A73A1D778AD45CB59
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                                                        • Instruction ID: 6bd7adec2090487eae29abc1928bf57af59456791c97a49d6ef8c5917aacc84c
                                                                                        • Opcode Fuzzy Hash: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                                                        • Instruction Fuzzy Hash: 0E1148742007069BC710DF19D880B86FBE5EB98390B10C53BE9588B385D374E8558BA9
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,00453019), ref: 00452FFB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 1452528299-0
                                                                                        • Opcode ID: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                                                        • Instruction ID: 3702fe8876d82bde104835ae14f19b545f9b4323f369928b31ff8c7c86e788f0
                                                                                        • Opcode Fuzzy Hash: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                                                        • Instruction Fuzzy Hash: 32014C356043086A8B10CF69AC004AEFBE8DB4D7217108277FC14D3382DA744E0496E4
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID:
                                                                                        • API String ID: 2962429428-0
                                                                                        • Opcode ID: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                                                        • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                                        • Opcode Fuzzy Hash: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                                                        • Instruction Fuzzy Hash:
                                                                                        APIs
                                                                                        • GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                                        • SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                                        • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                                        • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                                        • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                                        • FreeLibrary.KERNEL32(00000001,?,00419000,00000000,?,?,?,00000001), ref: 0041F27F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                                        • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                                        • API String ID: 2323315520-3614243559
                                                                                        • Opcode ID: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                                                        • Instruction ID: d5058fc073e0ad59750b6b6eed82d26134d8568d962b0a84cfd108907e917b52
                                                                                        • Opcode Fuzzy Hash: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                                                        • Instruction Fuzzy Hash: 8D310DB2640700EBEB01EBB9AC86A663294F728724745093FB508DB192D77C5C49CB1C
                                                                                        APIs
                                                                                        • GetTickCount.KERNEL32 ref: 00458993
                                                                                        • QueryPerformanceCounter.KERNEL32(02143858,00000000,00458C26,?,?,02143858,00000000,?,00459322,?,02143858,00000000), ref: 0045899C
                                                                                        • GetSystemTimeAsFileTime.KERNEL32(02143858,02143858), ref: 004589A6
                                                                                        • GetCurrentProcessId.KERNEL32(?,02143858,00000000,00458C26,?,?,02143858,00000000,?,00459322,?,02143858,00000000), ref: 004589AF
                                                                                        • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458A25
                                                                                        • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02143858,02143858), ref: 00458A33
                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458A7B
                                                                                        • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00458BD1,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458AB4
                                                                                          • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458B5D
                                                                                        • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00458B93
                                                                                        • CloseHandle.KERNEL32(000000FF,00458BD8,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458BCB
                                                                                          • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                                        • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                                        • API String ID: 770386003-3271284199
                                                                                        • Opcode ID: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                                                        • Instruction ID: 46381a2ef6f5f7687f8d932114089cfc0a3b3023078b53c1614b04e084b280c9
                                                                                        • Opcode Fuzzy Hash: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                                                        • Instruction Fuzzy Hash: 02711370A04348AEDB11DB69CC41B5EBBF8EB15705F1084BAB944FB282DB7859488B69
                                                                                        APIs
                                                                                          • Part of subcall function 0047828C: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02142BD8,?,?,?,02142BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                                                          • Part of subcall function 0047828C: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                                                          • Part of subcall function 0047828C: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02142BD8,?,?,?,02142BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                                                          • Part of subcall function 0047828C: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02142BD8,?,?,?,02142BD8), ref: 004782E8
                                                                                          • Part of subcall function 0047828C: CloseHandle.KERNEL32(00000000,?,?,?,02142BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                                                          • Part of subcall function 00478364: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004783F6,?,?,?,02142BD8,?,00478458,00000000,0047856E,?,?,-00000010,?), ref: 00478394
                                                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 004784A8
                                                                                        • GetLastError.KERNEL32(00000000,0047856E,?,?,-00000010,?), ref: 004784B1
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004784FE
                                                                                        • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478522
                                                                                        • CloseHandle.KERNEL32(00000000,00478553,00000000,00000000,000000FF,000000FF,00000000,0047854C,?,00000000,0047856E,?,?,-00000010,?), ref: 00478546
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                                        • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                                        • API String ID: 883996979-221126205
                                                                                        • Opcode ID: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                                                        • Instruction ID: be90243bdd9c3757315ff9bbcfcad83cd6a8df60a98d136a70e83fac94f3d3e4
                                                                                        • Opcode Fuzzy Hash: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                                                        • Instruction Fuzzy Hash: E0314670A40609BEDB11EFAAD845ADEB6B8EF05314F50847FF518E7281DB7C89058B19
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422A04
                                                                                        • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BCE), ref: 00422A14
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSendShowWindow
                                                                                        • String ID:
                                                                                        • API String ID: 1631623395-0
                                                                                        • Opcode ID: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                                                        • Instruction ID: ac1ceeab966790095f9612ce7a7db5e594191b89627cdcc61fab65d1acc55ab9
                                                                                        • Opcode Fuzzy Hash: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                                                        • Instruction Fuzzy Hash: 79914071B04214BFD711EFA9DA86F9D77F4AB04314F5500BAF504AB3A2CB78AE409B58
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 004183A3
                                                                                        • GetWindowPlacement.USER32(?,0000002C), ref: 004183C0
                                                                                        • GetWindowRect.USER32(?), ref: 004183DC
                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 004183EA
                                                                                        • GetWindowLongA.USER32(?,000000F8), ref: 004183FF
                                                                                        • ScreenToClient.USER32(00000000), ref: 00418408
                                                                                        • ScreenToClient.USER32(00000000,?), ref: 00418413
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                        • String ID: ,
                                                                                        • API String ID: 2266315723-3772416878
                                                                                        • Opcode ID: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                                                        • Instruction ID: f1655e9c1aaa1f9d3e17845697c0dfec8ab0781743990dff6cd0a114faef5a7c
                                                                                        • Opcode Fuzzy Hash: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                                                        • Instruction Fuzzy Hash: D6112B71505201AFDB00EF69C885F9B77E8AF49314F18067EBD58DB286D738D900CBA9
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                                                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004555FE
                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455625
                                                                                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045562A
                                                                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 0045563B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                        • String ID: SeShutdownPrivilege
                                                                                        • API String ID: 107509674-3733053543
                                                                                        • Opcode ID: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                                                        • Instruction ID: f0f78ca649e8ddc1473c2e21848b41e7847a09c75f53dffa28e6f5675cd8c776
                                                                                        • Opcode Fuzzy Hash: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                                                        • Instruction Fuzzy Hash: 32F0F670284B42B9E610AA758C13F3B21C89B40B49F80083EBD09EA1C3D7BDC80C4A2F
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D4F5
                                                                                        • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D505
                                                                                        • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D515
                                                                                        • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047F47B,00000000,0047F4A4), ref: 0045D53A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$CryptVersion
                                                                                        • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                                        • API String ID: 1951258720-508647305
                                                                                        • Opcode ID: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                                                        • Instruction ID: 2c2546d05897d0e560449e180de6b9da44e6f0241588afb6de3da162f6531889
                                                                                        • Opcode Fuzzy Hash: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                                                        • Instruction Fuzzy Hash: 3AF012F0940704EBEB18DFB6BCC67623695ABD531AF14C137A404A51A2E778044CCE1D
                                                                                        APIs
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90,?,?,00000000,0049B628), ref: 00497ACB
                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00497B4E
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000), ref: 00497B66
                                                                                        • FindClose.KERNEL32(000000FF,00497B91,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90), ref: 00497B84
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFind$AttributesCloseFirstNext
                                                                                        • String ID: isRS-$isRS-???.tmp
                                                                                        • API String ID: 134685335-3422211394
                                                                                        • Opcode ID: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                                                        • Instruction ID: b2847bb1a44685988a55541ee7ac685ebeb66ffb5e30493f66813578f7a68db2
                                                                                        • Opcode Fuzzy Hash: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                                                        • Instruction Fuzzy Hash: A63165719146186FCF10EF65CC41ADEBBBCDB45318F5084F7A808A32A1E638AE458F58
                                                                                        APIs
                                                                                        • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457449
                                                                                        • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457470
                                                                                        • SetForegroundWindow.USER32(?), ref: 00457481
                                                                                        • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,0045775B,?,00000000,00457797), ref: 00457746
                                                                                        Strings
                                                                                        • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004575C6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                                        • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                                        • API String ID: 2236967946-3182603685
                                                                                        • Opcode ID: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                                                        • Instruction ID: 5bc10c0d354cae83c82450a0913647aad13fd3ad71d4eb48676ad76960377df7
                                                                                        • Opcode Fuzzy Hash: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                                                        • Instruction Fuzzy Hash: D9910034608204EFD715CF54E991F5ABBF9EB89305F2180BAED0897792D638AE04DF58
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F37), ref: 00455E28
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E2E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                        • API String ID: 1646373207-3712701948
                                                                                        • Opcode ID: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                                                        • Instruction ID: 12dfdd1b414f9b5fa57bb507e68127e36b1c1a940f154b23c6ee37fdedd7ee09
                                                                                        • Opcode Fuzzy Hash: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                                                        • Instruction Fuzzy Hash: 66415171A04649AFCF01EFA5C8929EFB7B8EF49304F508566F800F7252D6785E09CB69
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 00417D1F
                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                                        • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                                        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Placement$Iconic
                                                                                        • String ID: ,
                                                                                        • API String ID: 568898626-3772416878
                                                                                        • Opcode ID: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                                                        • Instruction ID: 117db6d3727d0f94901dea8748b8d47281c3d2add8a8e77c7f929e434730b1f7
                                                                                        • Opcode Fuzzy Hash: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                                                        • Instruction Fuzzy Hash: 41213171604208ABCF40EF69E8C0EEA77B8AF49314F05456AFD18DF246C678DD84CB68
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001,00000000,00464205), ref: 00464079
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 00464108
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 0046419A
                                                                                        • FindClose.KERNEL32(000000FF,004641C1,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 004641B4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseErrorFirstModeNext
                                                                                        • String ID:
                                                                                        • API String ID: 4011626565-0
                                                                                        • Opcode ID: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                                                        • Instruction ID: 2652c2d8e8669354d55d474f1d59e7b06630ff05c6329d0403030a32038cf055
                                                                                        • Opcode Fuzzy Hash: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                                                        • Instruction Fuzzy Hash: 1E418770A00618AFCF10EF65DC55ADEB7B8EB89705F5044BAF804E7381E67C9E848E59
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001,00000000,004646AB), ref: 00464539
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 0046457F
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464634
                                                                                        • FindClose.KERNEL32(000000FF,0046465F,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464652
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseErrorFirstModeNext
                                                                                        • String ID:
                                                                                        • API String ID: 4011626565-0
                                                                                        • Opcode ID: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                                                        • Instruction ID: 7635123f594c8b6db569002a9bb01bf8fa96c74c2cf80da52efac59b167f1e7c
                                                                                        • Opcode Fuzzy Hash: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                                                        • Instruction Fuzzy Hash: D8416171A00A18EBCB10EFA5CC959DEB7B9EB88305F4044AAF804A7351E77C9E448E59
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E966
                                                                                        • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E991
                                                                                        • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E99E
                                                                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9A6
                                                                                        • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9AC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                                        • String ID:
                                                                                        • API String ID: 1177325624-0
                                                                                        • Opcode ID: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                                                        • Instruction ID: 40e29ed62a0e901db822078ff48c294e58af048427126d47a83bbc7ee0829aa9
                                                                                        • Opcode Fuzzy Hash: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                                                        • Instruction Fuzzy Hash: 4BF090B23A17207AF620B57A6C86F7F418CC785B68F10823BBB04FF1C1D9A85D05556D
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 004833FA
                                                                                        • GetWindowLongA.USER32(00000000,000000F0), ref: 00483418
                                                                                        • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048343A
                                                                                        • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048344E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Show$IconicLong
                                                                                        • String ID:
                                                                                        • API String ID: 2754861897-0
                                                                                        • Opcode ID: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                                                        • Instruction ID: 9902e76ed030cf172564c6423cfc444f456bf65fce7539c2ce1f68efba32f602
                                                                                        • Opcode Fuzzy Hash: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                                                        • Instruction Fuzzy Hash: 4D017134A452019EEB11BBA5DD8AB5B27C45F10B09F08083BB9029F2A3CB6D9D41D71C
                                                                                        APIs
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00462B90), ref: 00462B14
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B50
                                                                                        • FindClose.KERNEL32(000000FF,00462B77,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B6A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseFirstNext
                                                                                        • String ID:
                                                                                        • API String ID: 3541575487-0
                                                                                        • Opcode ID: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                                                        • Instruction ID: 0f193a6fcf1d943c675bf75123405c31ceeb2ecab595186adb6c93933d2a98b0
                                                                                        • Opcode Fuzzy Hash: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                                                        • Instruction Fuzzy Hash: 7121D871904B087EDB11DF65CC51ADEBBACDB49704F5084F7E808E31A1E6BCAE44CA5A
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 004241F4
                                                                                        • SetActiveWindow.USER32(?,?,?,0046CFFB), ref: 00424201
                                                                                          • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                          • Part of subcall function 00423B24: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021425AC,0042421A,?,?,?,0046CFFB), ref: 00423B5F
                                                                                        • SetFocus.USER32(00000000,?,?,?,0046CFFB), ref: 0042422E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ActiveFocusIconicShow
                                                                                        • String ID:
                                                                                        • API String ID: 649377781-0
                                                                                        • Opcode ID: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                                                        • Instruction ID: 85e094fd83fda52d6ba69bb43f194f943737e29f022f28d5c3d7585fd8a6de7d
                                                                                        • Opcode Fuzzy Hash: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                                                        • Instruction Fuzzy Hash: ECF03A717001208BDB10EFAAA8C4B9662A8EF48344B5500BBBC09DF34BCA7CDC0187A8
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 00417D1F
                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                                        • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                                        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Placement$Iconic
                                                                                        • String ID:
                                                                                        • API String ID: 568898626-0
                                                                                        • Opcode ID: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                                                        • Instruction ID: b3485382f52430a3de90e88073d2477855dbbaeb9eeee9907b508ce44eeb6dab
                                                                                        • Opcode Fuzzy Hash: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                                                        • Instruction Fuzzy Hash: 02017C31204108ABDB10EE69E8C1EEA73A8AF45324F054567FD08CF242D639ECC087A8
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CaptureIconic
                                                                                        • String ID:
                                                                                        • API String ID: 2277910766-0
                                                                                        • Opcode ID: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                                                        • Instruction ID: edcb67aebd7cb7e0e4c3241a821d6ac110e093164443c601d5aebb18a23c44a8
                                                                                        • Opcode Fuzzy Hash: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                                                        • Instruction Fuzzy Hash: A2F04F32304A028BDB21A72EC885AEB62F5DF84368B14443FE415CB765EB7CDCD58758
                                                                                        APIs
                                                                                        • IsIconic.USER32(?), ref: 004241AB
                                                                                          • Part of subcall function 00423A94: EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                                          • Part of subcall function 00423A94: GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                                          • Part of subcall function 00423A94: GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                                          • Part of subcall function 00423A94: SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                                        • SetActiveWindow.USER32(?,?,?,00423D83,00000000,0042416C), ref: 004241BF
                                                                                          • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                                        • String ID:
                                                                                        • API String ID: 2671590913-0
                                                                                        • Opcode ID: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                                                        • Instruction ID: ffd443eaca36288e12b0fd3e34cf0737071334a0f5e631569de285e60205db71
                                                                                        • Opcode Fuzzy Hash: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                                                        • Instruction Fuzzy Hash: 02E0E5A470010187EF00EFAAD8C9B9662A9AB48304F55057ABC08CF24BDA78C954C724
                                                                                        APIs
                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127E5), ref: 004127D3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: NtdllProc_Window
                                                                                        • String ID:
                                                                                        • API String ID: 4255912815-0
                                                                                        • Opcode ID: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                                                        • Instruction ID: 2af12fea25256c3ae9471bae8fd4feed52cec15eb5e351c91de8273fd3ce68b3
                                                                                        • Opcode Fuzzy Hash: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                                                        • Instruction Fuzzy Hash: 055106316082058FD710DB6AD681A9BF3E5FF98304B2482BBD814C7392D7B8EDA1C759
                                                                                        APIs
                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478B2A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: NtdllProc_Window
                                                                                        • String ID:
                                                                                        • API String ID: 4255912815-0
                                                                                        • Opcode ID: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                                                        • Instruction ID: 518aae51b6d6b411e39a58dd47dc5b2362a2c83c3bfed1ee6c3543fdde473bb3
                                                                                        • Opcode Fuzzy Hash: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                                                        • Instruction Fuzzy Hash: 04413775644104DFCB10CF99C6898AAB7F5FB48310B74CA9AE848DB705DB38EE41DB54
                                                                                        APIs
                                                                                        • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045D5AB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CryptFour
                                                                                        • String ID:
                                                                                        • API String ID: 2153018856-0
                                                                                        • Opcode ID: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                                                        • Instruction ID: 2e238a974be0c8424367b3c35ccc205e7f0a308c5ec670be841bb4718b7179ff
                                                                                        • Opcode Fuzzy Hash: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                                                        • Instruction Fuzzy Hash: 37C09BF200420CBF660057D5ECC9C77B75CF6586547508126F6048210195726C104574
                                                                                        APIs
                                                                                        • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DDBC,?,0046DF9D), ref: 0045D5BE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CryptFour
                                                                                        • String ID:
                                                                                        • API String ID: 2153018856-0
                                                                                        • Opcode ID: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                                                        • Instruction ID: 227689971defb3a768f182aa15824e3680876923b4d994b81e1676941902ce31
                                                                                        • Opcode Fuzzy Hash: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                                                        • Instruction Fuzzy Hash: 9DA002B0A80300BAFD2057B05D4EF26352CA7D0F05F708465B202EA0D085A56410852C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2958000134.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2957982150.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2958016815.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_10000000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                        • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                                        • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                        • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2958000134.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2957982150.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2958016815.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_10000000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                        • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                                        • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                        • Instruction Fuzzy Hash:
                                                                                        APIs
                                                                                          • Part of subcall function 0044B614: GetVersionExA.KERNEL32(00000094), ref: 0044B631
                                                                                        • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                                                        • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                                                        • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                                                        • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7D9
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7EB
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7FD
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B80F
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B821
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B833
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B845
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B857
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B869
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B87B
                                                                                        • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B88D
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B89F
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8B1
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8C3
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8D5
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8E7
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8F9
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B90B
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B91D
                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B92F
                                                                                        • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B941
                                                                                        • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B953
                                                                                        • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B965
                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B977
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B989
                                                                                        • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B99B
                                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B9AD
                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9BF
                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9D1
                                                                                        • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9E3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoadVersion
                                                                                        • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                        • API String ID: 1968650500-2910565190
                                                                                        • Opcode ID: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                                                        • Instruction ID: 346aa6b979044c2d6f95573bc57da9b6801dc261a15d858c7a91061cf3dc2738
                                                                                        • Opcode Fuzzy Hash: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                                                        • Instruction Fuzzy Hash: CC91E7B0A40B50EBEF00EBF5ADC6A2637A8EB15B14714467BB444EF295D778D800CF99
                                                                                        APIs
                                                                                        • CreateMutexA.KERNEL32(00499B18,00000001,00000000,00000000,004584B9,?,?,?,00000001,?,004586D3,00000000,004586E9,?,00000000,0049B628), ref: 004581D1
                                                                                        • CreateFileMappingA.KERNEL32(000000FF,00499B18,00000004,00000000,00002018,00000000), ref: 00458209
                                                                                        • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9,?,?,?), ref: 00458230
                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045833D
                                                                                        • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9), ref: 00458295
                                                                                          • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                                        • CloseHandle.KERNEL32(004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458354
                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045838D
                                                                                        • GetLastError.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045839F
                                                                                        • UnmapViewOfFile.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458471
                                                                                        • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458480
                                                                                        • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458489
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                                                                        • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp
                                                                                        • API String ID: 4012871263-351310198
                                                                                        • Opcode ID: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                                                        • Instruction ID: 29107a7cf73729034b65a1fcaaf08eab05738b19563c620e852bf3134b102344
                                                                                        • Opcode Fuzzy Hash: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                                                        • Instruction Fuzzy Hash: 46914170A002099BDB10EFA9C845B9EB7B4EB05305F50856FED14FB283DF7899498F69
                                                                                        APIs
                                                                                        • 73A1A570.USER32(00000000,?,0041A954,?), ref: 0041CA50
                                                                                        • 73A24C40.GDI32(?,00000000,?,0041A954,?), ref: 0041CA5C
                                                                                        • 73A26180.GDI32(0041A954,?,00000001,00000001,00000000,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA80
                                                                                        • 73A24C00.GDI32(?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA90
                                                                                        • SelectObject.GDI32(0041CE4C,00000000), ref: 0041CAAB
                                                                                        • FillRect.USER32(0041CE4C,?,?), ref: 0041CAE6
                                                                                        • SetTextColor.GDI32(0041CE4C,00000000), ref: 0041CAFB
                                                                                        • SetBkColor.GDI32(0041CE4C,00000000), ref: 0041CB12
                                                                                        • PatBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00FF0062), ref: 0041CB28
                                                                                        • 73A24C40.GDI32(?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954), ref: 0041CB3B
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0041CB6C
                                                                                        • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954), ref: 0041CB84
                                                                                        • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?), ref: 0041CB8D
                                                                                        • 73A18830.GDI32(0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CB9C
                                                                                        • 73A122A0.GDI32(0041CE4C,0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CBA5
                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041CBBE
                                                                                        • SetBkColor.GDI32(00000000,00000000), ref: 0041CBD5
                                                                                        • 73A24D40.GDI32(0041CE4C,00000000,00000000,0041A954,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CC1A,?,?,00000000), ref: 0041CBF1
                                                                                        • SelectObject.GDI32(00000000,?), ref: 0041CBFE
                                                                                        • DeleteDC.GDI32(00000000), ref: 0041CC14
                                                                                          • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Color$ObjectSelect$A122A18830Text$A26180A570DeleteFillRect
                                                                                        • String ID:
                                                                                        • API String ID: 1381628555-0
                                                                                        • Opcode ID: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                                                        • Instruction ID: 69ed6b4e4825e3c47d53d1ee88e95f0281db4649dcd7e45998b3becab3701dfd
                                                                                        • Opcode Fuzzy Hash: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                                                        • Instruction Fuzzy Hash: 6261EC71A44609AFDF10EBE9DC86F9FB7B8EF48704F14446AB504E7281D67CA9408B68
                                                                                        APIs
                                                                                        • ShowWindow.USER32(?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000,004984F9,?,00000000), ref: 00497E23
                                                                                        • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000), ref: 00497E36
                                                                                        • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000), ref: 00497E46
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00497E67
                                                                                        • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000), ref: 00497E77
                                                                                          • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                                        • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                                        • API String ID: 2000705611-3672972446
                                                                                        • Opcode ID: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                                                        • Instruction ID: d71e95358f961f9c8085103628ed7ebfe7aaf39cab9d6a0a027eda6f41515cae
                                                                                        • Opcode Fuzzy Hash: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                                                        • Instruction Fuzzy Hash: C291B530A042449FDF11EBA9DC52BAE7FA4EF4A304F51447BF500AB292DA7DAC05CB59
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,0045ACF8,?,?,?,?,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045ABAA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                                        • API String ID: 1452528299-3112430753
                                                                                        • Opcode ID: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                                                        • Instruction ID: f5e388fb48f96f1c0466849e1c52bdf0d536658550fb6e74c3a20cf80cd44526
                                                                                        • Opcode Fuzzy Hash: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                                                        • Instruction Fuzzy Hash: 2271AE707002445BDB01EB69D8427AE77A6AF48316F50856BFC01DB383CA7C9A5DC79A
                                                                                        APIs
                                                                                        • GetVersion.KERNEL32 ref: 0045CF3E
                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CF5E
                                                                                        • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CF6B
                                                                                        • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CF78
                                                                                        • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CF86
                                                                                          • Part of subcall function 0045CE2C: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CECB,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CEA5
                                                                                        • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D03F
                                                                                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D048
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                                        • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                                        • API String ID: 59345061-4263478283
                                                                                        • Opcode ID: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                                                        • Instruction ID: 4ce31bb81caf279f5ed3d10c62bb09a2aad5f6c7ba3f26a8019cd68bbbdcec0a
                                                                                        • Opcode Fuzzy Hash: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                                                        • Instruction Fuzzy Hash: E95193B1D00608EFDB10DFA9C845BAEBBB8EF48315F14806AF915B7381C2389945CF69
                                                                                        APIs
                                                                                        • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,0045688D), ref: 00456592
                                                                                        • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,0045688D), ref: 004565B8
                                                                                        • SysFreeString.OLEAUT32(?), ref: 00456745
                                                                                        Strings
                                                                                        • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004567B6
                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004566DB
                                                                                        • CoCreateInstance, xrefs: 004565C3
                                                                                        • IPersistFile::Save, xrefs: 00456814
                                                                                        • IPropertyStore::Commit, xrefs: 00456795
                                                                                        • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004566A7
                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 0045672A
                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045677C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateInstance$FreeString
                                                                                        • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)
                                                                                        • API String ID: 308859552-3936712486
                                                                                        • Opcode ID: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                                                        • Instruction ID: c99fdec92309fd26656a6f7ea9bd91ecf5cc306c054acb75a5569a06f28a4b2e
                                                                                        • Opcode Fuzzy Hash: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                                                        • Instruction Fuzzy Hash: 29A13E71A00104AFDB50EFA9C885B9E7BF8EF09706F55406AF804E7252DB38DD48CB69
                                                                                        APIs
                                                                                        • 73A24C40.GDI32(00000000,?,00000000,?), ref: 0041B3D3
                                                                                        • 73A24C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B3DD
                                                                                        • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3EF
                                                                                        • 73A26180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B406
                                                                                        • 73A1A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B412
                                                                                        • 73A24C00.GDI32(00000000,0000000B,?,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B43F
                                                                                        • 73A1A480.USER32(00000000,00000000,0041B472,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B465
                                                                                        • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                                        • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                                        • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                                        • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Object$Select$Delete$A26180A480A570Stretch
                                                                                        • String ID:
                                                                                        • API String ID: 359944910-0
                                                                                        • Opcode ID: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                                                        • Instruction ID: 9e854467c286a28b18f31183f63f6c048648830cb6dea2264be82148a8da808a
                                                                                        • Opcode Fuzzy Hash: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                                                        • Instruction Fuzzy Hash: DC419D71E40619AFDF10EAE9D846FAFB7B8EF08704F104466B614FB281D67969408BA4
                                                                                        APIs
                                                                                          • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472F70
                                                                                        • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473077
                                                                                        • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0047308D
                                                                                        • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 004730B2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                                        • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                                        • API String ID: 971782779-3668018701
                                                                                        • Opcode ID: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                                                        • Instruction ID: 1ded2309c22d90a9957aabde76cedeacc99048359e90752decbb9b8a0015ab1b
                                                                                        • Opcode Fuzzy Hash: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                                                        • Instruction Fuzzy Hash: 8FD12574A00149AFDB01EFA9D581BDDBBF5AF08305F50806AF804B7392D778AE45CB69
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,?,00000000,?,00000000,00454AF9,?,0045AECE,00000003,00000000,00000000,00454B30), ref: 00454979
                                                                                          • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                                        • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 004549FD
                                                                                        • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 00454A2C
                                                                                        Strings
                                                                                        • RegOpenKeyEx, xrefs: 004548FC
                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454897
                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548D0
                                                                                        • , xrefs: 004548EA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: QueryValue$FormatMessageOpen
                                                                                        • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                        • API String ID: 2812809588-1577016196
                                                                                        • Opcode ID: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                                                        • Instruction ID: 44bd6ba1492406805f437c97fe518088f2f8e7c1bef0b67c8a01139b77ca8c69
                                                                                        • Opcode Fuzzy Hash: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                                                        • Instruction Fuzzy Hash: C0911471944248ABDB10DFE5D942BDEB7FCEB48309F50406BF900FB282D6789E458B69
                                                                                        APIs
                                                                                          • Part of subcall function 004596C8: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459863
                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 004598CD
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459934
                                                                                        Strings
                                                                                        • v2.0.50727, xrefs: 004598BF
                                                                                        • .NET Framework version %s not found, xrefs: 0045996D
                                                                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 004598E7
                                                                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00459880
                                                                                        • v1.1.4322, xrefs: 00459926
                                                                                        • .NET Framework not found, xrefs: 00459981
                                                                                        • v4.0.30319, xrefs: 00459855
                                                                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 00459816
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close$Open
                                                                                        • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                                        • API String ID: 2976201327-446240816
                                                                                        • Opcode ID: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                                                        • Instruction ID: 729b419896cd5506e065475e0ee5015c208a67e93f4f54458093df2d8724af3d
                                                                                        • Opcode Fuzzy Hash: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                                                        • Instruction Fuzzy Hash: 0051A030A04145EBCB04DFA9C8A1BEE77B69B59305F54447FA841DB393D63D9E0E8B18
                                                                                        APIs
                                                                                        • CloseHandle.KERNEL32(?), ref: 00458DDF
                                                                                        • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458DFB
                                                                                        • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458E09
                                                                                        • GetExitCodeProcess.KERNEL32(?), ref: 00458E1A
                                                                                        • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E61
                                                                                        • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E7D
                                                                                        Strings
                                                                                        • Helper process exited., xrefs: 00458E29
                                                                                        • Helper process exited, but failed to get exit code., xrefs: 00458E53
                                                                                        • Helper isn't responding; killing it., xrefs: 00458DEB
                                                                                        • Stopping 64-bit helper process. (PID: %u), xrefs: 00458DD1
                                                                                        • Helper process exited with failure code: 0x%x, xrefs: 00458E47
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                                        • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                                        • API String ID: 3355656108-1243109208
                                                                                        • Opcode ID: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                                                        • Instruction ID: b06cb4cb11178ece3cea1db1bc2ca69ea432733d5239d7d0987fb8f0d427a68f
                                                                                        • Opcode Fuzzy Hash: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                                                        • Instruction Fuzzy Hash: D9216D706047009AD720E679C44275BB6E59F08709F04CC2FB999EB293DF78E8488B2A
                                                                                        APIs
                                                                                          • Part of subcall function 0042DDF4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 0045463B
                                                                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 00454777
                                                                                          • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                                        Strings
                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454583
                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454553
                                                                                        • , xrefs: 0045459D
                                                                                        • RegCreateKeyEx, xrefs: 004545AF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateFormatMessageQueryValue
                                                                                        • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                        • API String ID: 2481121983-1280779767
                                                                                        • Opcode ID: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                                                        • Instruction ID: a200d9e45076b9aa1c9026ee470310bfc0f5ccdb1a8093a9a555fb12639cba12
                                                                                        • Opcode Fuzzy Hash: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                                                        • Instruction Fuzzy Hash: 6C81DE75A00209AFDB00DFD5C941BDFB7F9EB49309F50442AE901FB282D7789A45CB69
                                                                                        APIs
                                                                                          • Part of subcall function 004538A8: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                                                          • Part of subcall function 004538A8: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                                                        • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0049669D
                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004967F1), ref: 004966BE
                                                                                        • CreateWindowExA.USER32(00000000,STATIC,00496800,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004966E5
                                                                                        • SetWindowLongA.USER32(?,000000FC,00495E78), ref: 004966F8
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC,00496800), ref: 00496728
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0049679C
                                                                                        • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000), ref: 004967A8
                                                                                          • Part of subcall function 00453D1C: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                                                        • 73A25CF0.USER32(?,004967CB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC), ref: 004967BE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                                        • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                                        • API String ID: 170458502-2312673372
                                                                                        • Opcode ID: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                                                        • Instruction ID: 3fac7199250898b77632ea887e905273a0ca2a52c1bf25bf17bddf130f7f486a
                                                                                        • Opcode Fuzzy Hash: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                                                        • Instruction Fuzzy Hash: EE413D70A44208AFDF01EFA5DC42F9E7BB8EB09714F61457AF500F7291D6799E008BA8
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E451
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E457
                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E4A5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressCloseHandleModuleProc
                                                                                        • String ID: .DEFAULT\Control Panel\International$=aE$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                        • API String ID: 4190037839-1003587384
                                                                                        • Opcode ID: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                                                        • Instruction ID: 6214d84d9e891aa165dd1588e79579c1e4a82babed7fc21810c195be89e1891e
                                                                                        • Opcode Fuzzy Hash: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                                                        • Instruction Fuzzy Hash: 65215230B10219ABCB10EAE7DC45A9E77A8EB04318FA04877A500E7281EB7CDE41CA5C
                                                                                        APIs
                                                                                        • GetActiveWindow.USER32 ref: 00462D68
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462D7C
                                                                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462D89
                                                                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462D96
                                                                                        • GetWindowRect.USER32(?,00000000), ref: 00462DE2
                                                                                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462E20
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                        • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                        • API String ID: 2610873146-3407710046
                                                                                        • Opcode ID: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                                                        • Instruction ID: 308e9426e96dcd15a0811dc773674cbbce9379ede84ac64ebea6e7762974983c
                                                                                        • Opcode Fuzzy Hash: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                                                        • Instruction Fuzzy Hash: 8421A775701B046FD3019A64DD41F3B3395DB94714F08453AF944EB381E6B9EC018A9A
                                                                                        APIs
                                                                                        • GetActiveWindow.USER32 ref: 0042F1A4
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1B8
                                                                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1C5
                                                                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1D2
                                                                                        • GetWindowRect.USER32(?,00000000), ref: 0042F21E
                                                                                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F25C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                        • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                        • API String ID: 2610873146-3407710046
                                                                                        • Opcode ID: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                                                        • Instruction ID: f96f766bc13e38d455a6b30724ea53c80225cfaaeacd9570d6dca051b777ffc7
                                                                                        • Opcode Fuzzy Hash: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                                                        • Instruction Fuzzy Hash: 3221D7797057149BD300D664ED81F3B33A4DB85B14F88457AF944DB381D679EC044BA9
                                                                                        APIs
                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0045915F,?,00000000,004591C2,?,?,02143858,00000000), ref: 00458FDD
                                                                                        • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02143858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 0045903A
                                                                                        • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02143858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 00459047
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00459093
                                                                                        • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02143858,?,00000000,004590F4,?,00000000), ref: 004590B9
                                                                                        • GetLastError.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02143858,?,00000000,004590F4,?,00000000), ref: 004590C0
                                                                                          • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                                        • String ID: CreateEvent$TransactNamedPipe
                                                                                        • API String ID: 2182916169-3012584893
                                                                                        • Opcode ID: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                                                        • Instruction ID: 50fb7c1009465aa7c5405e125e9101384e11cc4d6b330c20a7fc1de2f8ccdd80
                                                                                        • Opcode Fuzzy Hash: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                                                        • Instruction Fuzzy Hash: 68417F71A00608EFDB15DF99C985F9EB7F9EB08714F1044AAF904E72D2C6789E44CB28
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456CBD,?,?,00000031,?), ref: 00456B80
                                                                                        • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456B86
                                                                                        • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456BD3
                                                                                          • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                                        • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                                        • API String ID: 1914119943-2711329623
                                                                                        • Opcode ID: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                                                        • Instruction ID: a27b950e9f8baa5d3fd7d83d3f5f0f06fd95d714c0010da27a3b0cf72a10e13f
                                                                                        • Opcode Fuzzy Hash: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                                                        • Instruction Fuzzy Hash: AB319471B00604AFDB12EFAACC41D5BB7BDEB897557528466FC04D7252DA38DD04CB28
                                                                                        APIs
                                                                                        • RectVisible.GDI32(?,?), ref: 00416E23
                                                                                        • SaveDC.GDI32(?), ref: 00416E37
                                                                                        • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E5A
                                                                                        • RestoreDC.GDI32(?,?), ref: 00416E75
                                                                                        • CreateSolidBrush.GDI32(00000000), ref: 00416EF5
                                                                                        • FrameRect.USER32(?,?,?), ref: 00416F28
                                                                                        • DeleteObject.GDI32(?), ref: 00416F32
                                                                                        • CreateSolidBrush.GDI32(00000000), ref: 00416F42
                                                                                        • FrameRect.USER32(?,?,?), ref: 00416F75
                                                                                        • DeleteObject.GDI32(?), ref: 00416F7F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                        • String ID:
                                                                                        • API String ID: 375863564-0
                                                                                        • Opcode ID: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                                                        • Instruction ID: 305d9ddf0f7240c011be45b7bb8b7ddc49b42f68556790db257713301bb8c367
                                                                                        • Opcode Fuzzy Hash: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                                                        • Instruction Fuzzy Hash: FC514C712086445FDB54EF69C8C0B9777E8AF48314F15466AFD488B287C738EC85CB99
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                                        • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                                        • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                                        • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                        • String ID:
                                                                                        • API String ID: 1694776339-0
                                                                                        • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                        • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                                        • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                        • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                                        APIs
                                                                                        • GetSystemMenu.USER32(00000000,00000000), ref: 00422243
                                                                                        • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422261
                                                                                        • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226E
                                                                                        • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042227B
                                                                                        • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422288
                                                                                        • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422295
                                                                                        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004222A2
                                                                                        • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004222AF
                                                                                        • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222CD
                                                                                        • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222E9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Delete$EnableItem$System
                                                                                        • String ID:
                                                                                        • API String ID: 3985193851-0
                                                                                        • Opcode ID: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                                                        • Instruction ID: b791af981bedf3385b2dd143af085cc0c004e448fbd85fce69a0ff0a91ac5271
                                                                                        • Opcode Fuzzy Hash: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                                                        • Instruction Fuzzy Hash: 35213370340744BAE720D725DD8BF9B7BD89B04718F4440A5BA487F2D7C7F9AA80869C
                                                                                        APIs
                                                                                        • FreeLibrary.KERNEL32(10000000), ref: 00481499
                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 004814AD
                                                                                        • SendNotifyMessageA.USER32(00020440,00000496,00002710,00000000), ref: 0048151F
                                                                                        Strings
                                                                                        • GetCustomSetupExitCode, xrefs: 00481339
                                                                                        • Restarting Windows., xrefs: 004814FA
                                                                                        • Not restarting Windows because Setup is being run from the debugger., xrefs: 004814CE
                                                                                        • Deinitializing Setup., xrefs: 004812FA
                                                                                        • DeinitializeSetup, xrefs: 00481395
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary$MessageNotifySend
                                                                                        • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                                        • API String ID: 3817813901-1884538726
                                                                                        • Opcode ID: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                                                        • Instruction ID: fb8259b883485ef9100c7f5c1e95e74d54582b152ce66d5af1bc00326fba4159
                                                                                        • Opcode Fuzzy Hash: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                                                        • Instruction Fuzzy Hash: 4451A034704240AFD711EB69D895B2E7BE9FB59704F50887BE801C72B1DB38A846CB5D
                                                                                        APIs
                                                                                        • SHGetMalloc.SHELL32(?), ref: 00461A33
                                                                                        • GetActiveWindow.USER32 ref: 00461A97
                                                                                        • CoInitialize.OLE32(00000000), ref: 00461AAB
                                                                                        • SHBrowseForFolder.SHELL32(?), ref: 00461AC2
                                                                                        • CoUninitialize.OLE32(00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AD7
                                                                                        • SetActiveWindow.USER32(?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AED
                                                                                        • SetActiveWindow.USER32(?,?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AF6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                                        • String ID: A
                                                                                        • API String ID: 2684663990-3554254475
                                                                                        • Opcode ID: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                                                        • Instruction ID: 1302daae15839a874164301860301a8b98b45f7dd6f96d3c0913b4bd506695dd
                                                                                        • Opcode Fuzzy Hash: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                                                        • Instruction Fuzzy Hash: 64314FB0E00248AFDB00EFE6D885A9EBBF8EB09304F51447AF404E7251E7785A44CF59
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85,?,?,00000000,004731F4), ref: 00472C8C
                                                                                          • Part of subcall function 0042CDA4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE1A
                                                                                          • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85), ref: 00472D03
                                                                                        • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000), ref: 00472D09
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                                        • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                                        • API String ID: 884541143-1710247218
                                                                                        • Opcode ID: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                                                        • Instruction ID: a2498b92200520dbea2b626460b71344a260e4c3afc9e0684e621ff8b49742b9
                                                                                        • Opcode Fuzzy Hash: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                                                        • Instruction Fuzzy Hash: 731122303005087BD721EA66DD82B9E73ACCB88714F60853BB404B72D1CB7CEE02865C
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D621
                                                                                        • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D631
                                                                                        • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D641
                                                                                        • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D651
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                                        • API String ID: 190572456-3516654456
                                                                                        • Opcode ID: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                                                        • Instruction ID: 6d5035e3426567f523c7c0f539c0fc89aa7e9857b83a97dd2a4ec5b9764e3533
                                                                                        • Opcode Fuzzy Hash: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                                                        • Instruction Fuzzy Hash: 0D01ECB0900740DEEB24DFB6ACC572236A5ABA470AF14C13B980DD62A2D779044ADF2C
                                                                                        APIs
                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0041A9C9
                                                                                        • 73A24D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041AA03
                                                                                        • SetBkColor.GDI32(?,?), ref: 0041AA18
                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA62
                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041AA6D
                                                                                        • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA7D
                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AABC
                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041AAC6
                                                                                        • SetBkColor.GDI32(00000000,?), ref: 0041AAD3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Color$StretchText
                                                                                        • String ID:
                                                                                        • API String ID: 2984075790-0
                                                                                        • Opcode ID: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                                                        • Instruction ID: 0e7efefeb240adcf91359f1fba61dc18d1efd34d50a4dd97ee32c9a960060edb
                                                                                        • Opcode Fuzzy Hash: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                                                        • Instruction Fuzzy Hash: 9861C5B5A00105EFCB40EFADD985E9AB7F8AF08314B10856AF918DB261C735ED41CF68
                                                                                        APIs
                                                                                          • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                        • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,004580B4,?, /s ",?,regsvr32.exe",?,004580B4), ref: 00458026
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseDirectoryHandleSystem
                                                                                        • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                                        • API String ID: 2051275411-1862435767
                                                                                        • Opcode ID: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                                                        • Instruction ID: 809e342f07c36c5fe80e3456e65159aecd70c9e1b429d99a18f855550af0e9f5
                                                                                        • Opcode Fuzzy Hash: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                                                        • Instruction Fuzzy Hash: 97411570A043086BDB10EFD5D842B8EF7B9AB49705F51407FA904BB292DF789A0D8B19
                                                                                        APIs
                                                                                        • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1B9
                                                                                        • GetSysColor.USER32(00000014), ref: 0044D1C0
                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0044D1D8
                                                                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D201
                                                                                        • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D20B
                                                                                        • GetSysColor.USER32(00000010), ref: 0044D212
                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0044D22A
                                                                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D253
                                                                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D27E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Text$Color$Draw$OffsetRect
                                                                                        • String ID:
                                                                                        • API String ID: 1005981011-0
                                                                                        • Opcode ID: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                                                        • Instruction ID: 3cb6cff9cb4fe1f97db5fca9cf7ecf77bacdc285bba155e9e6a5fbb2dce94e66
                                                                                        • Opcode Fuzzy Hash: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                                                        • Instruction Fuzzy Hash: 4921CFB42015007FC710FB6ACD8AE8B7BDCDF19319B01857AB918EB393C678DD408669
                                                                                        APIs
                                                                                        • GetFocus.USER32 ref: 0041B755
                                                                                        • 73A1A570.USER32(?), ref: 0041B761
                                                                                        • 73A18830.GDI32(00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B796
                                                                                        • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B7A2
                                                                                        • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B7D0
                                                                                        • 73A18830.GDI32(00000000,00000000,00000000,0041B811,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B804
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A18830$A122A26310A570Focus
                                                                                        • String ID: k H
                                                                                        • API String ID: 3906783838-1447039187
                                                                                        • Opcode ID: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                                                        • Instruction ID: e4fa2330707e2e3496a7563b6e1a8945dd65194040c1b513b55e56702052f46b
                                                                                        • Opcode Fuzzy Hash: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                                                        • Instruction Fuzzy Hash: 33512D74A00208AFCB11DFA9C855AEEBBF9FF49704F104466F504A7390D7789981CBA9
                                                                                        APIs
                                                                                        • GetFocus.USER32 ref: 0041BA27
                                                                                        • 73A1A570.USER32(?), ref: 0041BA33
                                                                                        • 73A18830.GDI32(00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA6D
                                                                                        • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA79
                                                                                        • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BA9D
                                                                                        • 73A18830.GDI32(00000000,00000000,00000000,0041BADE,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BAD1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A18830$A122A26310A570Focus
                                                                                        • String ID: k H
                                                                                        • API String ID: 3906783838-1447039187
                                                                                        • Opcode ID: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                                                        • Instruction ID: 8a06375b061ea5bfc02952791cdae78cf5b61e443f36c9dad2d84499db0416b2
                                                                                        • Opcode Fuzzy Hash: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                                                        • Instruction Fuzzy Hash: FE510975A002189FCB11DFA9C891AAEBBF9FF49700F15806AF504EB751D7789D40CBA4
                                                                                        APIs
                                                                                          • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                                          • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 00495F55
                                                                                        • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00495F69
                                                                                        • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00495F83
                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F8F
                                                                                        • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F95
                                                                                        • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495FA8
                                                                                        Strings
                                                                                        • Deleting Uninstall data files., xrefs: 00495ECB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                                        • String ID: Deleting Uninstall data files.
                                                                                        • API String ID: 1570157960-2568741658
                                                                                        • Opcode ID: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                                                        • Instruction ID: fec72cc46ef3efd5c3c8e8a450f489c3c08d507a48e2b84f6ee45df75d5b7e94
                                                                                        • Opcode Fuzzy Hash: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                                                        • Instruction Fuzzy Hash: 34219571304610AFEB11EB75ECC2B2637A8EB54338F61053BF504DA1E6D678AC008B1D
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1,?,?,?,?,00000000), ref: 0047050B
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1), ref: 00470522
                                                                                        • AddFontResourceA.GDI32(00000000), ref: 0047053F
                                                                                        • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00470553
                                                                                        Strings
                                                                                        • Failed to set value in Fonts registry key., xrefs: 00470514
                                                                                        • AddFontResource, xrefs: 0047055D
                                                                                        • Failed to open Fonts registry key., xrefs: 00470529
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                                        • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                                        • API String ID: 955540645-649663873
                                                                                        • Opcode ID: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                                                        • Instruction ID: 66ce3b01f7eb708e2302e7809b1ea03697ff66c32de1c99646f3643d23023453
                                                                                        • Opcode Fuzzy Hash: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                                                        • Instruction Fuzzy Hash: 62216570741204BBDB10EA669C42FAE779D9B55708F50843BB904EB3C2D67CDE028A5D
                                                                                        APIs
                                                                                          • Part of subcall function 00416420: GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                                          • Part of subcall function 00416420: UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                                          • Part of subcall function 00416420: RegisterClassA.USER32(?), ref: 004164DE
                                                                                        • GetVersion.KERNEL32 ref: 004631CC
                                                                                        • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 0046320A
                                                                                        • SHGetFileInfo.SHELL32(004632A8,00000000,?,00000160,00004011), ref: 00463227
                                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 00463245
                                                                                        • SetCursor.USER32(00000000,00000000,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046324B
                                                                                        • SetCursor.USER32(?,0046328B,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046327E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                                        • String ID: Explorer
                                                                                        • API String ID: 2594429197-512347832
                                                                                        • Opcode ID: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                                                        • Instruction ID: b0d998c5e58c3251a46d3edbb0a2afbc6be3b3781793d4cbec8386629f90fe5f
                                                                                        • Opcode Fuzzy Hash: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                                                        • Instruction Fuzzy Hash: FA21E7307403446AEB10FF795C57F9A7698DB09709F5040BFF605EA1C3EA7C8908866D
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02142BD8,?,?,?,02142BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02142BD8,?,?,?,02142BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                                                        • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02142BD8,?,?,?,02142BD8), ref: 004782E8
                                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,02142BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                                        • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                                        • API String ID: 2704155762-2318956294
                                                                                        • Opcode ID: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                                                        • Instruction ID: d6ca79aa4c48c3adffb9da4b01ee7f27494699adf3768a2d59cb90ace03db172
                                                                                        • Opcode Fuzzy Hash: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                                                        • Instruction Fuzzy Hash: 5701C4707C0B0466E520316E4D8AFEB554C8B54B69F54813F7E0CEA2C2DDAE8D06016E
                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                                                        • LocalFree.KERNEL32(006C26F0,00000000,00401B68), ref: 00401ACF
                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000,006C26F0,00000000,00401B68), ref: 00401AEE
                                                                                        • LocalFree.KERNEL32(006C36F0,?,00000000,00008000,006C26F0,00000000,00401B68), ref: 00401B2D
                                                                                        • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                                                        • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                        • String ID: $=l
                                                                                        • API String ID: 3782394904-4008268515
                                                                                        • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                                        • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                                                        • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                                        • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,0045A2F2,?,00000000,00000000,00000000,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045A236
                                                                                          • Part of subcall function 004543E0: FindClose.KERNEL32(000000FF,004544D6), ref: 004544C5
                                                                                        Strings
                                                                                        • Failed to strip read-only attribute., xrefs: 0045A204
                                                                                        • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 0045A210
                                                                                        • Deleting directory: %s, xrefs: 0045A1BF
                                                                                        • Failed to delete directory (%d)., xrefs: 0045A2CC
                                                                                        • Failed to delete directory (%d). Will retry later., xrefs: 0045A24F
                                                                                        • Stripped read-only attribute., xrefs: 0045A1F8
                                                                                        • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 0045A2AB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseErrorFindLast
                                                                                        • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                                        • API String ID: 754982922-1448842058
                                                                                        • Opcode ID: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                                                        • Instruction ID: e72d66395cbcced70a1ff0d39e5b36b51bb4b2a363b16cebf3a96f2a9050ba33
                                                                                        • Opcode Fuzzy Hash: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                                                        • Instruction Fuzzy Hash: 9A41A730A042449ACB00DBA988463AE76A55F4930AF5486BBBC04D7393CB7D8E1D875F
                                                                                        APIs
                                                                                        • GetCapture.USER32 ref: 00422EB4
                                                                                        • GetCapture.USER32 ref: 00422EC3
                                                                                        • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EC9
                                                                                        • ReleaseCapture.USER32 ref: 00422ECE
                                                                                        • GetActiveWindow.USER32 ref: 00422EDD
                                                                                        • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F5C
                                                                                        • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FC0
                                                                                        • GetActiveWindow.USER32 ref: 00422FCF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                        • String ID:
                                                                                        • API String ID: 862346643-0
                                                                                        • Opcode ID: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                                                        • Instruction ID: 0c1e69f79f034fd7694da938dfb4ae80f60ee9794ae3f0b0e2c785ff7ec3c7d8
                                                                                        • Opcode Fuzzy Hash: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                                                        • Instruction Fuzzy Hash: E4413F70B00254AFDB10EB6ADA42B9A77F1EF44304F5540BAF500AB392DB78AE40DB5D
                                                                                        APIs
                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 0042F2CA
                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 0042F2E1
                                                                                        • GetActiveWindow.USER32 ref: 0042F2EA
                                                                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F317
                                                                                        • SetActiveWindow.USER32(?,0042F447,00000000,?), ref: 0042F338
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ActiveLong$Message
                                                                                        • String ID:
                                                                                        • API String ID: 2785966331-0
                                                                                        • Opcode ID: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                                                        • Instruction ID: 0493a3c03df3966e51b4b777c60d25e7c68e0b9e8cdf2dbcd65ae894a3a71964
                                                                                        • Opcode Fuzzy Hash: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                                                        • Instruction Fuzzy Hash: 7631B471A00654AFDB01EFB5DC52E6EBBB8EB09714B91447AF804E3691D738AD10CB58
                                                                                        APIs
                                                                                        • 73A1A570.USER32(00000000), ref: 0042949A
                                                                                        • GetTextMetricsA.GDI32(00000000), ref: 004294A3
                                                                                          • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004294B2
                                                                                        • GetTextMetricsA.GDI32(00000000,?), ref: 004294BF
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004294C6
                                                                                        • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004294CE
                                                                                        • GetSystemMetrics.USER32(00000006), ref: 004294F3
                                                                                        • GetSystemMetrics.USER32(00000006), ref: 0042950D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                                                        • String ID:
                                                                                        • API String ID: 361401722-0
                                                                                        • Opcode ID: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                                                        • Instruction ID: f9189b99ec718bdc55f682ba078bc6b9c4dab98ca430e676b6dc028aca6f8884
                                                                                        • Opcode Fuzzy Hash: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                                                        • Instruction Fuzzy Hash: 3301E1917087513BFB11B67A9CC2F6B61C8CB8435CF44043FFA459A3D2D96C9C80866A
                                                                                        APIs
                                                                                        • 73A1A570.USER32(00000000,?,00419069,004985AE), ref: 0041DE37
                                                                                        • 73A24620.GDI32(00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE41
                                                                                        • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE4E
                                                                                        • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE5D
                                                                                        • GetStockObject.GDI32(00000007), ref: 0041DE6B
                                                                                        • GetStockObject.GDI32(00000005), ref: 0041DE77
                                                                                        • GetStockObject.GDI32(0000000D), ref: 0041DE83
                                                                                        • LoadIconA.USER32(00000000,00007F00), ref: 0041DE94
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ObjectStock$A24620A480A570IconLoad
                                                                                        • String ID:
                                                                                        • API String ID: 3573811560-0
                                                                                        • Opcode ID: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                                                        • Instruction ID: 4e0a0a69a1fbcc37fa68332f5170e2556ef2fd96a8c36c1a21edcb526b0e3b4b
                                                                                        • Opcode Fuzzy Hash: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                                                        • Instruction Fuzzy Hash: E11100B06457015AE740FF666A92BA63694D724708F00813FF605AF3D2D7792C449B9E
                                                                                        APIs
                                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 004636B0
                                                                                        • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463745), ref: 004636B6
                                                                                        • SetCursor.USER32(?,0046372D,00007F02,00000000,00463745), ref: 00463720
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Cursor$Load
                                                                                        • String ID: $ $Internal error: Item already expanding
                                                                                        • API String ID: 1675784387-1948079669
                                                                                        • Opcode ID: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                                                        • Instruction ID: 5f7148262a90782ca5f39c73a98182432cf514ee5891adbc4e31059349ad3c9c
                                                                                        • Opcode Fuzzy Hash: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                                                        • Instruction Fuzzy Hash: EEB19270600284DFD710DF29C585B9ABBF1AF04319F14C4AAE8459B792E778EE48CF5A
                                                                                        APIs
                                                                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: PrivateProfileStringWrite
                                                                                        • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                                        • API String ID: 390214022-3304407042
                                                                                        • Opcode ID: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                                                        • Instruction ID: f7f3e57e327ad0b7fc32dd9a0c0ef844c3cf52932767352b59a94e8a2e0b7a1e
                                                                                        • Opcode Fuzzy Hash: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                                                        • Instruction Fuzzy Hash: 0E910534E001099BDB01EFA5D842BDEB7F5EF4874AF50806AE90077292D7786E49CB59
                                                                                        APIs
                                                                                        • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476BC5
                                                                                        • 73A259E0.USER32(00000000,000000FC,00476B20,00000000,00476E04,?,00000000,00476E2E), ref: 00476BEC
                                                                                        • GetACP.KERNEL32(00000000,00476E04,?,00000000,00476E2E), ref: 00476C29
                                                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476C6F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A259ClassInfoMessageSend
                                                                                        • String ID: COMBOBOX$Inno Setup: Language
                                                                                        • API String ID: 3217714596-4234151509
                                                                                        • Opcode ID: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                                                        • Instruction ID: 76a62d5c2b18ddabed1a1f2db415f61daf58d6c828ad3828204ddc2489713d7e
                                                                                        • Opcode Fuzzy Hash: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                                                        • Instruction Fuzzy Hash: 4E813C346006059FC720DF69C985AEAB7F2FB09304F1580BAE849E7762D738ED41CB59
                                                                                        APIs
                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,00408970,?,?,?,?,00000000,00000000,00000000,?,00409977,00000000,0040998A), ref: 00408742
                                                                                          • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                                          • Part of subcall function 004085BC: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087BE,?,?,?,00000000,00408970), ref: 004085CF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale$DefaultSystem
                                                                                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                        • API String ID: 1044490935-665933166
                                                                                        • Opcode ID: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                                                        • Instruction ID: bf07bec6589cb82417a29d9109d5e68838e6a5c97ac1b9e4b464d3d1e075229e
                                                                                        • Opcode Fuzzy Hash: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                                                        • Instruction Fuzzy Hash: 55513E24B00108ABD701FBA69E41A9E77A9DB94304F50C07FA541BB3C7DA3DDE05975D
                                                                                        APIs
                                                                                        • GetVersion.KERNEL32(00000000,00411909), ref: 0041179C
                                                                                        • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041185A
                                                                                          • Part of subcall function 00411ABC: CreatePopupMenu.USER32 ref: 00411AD6
                                                                                        • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118E6
                                                                                          • Part of subcall function 00411ABC: CreateMenu.USER32 ref: 00411AE0
                                                                                        • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118CD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                        • String ID: ,$?
                                                                                        • API String ID: 2359071979-2308483597
                                                                                        • Opcode ID: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                                                        • Instruction ID: df95c3f439c97799bb0998fa3429798e8a176efd4e8e18b788060c5868d8049e
                                                                                        • Opcode Fuzzy Hash: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                                                        • Instruction Fuzzy Hash: BA51F674A00144ABDB10EF6ADC816DA7BF9AF09304B11857BF914E73A6E738DD41CB58
                                                                                        APIs
                                                                                        • GetObjectA.GDI32(?,00000018,?), ref: 0041BF38
                                                                                        • GetObjectA.GDI32(?,00000018,?), ref: 0041BF47
                                                                                        • GetBitmapBits.GDI32(?,?,?), ref: 0041BF98
                                                                                        • GetBitmapBits.GDI32(?,?,?), ref: 0041BFA6
                                                                                        • DeleteObject.GDI32(?), ref: 0041BFAF
                                                                                        • DeleteObject.GDI32(?), ref: 0041BFB8
                                                                                        • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFD5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                                        • String ID:
                                                                                        • API String ID: 1030595962-0
                                                                                        • Opcode ID: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                                                        • Instruction ID: 0934d86ca8fb123134a847d885dc0ae0ba41a9d0998c4bba382ea8cf266d8dc0
                                                                                        • Opcode Fuzzy Hash: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                                                        • Instruction Fuzzy Hash: 5A510571E00219AFCB14DFA9C8819EEBBF9EF48314B11442AF914E7391D738AD81CB64
                                                                                        APIs
                                                                                        • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CF0E
                                                                                        • 73A24620.GDI32(00000000,00000026), ref: 0041CF2D
                                                                                        • 73A18830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CF93
                                                                                        • 73A122A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CFA2
                                                                                        • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D00C
                                                                                        • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D04A
                                                                                        • 73A18830.GDI32(?,?,00000001,0041D07C,00000000,00000026), ref: 0041D06F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Stretch$A18830$A122A24620BitsMode
                                                                                        • String ID:
                                                                                        • API String ID: 430401518-0
                                                                                        • Opcode ID: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                                                        • Instruction ID: 415929d19c0355200a34ec50ec85ee50bdb26205500aadc12dd1df5ccaef5bc8
                                                                                        • Opcode Fuzzy Hash: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                                                        • Instruction Fuzzy Hash: 7A514EB0604200AFD714DFA9C995F9BBBF9EF08304F10859AB549DB292C779ED81CB58
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,?,?), ref: 00457166
                                                                                          • Part of subcall function 0042428C: GetWindowTextA.USER32(?,?,00000100), ref: 004242AC
                                                                                          • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                          • Part of subcall function 0041EEB4: 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                                          • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004571CD
                                                                                        • TranslateMessage.USER32(?), ref: 004571EB
                                                                                        • DispatchMessageA.USER32(?), ref: 004571F4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$TextWindow$A25940CurrentDispatchSendThreadTranslate
                                                                                        • String ID: [Paused]
                                                                                        • API String ID: 3047529653-4230553315
                                                                                        • Opcode ID: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                                                        • Instruction ID: cc82e29175726c0716c689c1ffa83d11e9869aeff1ced20ba9c80888b84e3111
                                                                                        • Opcode Fuzzy Hash: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                                                        • Instruction Fuzzy Hash: 013196309082489EDB11DBB5EC81FDEBBB8DB49314F5540B7F800E7292D67C9909CB69
                                                                                        APIs
                                                                                        • GetCursor.USER32(00000000,0046B897), ref: 0046B814
                                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 0046B822
                                                                                        • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B897), ref: 0046B828
                                                                                        • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B832
                                                                                        • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B838
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Cursor$LoadSleep
                                                                                        • String ID: CheckPassword
                                                                                        • API String ID: 4023313301-1302249611
                                                                                        • Opcode ID: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                                                        • Instruction ID: aec6a0205c5a75bc54f0fc291e1a1f9730d999611bc1887dd1e74dc6007ab6bd
                                                                                        • Opcode Fuzzy Hash: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                                                        • Instruction Fuzzy Hash: 333164346406049FD711EB69C889F9E7BE4EF49304F5580B6F844DB3A2D778AD40CB99
                                                                                        APIs
                                                                                          • Part of subcall function 00477AB0: GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                                                          • Part of subcall function 00477AB0: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                                                          • Part of subcall function 00477AB0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                                                        • SendMessageA.USER32(00000000,0000004A,00000000,00477F42), ref: 00477BBD
                                                                                        • GetTickCount.KERNEL32 ref: 00477C02
                                                                                        • GetTickCount.KERNEL32 ref: 00477C0C
                                                                                        • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477C61
                                                                                        Strings
                                                                                        • CallSpawnServer: Unexpected status: %d, xrefs: 00477C4A
                                                                                        • CallSpawnServer: Unexpected response: $%x, xrefs: 00477BF2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                                        • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                                        • API String ID: 613034392-3771334282
                                                                                        • Opcode ID: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                                                        • Instruction ID: 65d184c56696bd8d6baefe4a5ac293f093c2dd543b1706e930bc299cdf77f89e
                                                                                        • Opcode Fuzzy Hash: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                                                        • Instruction Fuzzy Hash: B131A474B042149ADB11EBB988867EEB6A09F48304F90C47AF548EB392D67C9E41879D
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 00459BA3
                                                                                        Strings
                                                                                        • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 00459BAE
                                                                                        • .NET Framework CreateAssemblyCache function failed, xrefs: 00459BC6
                                                                                        • Fusion.dll, xrefs: 00459B43
                                                                                        • CreateAssemblyCache, xrefs: 00459B9A
                                                                                        • Failed to load .NET Framework DLL "%s", xrefs: 00459B88
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                                        • API String ID: 190572456-3990135632
                                                                                        • Opcode ID: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                                                        • Instruction ID: 1db31b6b51e2e068c3f61674d824012408e1fbc1d182cf764eafebb5ab4ea00f
                                                                                        • Opcode Fuzzy Hash: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                                                        • Instruction Fuzzy Hash: EF318970E00619EBDB01EFA5C88169EB7B8AF44315F50857BE814E7382D738AE09C799
                                                                                        APIs
                                                                                          • Part of subcall function 0041C058: GetObjectA.GDI32(?,00000018), ref: 0041C065
                                                                                        • GetFocus.USER32 ref: 0041C178
                                                                                        • 73A1A570.USER32(?), ref: 0041C184
                                                                                        • 73A18830.GDI32(?,?,00000000,00000000,0041C203,?,?), ref: 0041C1A5
                                                                                        • 73A122A0.GDI32(?,?,?,00000000,00000000,0041C203,?,?), ref: 0041C1B1
                                                                                        • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1C8
                                                                                        • 73A18830.GDI32(?,00000000,00000000,0041C20A,?,?), ref: 0041C1F0
                                                                                        • 73A1A480.USER32(?,?,0041C20A,?,?), ref: 0041C1FD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A18830$A122A480A570BitsFocusObject
                                                                                        • String ID:
                                                                                        • API String ID: 2231653193-0
                                                                                        • Opcode ID: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                                                        • Instruction ID: a51b9c7cee13939b32e911f1849152ebfa7eb0d73570b73294f05c7218cf190f
                                                                                        • Opcode Fuzzy Hash: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                                                        • Instruction Fuzzy Hash: A0116A71E40609BBDB10DBE9CC85FAFBBFCEF48700F54446AB518E7281D67899008B28
                                                                                        APIs
                                                                                        • GetSystemMetrics.USER32(0000000E), ref: 00418C80
                                                                                        • GetSystemMetrics.USER32(0000000D), ref: 00418C88
                                                                                        • 6F532980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C8E
                                                                                          • Part of subcall function 004099C0: 6F52C400.COMCTL32(0049B628,000000FF,00000000,00418CBC,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004099C4
                                                                                        • 6F59CB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CDE
                                                                                        • 6F59C740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CE9
                                                                                        • 6F59CB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000), ref: 00418CFC
                                                                                        • 6F530860.COMCTL32(0049B628,00418D1F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E), ref: 00418D12
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: MetricsSystem$C400C740F530860F532980
                                                                                        • String ID:
                                                                                        • API String ID: 209721339-0
                                                                                        • Opcode ID: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                                                        • Instruction ID: e0b43fe86d74620756cf035266125a11838772e9d6ef4bcae2e69295d5b8951d
                                                                                        • Opcode Fuzzy Hash: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                                                        • Instruction Fuzzy Hash: A11149B1744204BBEB10EBA9DC83F5E73B8DB48704F6044BAB604E72D2DB799D409759
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004837A4), ref: 00483789
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                                        • API String ID: 47109696-2530820420
                                                                                        • Opcode ID: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                                                        • Instruction ID: 8316402a246994b7737153b66ed252a9f16b12b2be78e08e0fa98e077eb8f510
                                                                                        • Opcode Fuzzy Hash: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                                                        • Instruction Fuzzy Hash: 0311B1B4704244AADB10FF65CC52B5E7AE9DB41B19F60C87BA400A7282EB38CA05875C
                                                                                        APIs
                                                                                        • 73A1A570.USER32(00000000,?,?,00000000), ref: 00494EE9
                                                                                          • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00494F0B
                                                                                        • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495489), ref: 00494F1F
                                                                                        • GetTextMetricsA.GDI32(00000000,?), ref: 00494F41
                                                                                        • 73A1A480.USER32(00000000,00000000,00494F6B,00494F64,?,00000000,?,?,00000000), ref: 00494F5E
                                                                                        Strings
                                                                                        • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00494F16
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                                        • API String ID: 1435929781-222967699
                                                                                        • Opcode ID: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                                                        • Instruction ID: 6f18d4fe6cef93123b0455e30b82395b7dbfc0c8f911bccc88a8e51c4d6277b1
                                                                                        • Opcode Fuzzy Hash: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                                                        • Instruction Fuzzy Hash: 95018476A04609BFEB00DBA9CC41F5EB7ECDB89704F51447AB600E7281D678AE018B28
                                                                                        APIs
                                                                                        • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                                        • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                                        • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                                        • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ObjectSelect$Delete$Stretch
                                                                                        • String ID:
                                                                                        • API String ID: 1458357782-0
                                                                                        • Opcode ID: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                                                        • Instruction ID: 28529174ed8a1a36c66279ad8c479dcd7ed434ba0fbaa502c63cdd0cc078bbc5
                                                                                        • Opcode Fuzzy Hash: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                                                        • Instruction Fuzzy Hash: A1114C72E40559ABDF10D6D9D885FAFB3BCEF08704F048456B614FB241C678A8418B54
                                                                                        APIs
                                                                                        • GetCursorPos.USER32 ref: 004233BF
                                                                                        • WindowFromPoint.USER32(?,?), ref: 004233CC
                                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233DA
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 004233E1
                                                                                        • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233FA
                                                                                        • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423411
                                                                                        • SetCursor.USER32(00000000), ref: 00423423
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                        • String ID:
                                                                                        • API String ID: 1770779139-0
                                                                                        • Opcode ID: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                                                        • Instruction ID: 219e0d69ac6b6a38dcb61baa39fbc914f783b163521ae56cddb293ea60412e1c
                                                                                        • Opcode Fuzzy Hash: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                                                        • Instruction Fuzzy Hash: E601D42230472036D6217B795C86E2F26A8CFC5B15F50457FB649BB283DA3D8C0063BD
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 00494D0C
                                                                                        • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00494D19
                                                                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00494D26
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModule
                                                                                        • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                                        • API String ID: 667068680-2254406584
                                                                                        • Opcode ID: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                                                        • Instruction ID: 42226921e916c2e61715a17367c32eae2b2292ab525ca03b869d6a68ec0a34c4
                                                                                        • Opcode Fuzzy Hash: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                                                        • Instruction Fuzzy Hash: 6CF0F69AB41B1466DA2025B68C81F7B698CCFD1B71F050337BE04A7382ED9D8D0642AD
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D9F5
                                                                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045DA05
                                                                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045DA15
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                                        • API String ID: 190572456-212574377
                                                                                        • Opcode ID: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                                                        • Instruction ID: e47ea2fb967bc5a05fa6d8d3c64fcba096cc564050e4d812c51f788cc71ed1ca
                                                                                        • Opcode Fuzzy Hash: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                                                        • Instruction Fuzzy Hash: 2BF030B0D05300DFEB24DFB29CC372336959BA4316F14803B9A0D96267D278088CCE2C
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,00480D8E), ref: 0042EA45
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA4B
                                                                                        • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA5C
                                                                                          • Part of subcall function 0042E9BC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                                                          • Part of subcall function 0042E9BC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                                          • Part of subcall function 0042E9BC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                                                        • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA70
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                                        • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                                        • API String ID: 142928637-2676053874
                                                                                        • Opcode ID: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                                                        • Instruction ID: 2c8c4e1fda890c3dedf4e0e73620de090a3a9d5666271f16a874a7bcdd66483b
                                                                                        • Opcode Fuzzy Hash: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                                                        • Instruction Fuzzy Hash: 52E092A1741720EAEA10B7B67CC6F9A2668E714729F54403BF100A51E1C3BD1C80CE9E
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F099), ref: 0044C7FB
                                                                                        • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C80C
                                                                                        • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C81C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad
                                                                                        • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                                        • API String ID: 2238633743-1050967733
                                                                                        • Opcode ID: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                                                        • Instruction ID: d5a6e329c062b47ae4ba9e11e7719f1ec1b45dd3e70fac445fdcae0b1af11dcb
                                                                                        • Opcode Fuzzy Hash: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                                                        • Instruction Fuzzy Hash: 64F0FE70246305CAFB50BBB5FDC67223694E3A4B0AF18137BE40156192D7BC4444CF4C
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                                                        • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                                                        • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModule
                                                                                        • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                                        • API String ID: 667068680-222143506
                                                                                        • Opcode ID: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                                                        • Instruction ID: 8ade474bf949b7c868f23be577f60042bf37b8b7e1302e6d2b868e4e2d48ad49
                                                                                        • Opcode Fuzzy Hash: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                                                        • Instruction Fuzzy Hash: D4C0E9F0AC1740EEAA00E7F15CDAD762558D514B34724943F754DAA193D97D58044A2C
                                                                                        APIs
                                                                                        • GetFocus.USER32 ref: 0041B58E
                                                                                        • 73A1A570.USER32(?,00000000,0041B668,?,?,?,?), ref: 0041B59A
                                                                                        • 73A24620.GDI32(?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5B6
                                                                                        • 73A4E680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5D3
                                                                                        • 73A4E680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668), ref: 0041B5EA
                                                                                        • 73A1A480.USER32(?,?,0041B643,?,?), ref: 0041B636
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: E680$A24620A480A570Focus
                                                                                        • String ID:
                                                                                        • API String ID: 3709697839-0
                                                                                        • Opcode ID: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                                                        • Instruction ID: 7d41d09f6123fe0998bcf531a8d6f09bc5b1e179d78523dd82c4b1b978091a2c
                                                                                        • Opcode Fuzzy Hash: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                                                        • Instruction Fuzzy Hash: 7E41D571A04254AFDB10DFA9C886EAFBBB4EB55704F1484AAF500EB351D3389D11CBA5
                                                                                        APIs
                                                                                        • SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                                                        • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D4E8,?,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D45A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                                        • API String ID: 1452528299-1580325520
                                                                                        • Opcode ID: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                                                        • Instruction ID: bfdb5615fdc952ab51c5d4d36cfcdc52ba3649a349ed7733e19bd606ff263fd4
                                                                                        • Opcode Fuzzy Hash: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                                                        • Instruction Fuzzy Hash: A6117835A04204ABD731DE95C941A5E76DCDF46306F608077AD0596283D67C6F0A952A
                                                                                        APIs
                                                                                        • GetSystemMetrics.USER32(0000000B), ref: 0041BDE5
                                                                                        • GetSystemMetrics.USER32(0000000C), ref: 0041BDEF
                                                                                        • 73A1A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDF9
                                                                                        • 73A24620.GDI32(00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE20
                                                                                        • 73A24620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE2D
                                                                                        • 73A1A480.USER32(00000000,00000000,0041BE73,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE66
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A24620MetricsSystem$A480A570
                                                                                        • String ID:
                                                                                        • API String ID: 4042297458-0
                                                                                        • Opcode ID: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                                                        • Instruction ID: cee0947e7f2791638d7e7c91bd9cc57ffb528c4a132e606019bcc307a049f0f1
                                                                                        • Opcode Fuzzy Hash: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                                                        • Instruction Fuzzy Hash: 40212C74E046499FEB00EFA9C982BEEB7B4EB48714F10842AF514B7781D7785940CBA9
                                                                                        APIs
                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 0047E272
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CFF1), ref: 0047E298
                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 0047E2A8
                                                                                        • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E2C9
                                                                                        • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E2DD
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E2F9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Long$Show
                                                                                        • String ID:
                                                                                        • API String ID: 3609083571-0
                                                                                        • Opcode ID: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                                                        • Instruction ID: 64a3e6c2176d4acc74ea6130292171d5cd043058eec335b926c35577e1896bc6
                                                                                        • Opcode Fuzzy Hash: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                                                        • Instruction Fuzzy Hash: DE010CB5651210ABE600D769DE41F66379CAB0D334F0503AAB959DF2E3C729EC009B49
                                                                                        APIs
                                                                                          • Part of subcall function 0041A6F0: CreateBrushIndirect.GDI32 ref: 0041A75B
                                                                                        • UnrealizeObject.GDI32(00000000), ref: 0041B28C
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B29E
                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0041B2C1
                                                                                        • SetBkMode.GDI32(?,00000002), ref: 0041B2CC
                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0041B2E7
                                                                                        • SetBkMode.GDI32(?,00000001), ref: 0041B2F2
                                                                                          • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                        • String ID:
                                                                                        • API String ID: 3527656728-0
                                                                                        • Opcode ID: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                                                        • Instruction ID: 5f3c9a08814bcb0dec11b684bd4148c9aa8da507e688bf70d4fc6563dceee2e6
                                                                                        • Opcode Fuzzy Hash: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                                                        • Instruction Fuzzy Hash: 7EF0C2B1651501ABCE00FFBAD9CAE4B37A89F043097088057B544DF197C97CD8548B3D
                                                                                        APIs
                                                                                          • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                        • ShowWindow.USER32(?,00000005,00000000,00497991,?,?,00000000), ref: 00497762
                                                                                          • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                          • Part of subcall function 004072B0: SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                                                          • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                                        • String ID: .dat$.msg$IMsg$Uninstall
                                                                                        • API String ID: 3312786188-1660910688
                                                                                        • Opcode ID: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                                                        • Instruction ID: bbf2e7f3574d42a9113524bdb42c94a944b0e97273f2a70b882bd080beededf8
                                                                                        • Opcode Fuzzy Hash: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                                                        • Instruction Fuzzy Hash: 8E318F74A10214AFDB00EF65DC82D6E7BB5EB89318B51847AF800AB392D739BD01CB58
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EAEA
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAF0
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB19
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                                        • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                                        • API String ID: 828529508-2866557904
                                                                                        • Opcode ID: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                                                        • Instruction ID: f5c55ae169209784706469d1b6e96428d25835975ad7b3a5622eb1d8c2489c6d
                                                                                        • Opcode Fuzzy Hash: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                                                        • Instruction Fuzzy Hash: 2DF022E078062136E620E2BFACC3F6B498C8FA0725F040436F009EA2C2E92C9900422E
                                                                                        APIs
                                                                                        • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02194B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                        • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02194B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                        • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02194B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                        • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02194B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                        • String ID: $=l
                                                                                        • API String ID: 730355536-4008268515
                                                                                        • Opcode ID: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                                        • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                                                        • Opcode Fuzzy Hash: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                                        • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                                                        APIs
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00457E64
                                                                                        • GetExitCodeProcess.KERNEL32(?,00498116), ref: 00457E85
                                                                                        • CloseHandle.KERNEL32(?,00457EB8,?,?,004586D3,00000000,00000000), ref: 00457EAB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                                        • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                                        • API String ID: 2573145106-3235461205
                                                                                        • Opcode ID: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                                                        • Instruction ID: 6a931132ee958b8202ab537f65b64b7fb4871f4dbf11571726e28c2ddef09419
                                                                                        • Opcode Fuzzy Hash: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                                                        • Instruction Fuzzy Hash: 1101A735604704AFDB11EB999D43A1E77A8DB49711F5004B6FC10E73D3D63C9D048618
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                                        • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                                        • String ID: ChangeWindowMessageFilter$user32.dll
                                                                                        • API String ID: 3478007392-2498399450
                                                                                        • Opcode ID: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                                                        • Instruction ID: 5ef4959e42d5312267b3952f4de6be483a2b5690063b138e9708ef51bd19b1c3
                                                                                        • Opcode Fuzzy Hash: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                                                        • Instruction Fuzzy Hash: A3E0ECB1741314EADA106B62BECBF5A2558E724B15F54043BF101751F2C7BD2C80C95E
                                                                                        APIs
                                                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                                        • String ID: AllowSetForegroundWindow$user32.dll
                                                                                        • API String ID: 1782028327-3855017861
                                                                                        • Opcode ID: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                                                        • Instruction ID: 8233eca9c26ae86130ab8a2651ceb45e7b9436c82c984da63702dcb6f06a18e2
                                                                                        • Opcode Fuzzy Hash: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                                                        • Instruction Fuzzy Hash: 27D0A7A0208300A6ED10F3F14C47E6F224C8D847587A4C43B7404E3182CABCE900993C
                                                                                        APIs
                                                                                        • BeginPaint.USER32(00000000,?), ref: 00416C62
                                                                                        • SaveDC.GDI32(?), ref: 00416C93
                                                                                        • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D55), ref: 00416CF4
                                                                                        • RestoreDC.GDI32(?,?), ref: 00416D1B
                                                                                        • EndPaint.USER32(00000000,?,00416D5C,00000000,00416D55), ref: 00416D4F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                        • String ID:
                                                                                        • API String ID: 3808407030-0
                                                                                        • Opcode ID: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                                                        • Instruction ID: c70ebf24aed337d2f43398dc79d2f74fb7d9fd2825851e0a0ce007a429ecfdc3
                                                                                        • Opcode Fuzzy Hash: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                                                        • Instruction Fuzzy Hash: D7413C70A04204AFDB04DB99D985FAE77F9EB48304F1640AEE4059B362D778ED85CB58
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                                        • Instruction ID: fc599d946787c0506e623d191f8eefd10b4a308858d20a9272ac2d3790a9447e
                                                                                        • Opcode Fuzzy Hash: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                                        • Instruction Fuzzy Hash: A1314F746047449FC320EF69C984BABB7E8AF89314F04891EF9D9C3752C638EC858B19
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429818
                                                                                        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429847
                                                                                        • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429863
                                                                                        • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042988E
                                                                                        • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 004298AC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend
                                                                                        • String ID:
                                                                                        • API String ID: 3850602802-0
                                                                                        • Opcode ID: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                                                        • Instruction ID: c447c4a9eb68fcc7219df142ffdb21218ba7f26748626b58278b549ffff81a32
                                                                                        • Opcode Fuzzy Hash: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                                                        • Instruction Fuzzy Hash: 3321AF707507057AE710BB66CC82F5B76ACEB42708F94043EB541AB2D2DF78ED41825C
                                                                                        APIs
                                                                                        • GetSystemMetrics.USER32(0000000B), ref: 0041BBDA
                                                                                        • GetSystemMetrics.USER32(0000000C), ref: 0041BBE4
                                                                                        • 73A1A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC22
                                                                                        • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BD8D,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC69
                                                                                        • DeleteObject.GDI32(00000000), ref: 0041BCAA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: MetricsSystem$A26310A570DeleteObject
                                                                                        • String ID:
                                                                                        • API String ID: 4277397052-0
                                                                                        • Opcode ID: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                                                        • Instruction ID: d912de8c3c57523408de13a46bdb54385142bc6a2202aaac6113f7462e2bca5d
                                                                                        • Opcode Fuzzy Hash: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                                                        • Instruction Fuzzy Hash: CE314F74E00209EFDB04DFA5C941AAEB7F5EB48700F11856AF514AB381D7789E40DB98
                                                                                        APIs
                                                                                          • Part of subcall function 0045D3B0: SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738D5
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738EB
                                                                                        Strings
                                                                                        • Setting permissions on registry key: %s\%s, xrefs: 0047389A
                                                                                        • Could not set permissions on the registry key because it currently does not exist., xrefs: 004738DF
                                                                                        • Failed to set permissions on registry key (%d)., xrefs: 004738FC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                                        • API String ID: 1452528299-4018462623
                                                                                        • Opcode ID: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                                                        • Instruction ID: 0e56c8fb080e82cb73bff42131c1910bc7e2d1be1188aa0d4929b19add272574
                                                                                        • Opcode Fuzzy Hash: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                                                        • Instruction Fuzzy Hash: D42186B0A046485FCB00DFA9C8816EEBBE5DF49315F50817BE508E7392D7B85A05CB6A
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$AllocString
                                                                                        • String ID:
                                                                                        • API String ID: 262959230-0
                                                                                        • Opcode ID: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                                                        • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                                        • Opcode Fuzzy Hash: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                                                        • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                                        APIs
                                                                                        • 73A18830.GDI32(00000000,00000000,00000000), ref: 00414429
                                                                                        • 73A122A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414431
                                                                                        • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414445
                                                                                        • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0041444B
                                                                                        • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414456
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A122A18830$A480
                                                                                        • String ID:
                                                                                        • API String ID: 3325508737-0
                                                                                        • Opcode ID: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                                                        • Instruction ID: 307ee49d89b37f6f535ee678b6e17b633f9af621dfcf88cb872c79a1e2d754b8
                                                                                        • Opcode Fuzzy Hash: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                                                        • Instruction Fuzzy Hash: A901D47121C3406AD200B63D8C45B9F6BEC8FC6314F05546EF494D7382C97ACC018765
                                                                                        APIs
                                                                                        • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 0040700B
                                                                                        • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00407085
                                                                                        • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070DD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Enum$NameOpenResourceUniversal
                                                                                        • String ID: Z
                                                                                        • API String ID: 3604996873-1505515367
                                                                                        • Opcode ID: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                                                        • Instruction ID: 2ace50d644c075eff23e32fa5e1ddfe03b8fa53596be5d4ceb5675c655e146ae
                                                                                        • Opcode Fuzzy Hash: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                                                        • Instruction Fuzzy Hash: C0513070E04218ABDB15DF55CD41A9EBBB9FB49304F1041BAE910BB3D1C778AE418F5A
                                                                                        APIs
                                                                                        • SetRectEmpty.USER32(?), ref: 0044D05E
                                                                                        • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D089
                                                                                        • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D111
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: DrawText$EmptyRect
                                                                                        • String ID:
                                                                                        • API String ID: 182455014-2867612384
                                                                                        • Opcode ID: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                                                        • Instruction ID: 2c2bbb7fbf4b59eae95d31c7b28000ca71a9f0321ec4255fb332cd8a4a3f7a8e
                                                                                        • Opcode Fuzzy Hash: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                                                        • Instruction Fuzzy Hash: F6516071E00244AFDB10DFA5C885BDEBBF8AF49308F08847AE845EB255D778A945CB64
                                                                                        APIs
                                                                                        • 73A1A570.USER32(00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042EFAE
                                                                                          • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0042EFD1
                                                                                        • 73A1A480.USER32(00000000,?,0042F0BD,00000000,0042F0B6,?,00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000), ref: 0042F0B0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: A480A570CreateFontIndirectObjectSelect
                                                                                        • String ID: ...\
                                                                                        • API String ID: 2998766281-983595016
                                                                                        • Opcode ID: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                                                        • Instruction ID: 4ea51e63949933808241df29427b07dd96e06abf1a704ffa26f869fa6ec4a11f
                                                                                        • Opcode Fuzzy Hash: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                                                        • Instruction Fuzzy Hash: 2F315270B00128ABDF11EF96D841BAEB7B8EB48708FD1447BF410A7292D7785D49CA59
                                                                                        APIs
                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateFileHandle
                                                                                        • String ID: .tmp$_iu
                                                                                        • API String ID: 3498533004-10593223
                                                                                        • Opcode ID: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                                                        • Instruction ID: 4fa05f029f2566c48aedd37e5d2d112a05e3774389c58111587f2dbaaee79b9c
                                                                                        • Opcode Fuzzy Hash: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                                                        • Instruction Fuzzy Hash: 9531A6B0A40149ABCF01EF95C982B9EBBB5AF44345F50452AF800B72C2D6785F058AAD
                                                                                        APIs
                                                                                        • GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                                        • UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                                        • RegisterClassA.USER32(?), ref: 004164DE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Class$InfoRegisterUnregister
                                                                                        • String ID: @
                                                                                        • API String ID: 3749476976-2766056989
                                                                                        • Opcode ID: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                                                        • Instruction ID: 7ea39428e622c43f80c69b44bdb33f9ce6dea52ad5211df5dc1c1138561595a4
                                                                                        • Opcode Fuzzy Hash: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                                                        • Instruction Fuzzy Hash: 0E318E706042009BD760EF68C981B9B77E5AB88308F04457FF985DB392DB39D9848B6A
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNEL32(00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C50
                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C79
                                                                                        • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00497C92
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Attributes$Move
                                                                                        • String ID: isRS-%.3u.tmp
                                                                                        • API String ID: 3839737484-3657609586
                                                                                        • Opcode ID: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                                                        • Instruction ID: 213244b736f3eff521ec2db090c728ece63042f248bf50699bdf4cb02408e53f
                                                                                        • Opcode Fuzzy Hash: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                                                        • Instruction Fuzzy Hash: 53214171E14219AFCF05EFA9C881AAFBBB8AB44714F50453BB814B72D1D6385E018B69
                                                                                        APIs
                                                                                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                                        • ExitProcess.KERNEL32 ref: 00404E0D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExitMessageProcess
                                                                                        • String ID: Error$Runtime error at 00000000
                                                                                        • API String ID: 1220098344-2970929446
                                                                                        • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                                        • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                                                        • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                                        • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                                                        APIs
                                                                                          • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                                          • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                          • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                        • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456A88
                                                                                        • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456AB5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                                        • String ID: LoadTypeLib$RegisterTypeLib
                                                                                        • API String ID: 1312246647-2435364021
                                                                                        • Opcode ID: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                                                        • Instruction ID: 5567ca09ff2ddd9e87874ef4cfa4ab968baaa8f1c3db1669d027a8a21fc87fa6
                                                                                        • Opcode Fuzzy Hash: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                                                        • Instruction Fuzzy Hash: 20119331B00604AFDB11EFA6CD55A5EB7BDEB8A705B51C4B6BC04E3652DA389E04CB24
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00456FA6
                                                                                        • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00457043
                                                                                        Strings
                                                                                        • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00456FD2
                                                                                        • Failed to create DebugClientWnd, xrefs: 0045700C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend
                                                                                        • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                                        • API String ID: 3850602802-3720027226
                                                                                        • Opcode ID: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                                                        • Instruction ID: 61f5065308a022425a12d25e559eb7300ab1b4b0d104b50eccf394a1c4e119f6
                                                                                        • Opcode Fuzzy Hash: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                                                        • Instruction Fuzzy Hash: 921123706082509BD300AB689C82B5F7BD89B55719F45403BF9859B3C3D7798C08C7AE
                                                                                        APIs
                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000,00495E13), ref: 00495DDE
                                                                                        • CloseHandle.KERNEL32(x^I,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000), ref: 00495DF5
                                                                                          • Part of subcall function 00495CC8: GetLastError.KERNEL32(00000000,00495D60,?,?,?,?), ref: 00495CEC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateErrorHandleLastProcess
                                                                                        • String ID: D$x^I
                                                                                        • API String ID: 3798668922-903578107
                                                                                        • Opcode ID: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                                                        • Instruction ID: 0d7d1bccb2b79611993d32b5dcf50d38d0c3e5c5098d5d0063742a7482510134
                                                                                        • Opcode Fuzzy Hash: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                                                        • Instruction Fuzzy Hash: F201A1B1604648AFDF01EBA2DC42E9FBBACDF08704F60003AF904E72C1D6385E008A28
                                                                                        APIs
                                                                                          • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                        • GetFocus.USER32 ref: 00478673
                                                                                        • GetKeyState.USER32(0000007A), ref: 00478685
                                                                                        • WaitMessage.USER32(?,00000000,004786AC,?,00000000,004786D3,?,?,00000001,00000000,?,?,?,0047FED4,00000000,00480D8E), ref: 0047868F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: FocusMessageStateTextWaitWindow
                                                                                        • String ID: Wnd=$%x
                                                                                        • API String ID: 1381870634-2927251529
                                                                                        • Opcode ID: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                                                        • Instruction ID: ef44951ba698f020dd2967180cd2d6f5e0b89f016f08406409eb47c9a327eab3
                                                                                        • Opcode Fuzzy Hash: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                                                        • Instruction Fuzzy Hash: 2411A374644244BFC700EF65DD45A9E7BF8EB49714B5184BAF408E3691DB38AE00CA6E
                                                                                        APIs
                                                                                        • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E8C0
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E8CF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Time$File$LocalSystem
                                                                                        • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                                        • API String ID: 1748579591-1013271723
                                                                                        • Opcode ID: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                                                        • Instruction ID: 5dd70de3b3cbc2db986134396dd9c806d54cb2705fd1511918c86a199fc004ed
                                                                                        • Opcode Fuzzy Hash: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                                                        • Instruction Fuzzy Hash: 1711F8A440C3919AD340DF2AC44432BBBE4AF89704F44892EF9D8D6381E779C948DB77
                                                                                        APIs
                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F6F
                                                                                          • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00453F94
                                                                                          • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$AttributesDeleteErrorLastMove
                                                                                        • String ID: DeleteFile$MoveFile
                                                                                        • API String ID: 3024442154-139070271
                                                                                        • Opcode ID: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                                                        • Instruction ID: b42c41819cc20c1867e4fcb1ab4fb5766129ddbc0fc5112b2d6697d8e42203d6
                                                                                        • Opcode Fuzzy Hash: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                                                        • Instruction Fuzzy Hash: 49F062716041455AEB01FAA5D84266EA3ECDB8430BFA0403BB800BB6C3DA3C9E09493D
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483685
                                                                                        • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004836A8
                                                                                        Strings
                                                                                        • CSDVersion, xrefs: 0048367C
                                                                                        • System\CurrentControlSet\Control\Windows, xrefs: 00483652
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpenQueryValue
                                                                                        • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                                        • API String ID: 3677997916-1910633163
                                                                                        • Opcode ID: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                                                        • Instruction ID: 3c550b8be62ae6962ae8a8b2bb2136c6a1766c1456238aff6c9f059f5d92f743
                                                                                        • Opcode Fuzzy Hash: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                                                        • Instruction Fuzzy Hash: B1F06D75E00208B6DF20EED88C45BAFB3BCAF14B05F204566E910E7381F6789B448B59
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                                        • API String ID: 47109696-2631785700
                                                                                        • Opcode ID: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                                                        • Instruction ID: 5fc53f2980ca067f7fdefaa7aa50a153e5e830959166a8c5adde0da5508e813c
                                                                                        • Opcode Fuzzy Hash: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                                                        • Instruction Fuzzy Hash: 97F0AF35720150DBCB10EF5AE885B4E6298DB99396F50403BB985CB263C77CCC06CA99
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B46,00000000,00453BE9,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FD9,00000000), ref: 0042D91A
                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                                        • API String ID: 1646373207-4063490227
                                                                                        • Opcode ID: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                                                        • Instruction ID: 1097081faf8e12b72459453f22f39748745641366cc83a46a0cb0e3cd7246884
                                                                                        • Opcode Fuzzy Hash: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                                                        • Instruction Fuzzy Hash: 5FE04FE1B40B1112D71066BA5C82B6B158E4B84724F90443B3994E62C3DDBCD9885A5D
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAE0), ref: 0042EB72
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB78
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                                        • API String ID: 1646373207-260599015
                                                                                        • Opcode ID: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                                                        • Instruction ID: 186c8a8b24504359f9bd95d8817b94a00a7cf61d77d8ea7090d5fad6c77db3b3
                                                                                        • Opcode Fuzzy Hash: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                                                        • Instruction Fuzzy Hash: 1CD0C792312732666D10F1F73CD1DBB098C89116753544477F505E5241D55DDD01196D
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: NotifyWinEvent$user32.dll
                                                                                        • API String ID: 1646373207-597752486
                                                                                        • Opcode ID: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                                                        • Instruction ID: adaf68bc035e952e092e397114f6a1653fed54d9058db7208dfb757fc5d15743
                                                                                        • Opcode Fuzzy Hash: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                                                        • Instruction Fuzzy Hash: F7E012F4E417049DEF00BBF5BA86B1E3A90E764718B01417FF404A62A2DB7C440C8E5D
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                                        • API String ID: 1646373207-834958232
                                                                                        • Opcode ID: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                                                        • Instruction ID: 7eda4cb16e2cba450c320cc229382d7be1fc12bfd2fbc27455de3eb8489cf644
                                                                                        • Opcode Fuzzy Hash: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                                                        • Instruction Fuzzy Hash: 88B092C128174298AC7032FA0C02A1F08084882F28718083F3C48F50C2CD6ED804182D
                                                                                        APIs
                                                                                          • Part of subcall function 0044B668: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                                                          • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                                                        • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                                                        • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad
                                                                                        • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                        • API String ID: 2238633743-2683653824
                                                                                        • Opcode ID: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                                                        • Instruction ID: ef62b78e1ecbbf86accf82cc5e54c74759ffbda80f6f2c7107c350d82a6c33f4
                                                                                        • Opcode Fuzzy Hash: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                                                        • Instruction Fuzzy Hash: 48B092E06E2700A88E00B7FA2887B0B104895D0B1DB56063F704979092EB7C4008CD6E
                                                                                        APIs
                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,?,00000000,?,0047D70E), ref: 0047D484
                                                                                        • FindClose.KERNEL32(000000FF,0047D4AF,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,?,00000000,?,0047D70E,00000000), ref: 0047D4A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$CloseFileNext
                                                                                        • String ID:
                                                                                        • API String ID: 2066263336-0
                                                                                        • Opcode ID: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                                                        • Instruction ID: 2979fa4f850f67a6d1e6d53d287e6b8f4dfe67a5ddfa55c2aaa4ecb03bfc0e13
                                                                                        • Opcode Fuzzy Hash: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                                                        • Instruction Fuzzy Hash: CA812D70D0024DAFDF11DFA5CC55ADFBBB9EF49308F5080AAE808A7291D6399A46CF54
                                                                                        APIs
                                                                                          • Part of subcall function 0042EE40: GetTickCount.KERNEL32 ref: 0042EE46
                                                                                          • Part of subcall function 0042EC98: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECCD
                                                                                        • GetLastError.KERNEL32(00000000,00475991,?,?,0049C1D0,00000000), ref: 0047587A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CountErrorFileLastMoveTick
                                                                                        • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                                        • API String ID: 2406187244-2685451598
                                                                                        • Opcode ID: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                                                        • Instruction ID: 8ae0701305b01ce1bca9537847079d861391bf026d2cb8563746cd807755024f
                                                                                        • Opcode Fuzzy Hash: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                                                        • Instruction Fuzzy Hash: BB4166B0A006098FDB10EFA5D882ADE77B5EF48314F60853BE514BB351D7789A058BA9
                                                                                        APIs
                                                                                        • GetDesktopWindow.USER32 ref: 00413D56
                                                                                        • GetDesktopWindow.USER32 ref: 00413E0E
                                                                                          • Part of subcall function 00418ED0: 6F59C6F0.COMCTL32(?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418EEC
                                                                                          • Part of subcall function 00418ED0: ShowCursor.USER32(00000001,?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418F09
                                                                                        • SetCursor.USER32(00000000,?,?,?,?,00413B03,00000000,00413B16), ref: 00413E4C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CursorDesktopWindow$Show
                                                                                        • String ID:
                                                                                        • API String ID: 2074268717-0
                                                                                        • Opcode ID: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                                                        • Instruction ID: 95de96b99ba854305cf3f6c98da1fc171ffd9c3687d173b50ed20deed18b133b
                                                                                        • Opcode Fuzzy Hash: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                                                        • Instruction Fuzzy Hash: 59411F75600250AFC710DF2AFA85B5677E1EB64319F15817BE404CB365DB38AD81CF98
                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A7D
                                                                                        • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AEC
                                                                                        • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B87
                                                                                        • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BC6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: LoadString$FileMessageModuleName
                                                                                        • String ID:
                                                                                        • API String ID: 704749118-0
                                                                                        • Opcode ID: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                                                        • Instruction ID: 11344639af0fa1b95b6fef638a25282c94d515b30ba3ed4b3402aedba36e13da
                                                                                        • Opcode Fuzzy Hash: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                                                        • Instruction Fuzzy Hash: 843133706083849ED330EA658945B9F77D89B85304F40483FF6C8D72D1DB79A9048B67
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E91D
                                                                                          • Part of subcall function 0044CF60: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF92
                                                                                        • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E9A1
                                                                                          • Part of subcall function 0042BBC4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBD8
                                                                                        • IsRectEmpty.USER32(?), ref: 0044E963
                                                                                        • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E986
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                                        • String ID:
                                                                                        • API String ID: 855768636-0
                                                                                        • Opcode ID: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                                                        • Instruction ID: 03991ef50c1cdc1947edd1d0bf9da16660927dd763c0b41cb42d654f0fd6bbd7
                                                                                        • Opcode Fuzzy Hash: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                                                        • Instruction Fuzzy Hash: 47113871B5030027E250AA7A9C86B5B76899B88748F14093FB546EB3C7EE7DDC09429D
                                                                                        APIs
                                                                                        • OffsetRect.USER32(?,?,00000000), ref: 00495358
                                                                                        • OffsetRect.USER32(?,00000000,?), ref: 00495373
                                                                                        • OffsetRect.USER32(?,?,00000000), ref: 0049538D
                                                                                        • OffsetRect.USER32(?,00000000,?), ref: 004953A8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: OffsetRect
                                                                                        • String ID:
                                                                                        • API String ID: 177026234-0
                                                                                        • Opcode ID: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                                                        • Instruction ID: af1c1dfc71d00ff4a9a929e8d6bf6bfabc08d13bc1b1844b1e7d273cf48c6b2a
                                                                                        • Opcode Fuzzy Hash: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                                                        • Instruction Fuzzy Hash: 94217CB6700701ABD700DE69CD85E5BB7DEEBC4344F24CA2AF954C7249D634ED0487A6
                                                                                        APIs
                                                                                        • GetCursorPos.USER32 ref: 00417270
                                                                                        • SetCursor.USER32(00000000), ref: 004172B3
                                                                                        • GetLastActivePopup.USER32(?), ref: 004172DD
                                                                                        • GetForegroundWindow.USER32(?), ref: 004172E4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                                        • String ID:
                                                                                        • API String ID: 1959210111-0
                                                                                        • Opcode ID: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                                                        • Instruction ID: a2974bbdd40a4ad71efed6c963999b1e78101043f5dd1c0306289f7dfca9f025
                                                                                        • Opcode Fuzzy Hash: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                                                        • Instruction Fuzzy Hash: 4321A1313082018BCB20AB69E985AE733B1EF44754B0545ABF854CB352D73CDC82CB89
                                                                                        APIs
                                                                                        • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00494FC1
                                                                                        • MulDiv.KERNEL32(50142444,00000008,?), ref: 00494FD5
                                                                                        • MulDiv.KERNEL32(F70577E8,00000008,?), ref: 00494FE9
                                                                                        • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00495007
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                        • Instruction ID: c81a7ae82503e1df060b9d2e8e6c822c04bb2cec442f3182d8fec1f0f0e8f71f
                                                                                        • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                        • Instruction Fuzzy Hash: 48112472604204ABCF50DE99C8C4D9B7BECEF4D320B1541A6F918DB246D674DD408BA4
                                                                                        APIs
                                                                                        • GetClassInfoA.USER32(00400000,0041F480,?), ref: 0041F4B1
                                                                                        • UnregisterClassA.USER32(0041F480,00400000), ref: 0041F4DA
                                                                                        • RegisterClassA.USER32(00499598), ref: 0041F4E4
                                                                                        • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F51F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                        • String ID:
                                                                                        • API String ID: 4025006896-0
                                                                                        • Opcode ID: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                                                        • Instruction ID: e8d232a05c88a2160d81946a52d6ac90de0a8bd7e5396313334bc6410d622602
                                                                                        • Opcode Fuzzy Hash: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                                                        • Instruction Fuzzy Hash: 7B011B722401047BDA10EB6DED81E9B3799D719314B11413BBA15E72A1D7369C154BAC
                                                                                        APIs
                                                                                        • WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                                                        • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                                                        • CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                                        • String ID:
                                                                                        • API String ID: 4071923889-0
                                                                                        • Opcode ID: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                                                        • Instruction ID: 44a5693fa59bfbe72ab063cfacecacb9b789a88f4d4f9747d0667cdf65a63c8e
                                                                                        • Opcode Fuzzy Hash: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                                                        • Instruction Fuzzy Hash: 7201F9716046087EEB20979E8C06F6B7BACDF44774F610167F904DB2C2C6785D40C668
                                                                                        APIs
                                                                                        • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D227
                                                                                        • LoadResource.KERNEL32(00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4,0000000A,REGDLL_EXE), ref: 0040D241
                                                                                        • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4), ref: 0040D25B
                                                                                        • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?), ref: 0040D265
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                        • String ID:
                                                                                        • API String ID: 3473537107-0
                                                                                        • Opcode ID: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                                                        • Instruction ID: 8b55825d53d46818f15098a3aa340eb6897fe62b828c159971ec5f2842f97e2f
                                                                                        • Opcode Fuzzy Hash: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                                                        • Instruction Fuzzy Hash: ADF062736046046F8704EE9DA881D5B77ECDE88364310017FF908EB246DA38DD018B78
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,0049B450,?,?,?,004018B4), ref: 00401566
                                                                                        • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,0049B450,?,?,?,004018B4), ref: 0040158B
                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,0049B450,?,?,?,004018B4), ref: 004015B1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$Alloc$Free
                                                                                        • String ID: $=l
                                                                                        • API String ID: 3668210933-4008268515
                                                                                        • Opcode ID: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                                                        • Instruction ID: ed10fda1d5a177d2a0c43996bc0be7fa2989f050302610c9045c0a13ae1d279a
                                                                                        • Opcode Fuzzy Hash: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                                                        • Instruction Fuzzy Hash: AFF0C8716403206AEB315A294C85F133AD4DBC5754F104075BE09FF3DAD6B8980082AC
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,00000000), ref: 004700ED
                                                                                        Strings
                                                                                        • Failed to set NTFS compression state (%d)., xrefs: 004700FE
                                                                                        • Setting NTFS compression on directory: %s, xrefs: 004700BB
                                                                                        • Unsetting NTFS compression on directory: %s, xrefs: 004700D3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                                        • API String ID: 1452528299-1392080489
                                                                                        • Opcode ID: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                                                        • Instruction ID: 8e5543267561a70d3fbbbef991b1365390ff1382f756d9cdf86c8bb39141f558
                                                                                        • Opcode Fuzzy Hash: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                                                        • Instruction Fuzzy Hash: C9011730E0928C96CF05D7ADA0412DDBBF4DF4D314F84C1AFA45DE7282DA790609879A
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,00000000), ref: 00470899
                                                                                        Strings
                                                                                        • Setting NTFS compression on file: %s, xrefs: 00470867
                                                                                        • Failed to set NTFS compression state (%d)., xrefs: 004708AA
                                                                                        • Unsetting NTFS compression on file: %s, xrefs: 0047087F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast
                                                                                        • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                                        • API String ID: 1452528299-3038984924
                                                                                        • Opcode ID: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                                                        • Instruction ID: 78fa65e16581c334b53b8e167e27839d8ecb3154876bc13dabe901d18edf2e93
                                                                                        • Opcode Fuzzy Hash: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                                                        • Instruction Fuzzy Hash: 5C01F430D092489ADB04A7E9A4412EDBBF49F09314F45C1ABA459E7282DAB9050947DB
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000,0045BB39), ref: 00455DC4
                                                                                        • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000), ref: 00455DCD
                                                                                        • RemoveFontResourceA.GDI32(00000000), ref: 00455DDA
                                                                                        • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455DEE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                                        • String ID:
                                                                                        • API String ID: 4283692357-0
                                                                                        • Opcode ID: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                                                        • Instruction ID: 88a6b2d0cd2ebf9d052afffcb5c4be27c29a8e8e48dcb03e602a07ae18d4e81c
                                                                                        • Opcode Fuzzy Hash: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                                                        • Instruction Fuzzy Hash: E3F05EB6B4470176EA10B6B69C8BF2B229C9F54745F10883BBA00EF2C3D97CDC04962D
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CountSleepTick
                                                                                        • String ID:
                                                                                        • API String ID: 2227064392-0
                                                                                        • Opcode ID: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                                                        • Instruction ID: e9c2c7e2fc271270d41d52dba3350464f1e42bdffd51bbfd166b1ef271046f5a
                                                                                        • Opcode Fuzzy Hash: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                                                        • Instruction Fuzzy Hash: 93E02B7130964845CA24B2BE28C37BF4A88CB8536AB14453FF08CD6242C42C4D05956E
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB,00000000), ref: 00478129
                                                                                        • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0047812F
                                                                                        • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478151
                                                                                        • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478162
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                        • String ID:
                                                                                        • API String ID: 215268677-0
                                                                                        • Opcode ID: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                                                        • Instruction ID: 3331d84468cd062744280f6e1aa24963878bc2b2d96e3aea022572b3ec77581d
                                                                                        • Opcode Fuzzy Hash: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                                                        • Instruction Fuzzy Hash: 70F030716843016BD600EAB5CC82E9B77DCEB44754F04893E7E98D72C1DA79DC08AB66
                                                                                        APIs
                                                                                        • GetLastActivePopup.USER32(?), ref: 0042425C
                                                                                        • IsWindowVisible.USER32(?), ref: 0042426D
                                                                                        • IsWindowEnabled.USER32(?), ref: 00424277
                                                                                        • SetForegroundWindow.USER32(?), ref: 00424281
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                                        • String ID:
                                                                                        • API String ID: 2280970139-0
                                                                                        • Opcode ID: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                                                        • Instruction ID: cc3e18b4355afb8de1117362fa5ee1cc3bb5bcb08e60588071b409dab7082488
                                                                                        • Opcode Fuzzy Hash: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                                                        • Instruction Fuzzy Hash: DBE08691B02571929E71FA671881A9F018CCD45BE434602A7FD04F7243DB1CCC0041BC
                                                                                        APIs
                                                                                        • GlobalHandle.KERNEL32 ref: 00406287
                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0040628E
                                                                                        • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 00406299
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Global$AllocHandleLockUnlock
                                                                                        • String ID:
                                                                                        • API String ID: 2167344118-0
                                                                                        • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                                        • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                                                                        • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                                        • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                                                                        APIs
                                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047B8D5,?,00000000,00000000,00000001,00000000,0047A301,?,00000000), ref: 0047A2C5
                                                                                        Strings
                                                                                        • Failed to parse "reg" constant, xrefs: 0047A2CC
                                                                                        • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A139
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close
                                                                                        • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                                        • API String ID: 3535843008-1938159461
                                                                                        • Opcode ID: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                                                        • Instruction ID: 3bf0094b3715a844c7fa4d69accdb7e726d223c3dcefaf8b2e4f531663087c06
                                                                                        • Opcode Fuzzy Hash: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                                                        • Instruction Fuzzy Hash: 5F814174E00149AFCB10DF95D881ADEBBF9EF48314F5081AAE814B7392D7389E05CB99
                                                                                        APIs
                                                                                        • GetForegroundWindow.USER32(00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483045
                                                                                        • SetActiveWindow.USER32(?,00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483057
                                                                                        Strings
                                                                                        • Will not restart Windows automatically., xrefs: 00483176
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ActiveForeground
                                                                                        • String ID: Will not restart Windows automatically.
                                                                                        • API String ID: 307657957-4169339592
                                                                                        • Opcode ID: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                                                        • Instruction ID: df9a9ae9a8219d8b6a1298420550b74bcee7fa449f44545fa147fc9774bd32fa
                                                                                        • Opcode Fuzzy Hash: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                                                        • Instruction Fuzzy Hash: A7413330208340AED710FFA4DC9AB6E3BA4DB15F05F1408B7E9404B3A2D6BD5A04DB1D
                                                                                        Strings
                                                                                        • Failed to proceed to next wizard page; aborting., xrefs: 0046CFCC
                                                                                        • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CFE0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                                        • API String ID: 0-1974262853
                                                                                        • Opcode ID: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                                                        • Instruction ID: 63d40b18a6e87dbc706e62a2b7ed59e25ea13cd94e581da409b3f01416405f56
                                                                                        • Opcode Fuzzy Hash: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                                                        • Instruction Fuzzy Hash: 9A319E30A08244DFD711EB99D989BA977F6EB05308F1500FBF0489B392D779AE40CB1A
                                                                                        APIs
                                                                                          • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                                        • RegCloseKey.ADVAPI32(?,00478E9A,?,?,00000001,00000000,00000000,00478EB5), ref: 00478E83
                                                                                        Strings
                                                                                        • %s\%s_is1, xrefs: 00478E2C
                                                                                        • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478E0E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseOpen
                                                                                        • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                        • API String ID: 47109696-1598650737
                                                                                        • Opcode ID: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                                                        • Instruction ID: 403b8390735a8e98fed73365c843d129082673b7d0193522817cb9849c55968d
                                                                                        • Opcode Fuzzy Hash: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                                                        • Instruction Fuzzy Hash: 79218470B40208AFDB01DFAACC55A9EBBE8EB48304F90847EE904E7381DB785D018A59
                                                                                        APIs
                                                                                        • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501E9
                                                                                        • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045021A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExecuteMessageSendShell
                                                                                        • String ID: open
                                                                                        • API String ID: 812272486-2758837156
                                                                                        • Opcode ID: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                                                        • Instruction ID: 6e2feb9b457cb976a84d54f3b3258ed3b08e14d6ba220cef3ebd8abcd6e201e4
                                                                                        • Opcode Fuzzy Hash: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                                                        • Instruction Fuzzy Hash: 62219474E40208AFDB00DFA5C886B9EB7F8EB44705F2081BAB514E7282D7789E05CB58
                                                                                        APIs
                                                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 00455318
                                                                                        • GetLastError.KERNEL32(0000003C,00000000,00455361,?,?,00000001,00000001), ref: 00455329
                                                                                          • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: DirectoryErrorExecuteLastShellSystem
                                                                                        • String ID: <
                                                                                        • API String ID: 893404051-4251816714
                                                                                        • Opcode ID: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                                                        • Instruction ID: ea799879bbb6ab716a70283d096866571a468ac1fa4b8cc73728b10af3e72d10
                                                                                        • Opcode Fuzzy Hash: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                                                        • Instruction Fuzzy Hash: 02215370A00609ABDB10DFA5D8926AE7BF8AF18355F50443AFC44E7281D7789949CB58
                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                                                        • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                                                          • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02194B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                          • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02194B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                          • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02194B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                          • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02194B20,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                                        • String ID: )
                                                                                        • API String ID: 2227675388-1084416617
                                                                                        • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                                        • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                                                        • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                                        • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                                                        APIs
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496539
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window
                                                                                        • String ID: /INITPROCWND=$%x $@
                                                                                        • API String ID: 2353593579-4169826103
                                                                                        • Opcode ID: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                                                        • Instruction ID: 8ac61a852f64af84e8a4d996ffe215da0ea6a1f7c0dd4c2642a2787a2d41e8fe
                                                                                        • Opcode Fuzzy Hash: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                                                        • Instruction Fuzzy Hash: C711A531A043089FDB01DF64E855BAE7BE8EB48324F52847BE404E7281DB3CE905CA58
                                                                                        APIs
                                                                                          • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                          • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                        • SysFreeString.OLEAUT32(?), ref: 004474D6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: String$AllocByteCharFreeMultiWide
                                                                                        • String ID: NIL Interface Exception$Unknown Method
                                                                                        • API String ID: 3952431833-1023667238
                                                                                        • Opcode ID: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                                                        • Instruction ID: aafd2560cbf8ba646f5ae6954b41d26adab4393ec7197c17a1bba45f9511721b
                                                                                        • Opcode Fuzzy Hash: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                                                        • Instruction Fuzzy Hash: 0811D6306042049FEB10DFA59D42A6EBBACEB49704F91403AF504E7681C7789D01CB69
                                                                                        APIs
                                                                                        • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD88
                                                                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDC8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value$EnumQuery
                                                                                        • String ID: Inno Setup: No Icons
                                                                                        • API String ID: 1576479698-2016326496
                                                                                        • Opcode ID: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                                                        • Instruction ID: 05ef73584c9e0c756a5fead926ccd29af3c260b6948a855c27afe474e1c18ecb
                                                                                        • Opcode Fuzzy Hash: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                                                        • Instruction Fuzzy Hash: B2012B36F5A77179F73046256D02BBB56888B82B60F68453BF940EA2C0D6589C04C36E
                                                                                        APIs
                                                                                          • Part of subcall function 004555D0: GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                                                          • Part of subcall function 004555D0: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                                                        • SetForegroundWindow.USER32(?), ref: 00497266
                                                                                        Strings
                                                                                        • Restarting Windows., xrefs: 00497243
                                                                                        • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00497291
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CurrentForegroundOpenTokenWindow
                                                                                        • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                                                        • API String ID: 3179053593-4147564754
                                                                                        • Opcode ID: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                                                        • Instruction ID: f042dff5c045186d33be5417afa4f05d679b9763972d2bb00463d131ea403ed4
                                                                                        • Opcode Fuzzy Hash: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                                                        • Instruction Fuzzy Hash: FD01D8706282406BEB00EB65E981B9C3F99AB5430CF5040BBF900A72D3D73C9945871D
                                                                                        APIs
                                                                                          • Part of subcall function 0047CD84: FreeLibrary.KERNEL32(6F9D0000,004814B7), ref: 0047CD9A
                                                                                          • Part of subcall function 0047CA54: GetTickCount.KERNEL32 ref: 0047CA9E
                                                                                          • Part of subcall function 004570CC: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004570EB
                                                                                        • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049832B), ref: 00497A29
                                                                                        • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049832B), ref: 00497A2F
                                                                                        Strings
                                                                                        • Detected restart. Removing temporary directory., xrefs: 004979E3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                                        • String ID: Detected restart. Removing temporary directory.
                                                                                        • API String ID: 1717587489-3199836293
                                                                                        • Opcode ID: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                                                        • Instruction ID: 93f06bea8fcfa1b224d7ac257058da4e76460d04d1e35911cc499d3d1c0dfa98
                                                                                        • Opcode Fuzzy Hash: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                                                        • Instruction Fuzzy Hash: 51E0553120C3002EDA02B7B2BC52A2F7F8CD701728311083BF40882452C43D1810C77D
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(00000000,00498586), ref: 0040334B
                                                                                        • GetCommandLineA.KERNEL32(00000000,00498586), ref: 00403356
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: CommandHandleLineModule
                                                                                        • String ID: H6j
                                                                                        • API String ID: 2123368496-2779978841
                                                                                        • Opcode ID: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                                                                                        • Instruction ID: ff8fa06d391bd0b31f892a344b3e95d40f530220570fde7b1ba7fad45aeb04f1
                                                                                        • Opcode Fuzzy Hash: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                                                                                        • Instruction Fuzzy Hash: 45C002609013058AD754AF7579467162A94D751349F80447FF114BA3E1D77C82055BDD
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000001.00000002.2956258815.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000001.00000002.2956229366.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956336088.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956361990.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956395020.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                        • Associated: 00000001.00000002.2956422324.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_1_2_400000_iv2Mm5SEJF.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastSleep
                                                                                        • String ID:
                                                                                        • API String ID: 1458359878-0
                                                                                        • Opcode ID: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                                                        • Instruction ID: a2606c7dd4c17da0a3c90c20a229de96912268129783a4208f21052e6a4fbdd3
                                                                                        • Opcode Fuzzy Hash: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                                                        • Instruction Fuzzy Hash: 62F02436B01D64578F20A59E998193F63DDEA94376750013BFC0CDB303D438CC098AA9

                                                                                        Execution Graph

                                                                                        Execution Coverage:9.3%
                                                                                        Dynamic/Decrypted Code Coverage:83.7%
                                                                                        Signature Coverage:4%
                                                                                        Total number of Nodes:2000
                                                                                        Total number of Limit Nodes:46
                                                                                        execution_graph 18460 402780 RegOpenKeyExA 18461 40d3f1 18460->18461 18462 402142 18463 402147 18462->18463 18464 40db3d CreateDirectoryA 18463->18464 18936 2c1f8a3 CreateFileA 18937 2c1f99f 18936->18937 18942 2c1f8d4 18936->18942 18938 2c1f8ec DeviceIoControl 18938->18942 18939 2c1f995 CloseHandle 18939->18937 18940 2c1f961 GetLastError 18940->18939 18940->18942 18942->18938 18942->18939 18942->18940 18943 2c23b4c 18942->18943 18945 2c23b54 18943->18945 18944 2c22fac _malloc 59 API calls 18944->18945 18945->18944 18946 2c23b6e 18945->18946 18947 2c28204 __calloc_impl RtlDecodePointer 18945->18947 18948 2c23b72 std::exception::exception 18945->18948 18946->18942 18947->18945 18951 2c2455a 18948->18951 18950 2c23b9c 18953 2c24579 RaiseException 18951->18953 18953->18950 18954 2c1f9a7 LoadLibraryA 18955 2c1f9d0 GetProcAddress 18954->18955 18956 2c1fa8a 18954->18956 18957 2c1fa83 FreeLibrary 18955->18957 18959 2c1f9e4 18955->18959 18957->18956 18958 2c1f9f6 GetAdaptersInfo 18958->18959 18959->18958 18960 2c1fa7e 18959->18960 18961 2c23b4c _Allocate 60 API calls 18959->18961 18960->18957 18961->18959 18962 4021a6 18963 4021ab 18962->18963 18964 402880 Sleep 18963->18964 18965 40d65f 18964->18965 18465 40d647 18467 402727 18465->18467 18466 40d946 LoadLibraryExA 18466->18467 18467->18466 18468 40da3b 18467->18468 18966 402869 OpenSCManagerA 18967 40287a 18966->18967 18968 40d369 Sleep 18969 40d939 18968->18969 18970 4027a9 RegQueryValueExA 18971 40d407 18970->18971 18973 40d3f1 18970->18973 18972 40263c RegCloseKey 18971->18972 18971->18973 18974 40db4e 18972->18974 18469 2c1648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 18548 2c142c7 18469->18548 18975 2c172ab InternetOpenA 18976 2c172c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 18975->18976 18994 2c166f4 shared_ptr __recalloc 18975->18994 18983 2c17342 __recalloc 18976->18983 18977 2c17322 InternetOpenUrlA 18978 2c17382 InternetCloseHandle 18977->18978 18977->18983 18978->18994 18979 2c16708 Sleep 18980 2c1670e RtlEnterCriticalSection RtlLeaveCriticalSection 18979->18980 18980->18994 18981 2c17346 InternetReadFile 18982 2c17377 InternetCloseHandle 18981->18982 18981->18983 18982->18978 18983->18977 18983->18981 18984 2c173e9 RtlEnterCriticalSection RtlLeaveCriticalSection 19086 2c2233c 18984->19086 18986 2c22fac _malloc 59 API calls 18987 2c1749d RtlEnterCriticalSection RtlLeaveCriticalSection 18986->18987 18987->18994 18988 2c1776a RtlEnterCriticalSection RtlLeaveCriticalSection 18988->18994 18990 2c22fac 59 API calls _malloc 18990->18994 18993 2c178e2 RtlEnterCriticalSection 18993->18994 18995 2c1790f RtlLeaveCriticalSection 18993->18995 18994->18975 18994->18979 18994->18980 18994->18984 18994->18986 18994->18988 18994->18990 18994->18993 18994->18995 18998 2c2233c 66 API calls 18994->18998 19001 2c1a725 73 API calls 18994->19001 19003 2c22f74 59 API calls _free 18994->19003 19005 2c23b4c _Allocate 60 API calls 18994->19005 19010 2c235e6 60 API calls _strtok 18994->19010 19014 2c176e7 shared_ptr 18994->19014 19015 2c176ec Sleep 18994->19015 19018 2c15119 18994->19018 19047 2c1ac0f 18994->19047 19057 2c161f5 18994->19057 19060 2c1833b 18994->19060 19066 2c1d117 18994->19066 19071 2c183ea 18994->19071 19079 2c133b2 18994->19079 19096 2c22850 18994->19096 19099 2c19737 18994->19099 19106 2c1a84f 18994->19106 19114 2c14100 18994->19114 19118 2c22418 18994->19118 19127 2c11ba7 18994->19127 19143 2c13d7e 18994->19143 19150 2c19003 18994->19150 19157 2c1534d 18994->19157 19136 2c13c67 18995->19136 18998->18994 19001->18994 19003->18994 19005->18994 19010->18994 19014->19015 19110 2c218f0 19015->19110 19019 2c15123 __EH_prolog 19018->19019 19167 2c20b10 19019->19167 19022 2c13c67 72 API calls 19023 2c1514a 19022->19023 19024 2c13d7e 64 API calls 19023->19024 19025 2c15158 19024->19025 19026 2c1833b 89 API calls 19025->19026 19027 2c1516c 19026->19027 19028 2c15322 shared_ptr 19027->19028 19171 2c1a725 19027->19171 19028->18994 19031 2c151c4 19034 2c1a725 73 API calls 19031->19034 19032 2c151f6 19033 2c1a725 73 API calls 19032->19033 19036 2c15207 19033->19036 19035 2c151d4 19034->19035 19035->19028 19038 2c1a725 73 API calls 19035->19038 19036->19028 19037 2c1a725 73 API calls 19036->19037 19039 2c1524a 19037->19039 19040 2c152b4 19038->19040 19039->19028 19041 2c1a725 73 API calls 19039->19041 19040->19028 19042 2c1a725 73 API calls 19040->19042 19041->19035 19043 2c152da 19042->19043 19043->19028 19044 2c1a725 73 API calls 19043->19044 19045 2c15304 19044->19045 19176 2c1ced9 19045->19176 19048 2c1ac19 __EH_prolog 19047->19048 19227 2c1d0ee 19048->19227 19050 2c1ac3a shared_ptr 19230 2c220f0 19050->19230 19052 2c1ac51 19053 2c1ac67 19052->19053 19236 2c13fb0 19052->19236 19053->18994 19058 2c22fac _malloc 59 API calls 19057->19058 19059 2c16208 19058->19059 19061 2c18353 19060->19061 19062 2c18374 19060->19062 19977 2c195fd 19061->19977 19065 2c18399 19062->19065 19980 2c12ac7 19062->19980 19065->18994 19067 2c20b10 Mailbox 68 API calls 19066->19067 19070 2c1d12d 19067->19070 19068 2c1d21b 19068->18994 19069 2c12db5 73 API calls 19069->19070 19070->19068 19070->19069 19072 2c18405 WSASetLastError shutdown 19071->19072 19073 2c183f5 19071->19073 19075 2c1a509 69 API calls 19072->19075 19074 2c20b10 Mailbox 68 API calls 19073->19074 19076 2c183fa 19074->19076 19077 2c18422 19075->19077 19076->18994 19077->19076 19078 2c20b10 Mailbox 68 API calls 19077->19078 19078->19076 19080 2c133e1 19079->19080 19081 2c133c4 InterlockedCompareExchange 19079->19081 19083 2c129ee 76 API calls 19080->19083 19081->19080 19082 2c133d6 19081->19082 20074 2c132ab 19082->20074 19085 2c133f1 19083->19085 19085->18994 19087 2c2236b 19086->19087 19088 2c22348 19086->19088 20127 2c22383 19087->20127 19088->19087 19090 2c2234e 19088->19090 19092 2c25e5b __filbuf 59 API calls 19090->19092 19091 2c2237e 19091->18994 19093 2c22353 19092->19093 19094 2c24ef5 __filbuf 9 API calls 19093->19094 19095 2c2235e 19094->19095 19095->18994 20184 2c2286e 19096->20184 19098 2c22869 19098->18994 19100 2c19741 __EH_prolog 19099->19100 19101 2c11ba7 210 API calls 19100->19101 19102 2c19796 19101->19102 19103 2c197b3 RtlEnterCriticalSection 19102->19103 19104 2c197d1 RtlLeaveCriticalSection 19103->19104 19105 2c197ce 19103->19105 19104->18994 19105->19104 19107 2c1a859 __EH_prolog 19106->19107 20190 2c1e000 19107->20190 19109 2c1a877 shared_ptr 19109->18994 19111 2c21921 19110->19111 19112 2c218fd 19110->19112 19111->18994 19112->19111 19113 2c21911 GetProcessHeap HeapFree 19112->19113 19113->19111 19115 2c14112 19114->19115 19116 2c14118 19114->19116 20194 2c1a703 19115->20194 19116->18994 19119 2c22434 19118->19119 19120 2c22449 19118->19120 19121 2c25e5b __filbuf 59 API calls 19119->19121 19120->19119 19122 2c22450 19120->19122 19123 2c22439 19121->19123 19125 2c22444 19122->19125 20196 2c25f01 19122->20196 19124 2c24ef5 __filbuf 9 API calls 19123->19124 19124->19125 19125->18994 20397 2c353f0 19127->20397 19129 2c11bb1 RtlEnterCriticalSection 19130 2c11be9 RtlLeaveCriticalSection 19129->19130 19132 2c11bd1 19129->19132 20398 2c1e330 19130->20398 19132->19130 19133 2c11c55 RtlLeaveCriticalSection 19132->19133 19133->18994 19134 2c11c22 19134->19133 19137 2c20b10 Mailbox 68 API calls 19136->19137 19138 2c13c7e 19137->19138 20480 2c13ca2 19138->20480 19144 2c13d99 htons 19143->19144 19145 2c13dcb htons 19143->19145 20507 2c13bd3 19144->20507 20513 2c13c16 19145->20513 19149 2c13ded 19149->18994 19151 2c1900d __EH_prolog 19150->19151 20544 2c1373f 19151->20544 19153 2c19027 RtlEnterCriticalSection 19154 2c19036 RtlLeaveCriticalSection 19153->19154 19156 2c19070 19154->19156 19156->18994 19158 2c22fac _malloc 59 API calls 19157->19158 19159 2c15362 SHGetSpecialFolderPathA 19158->19159 19160 2c15378 19159->19160 20553 2c23771 19160->20553 19163 2c153e2 19163->18994 19165 2c153dc 20569 2c23a84 19165->20569 19168 2c1513d 19167->19168 19169 2c20b39 19167->19169 19168->19022 19170 2c233a4 __cinit 68 API calls 19169->19170 19170->19168 19172 2c20b10 Mailbox 68 API calls 19171->19172 19175 2c1a73f 19172->19175 19173 2c1519d 19173->19028 19173->19031 19173->19032 19175->19173 19181 2c12db5 19175->19181 19177 2c20b10 Mailbox 68 API calls 19176->19177 19178 2c1cef3 19177->19178 19179 2c1d002 19178->19179 19208 2c12b95 19178->19208 19179->19028 19182 2c12de4 19181->19182 19183 2c12dca 19181->19183 19185 2c12dfc 19182->19185 19186 2c12def 19182->19186 19184 2c20b10 Mailbox 68 API calls 19183->19184 19189 2c12dcf 19184->19189 19195 2c12d39 WSASetLastError WSASend 19185->19195 19188 2c20b10 Mailbox 68 API calls 19186->19188 19188->19189 19189->19175 19190 2c12e54 WSASetLastError select 19205 2c1a509 19190->19205 19191 2c20b10 68 API calls Mailbox 19193 2c12e0c 19191->19193 19193->19189 19193->19190 19193->19191 19194 2c12d39 71 API calls 19193->19194 19194->19193 19196 2c1a509 69 API calls 19195->19196 19197 2c12d6e 19196->19197 19198 2c12d75 19197->19198 19201 2c12d82 19197->19201 19199 2c20b10 Mailbox 68 API calls 19198->19199 19200 2c12d7a 19199->19200 19203 2c12d9c 19200->19203 19204 2c20b10 Mailbox 68 API calls 19200->19204 19201->19200 19202 2c20b10 Mailbox 68 API calls 19201->19202 19202->19200 19203->19193 19204->19203 19206 2c20b10 Mailbox 68 API calls 19205->19206 19207 2c1a515 WSAGetLastError 19206->19207 19207->19193 19209 2c12bb1 19208->19209 19210 2c12bc7 19208->19210 19211 2c20b10 Mailbox 68 API calls 19209->19211 19212 2c12bdf 19210->19212 19215 2c12bd2 19210->19215 19214 2c12bb6 19211->19214 19213 2c12be2 WSASetLastError WSARecv 19212->19213 19212->19214 19218 2c12d22 19212->19218 19220 2c12cbc WSASetLastError select 19212->19220 19222 2c20b10 68 API calls Mailbox 19212->19222 19216 2c1a509 69 API calls 19213->19216 19214->19178 19217 2c20b10 Mailbox 68 API calls 19215->19217 19216->19212 19217->19214 19223 2c11996 19218->19223 19221 2c1a509 69 API calls 19220->19221 19221->19212 19222->19212 19224 2c119bb 19223->19224 19225 2c1199f 19223->19225 19224->19214 19226 2c233a4 __cinit 68 API calls 19225->19226 19226->19224 19249 2c1e280 19227->19249 19229 2c1d100 19229->19050 19330 2c233b9 19230->19330 19233 2c22114 19233->19052 19234 2c2213d ResumeThread 19234->19052 19235 2c22136 CloseHandle 19235->19234 19237 2c20b10 Mailbox 68 API calls 19236->19237 19238 2c13fb8 19237->19238 19948 2c11815 19238->19948 19241 2c1a68b 19242 2c1a695 __EH_prolog 19241->19242 19954 2c1cc43 19242->19954 19247 2c2455a __CxxThrowException@8 RaiseException 19250 2c1e28a __EH_prolog 19249->19250 19255 2c14030 19250->19255 19254 2c1e2b8 19254->19229 19267 2c353f0 19255->19267 19257 2c1403a GetProcessHeap RtlAllocateHeap 19258 2c14053 std::exception::exception 19257->19258 19259 2c1407c 19257->19259 19268 2c1a6ca 19258->19268 19259->19254 19261 2c1408a 19259->19261 19262 2c14094 __EH_prolog 19261->19262 19312 2c1a2e9 19262->19312 19267->19257 19269 2c1a6d4 __EH_prolog 19268->19269 19276 2c1cc79 19269->19276 19274 2c2455a __CxxThrowException@8 RaiseException 19275 2c1a702 19274->19275 19282 2c1d7d9 19276->19282 19279 2c1cc93 19304 2c1d811 19279->19304 19281 2c1a6f1 19281->19274 19285 2c22513 19282->19285 19288 2c22541 19285->19288 19289 2c2254f 19288->19289 19292 2c1a6e3 19288->19292 19294 2c225d7 19289->19294 19292->19279 19295 2c225e0 19294->19295 19296 2c22554 19294->19296 19297 2c22f74 _free 59 API calls 19295->19297 19296->19292 19298 2c22599 19296->19298 19297->19296 19299 2c225a5 _strlen 19298->19299 19302 2c225ca 19298->19302 19300 2c22fac _malloc 59 API calls 19299->19300 19301 2c225b7 19300->19301 19301->19302 19303 2c26cbc __cftoe2_l 59 API calls 19301->19303 19302->19292 19303->19302 19305 2c1d81b __EH_prolog 19304->19305 19308 2c1b73c 19305->19308 19307 2c1d852 Mailbox 19307->19281 19309 2c1b746 __EH_prolog 19308->19309 19310 2c22513 std::exception::exception 59 API calls 19309->19310 19311 2c1b757 Mailbox 19310->19311 19311->19307 19323 2c1b100 19312->19323 19314 2c140c1 19315 2c13fdc 19314->19315 19329 2c353f0 19315->19329 19317 2c13fe6 CreateEventA 19318 2c13ffd 19317->19318 19319 2c1400f 19317->19319 19320 2c13fb0 Mailbox 68 API calls 19318->19320 19319->19254 19321 2c14005 19320->19321 19322 2c1a68b Mailbox 60 API calls 19321->19322 19322->19319 19324 2c1b10c 19323->19324 19326 2c1b11c std::exception::exception 19323->19326 19325 2c23b4c _Allocate 60 API calls 19324->19325 19324->19326 19325->19326 19326->19314 19327 2c2455a __CxxThrowException@8 RaiseException 19326->19327 19328 2c1fb31 19327->19328 19329->19317 19331 2c233c7 19330->19331 19332 2c233db 19330->19332 19333 2c25e5b __filbuf 59 API calls 19331->19333 19334 2c28a6d __calloc_crt 59 API calls 19332->19334 19335 2c233cc 19333->19335 19336 2c233e8 19334->19336 19337 2c24ef5 __filbuf 9 API calls 19335->19337 19338 2c23439 19336->19338 19349 2c25c5a 19336->19349 19343 2c2210b 19337->19343 19339 2c22f74 _free 59 API calls 19338->19339 19341 2c2343f 19339->19341 19341->19343 19354 2c25e3a 19341->19354 19343->19233 19343->19234 19343->19235 19344 2c25ce1 __initptd 59 API calls 19346 2c233fe CreateThread 19344->19346 19346->19343 19348 2c23431 GetLastError 19346->19348 19362 2c23519 19346->19362 19348->19338 19350 2c25c72 __getptd_noexit 59 API calls 19349->19350 19351 2c25c60 19350->19351 19352 2c28440 __amsg_exit 59 API calls 19351->19352 19353 2c233f5 19351->19353 19352->19353 19353->19344 19359 2c25e27 19354->19359 19356 2c25e43 __dosmaperr 19357 2c25e5b __filbuf 59 API calls 19356->19357 19358 2c25e56 19357->19358 19358->19343 19360 2c25c72 __getptd_noexit 59 API calls 19359->19360 19361 2c25e2c 19360->19361 19361->19356 19363 2c23522 __threadstartex@4 19362->19363 19364 2c291cb __CRT_INIT@12 TlsGetValue 19363->19364 19365 2c23528 19364->19365 19366 2c2355b 19365->19366 19367 2c2352f __threadstartex@4 19365->19367 19394 2c25aef 19366->19394 19369 2c291ea __CRT_INIT@12 TlsSetValue 19367->19369 19370 2c2353e 19369->19370 19371 2c23551 GetCurrentThreadId 19370->19371 19372 2c23544 GetLastError RtlExitUserThread 19370->19372 19373 2c23576 ___crtIsPackagedApp 19371->19373 19372->19371 19377 2c2358a 19373->19377 19378 2c234c1 19373->19378 19384 2c23452 19377->19384 19379 2c23503 RtlDecodePointer 19378->19379 19380 2c234ca LoadLibraryExW GetProcAddress 19378->19380 19383 2c23513 19379->19383 19381 2c234ec 19380->19381 19382 2c234ed RtlEncodePointer 19380->19382 19381->19377 19382->19379 19383->19377 19385 2c2345e ___lock_fhandle 19384->19385 19386 2c25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 19385->19386 19387 2c23463 19386->19387 19426 2c22160 19387->19426 19396 2c25afb ___lock_fhandle 19394->19396 19395 2c25b14 19399 2c25b23 19395->19399 19400 2c22f74 _free 59 API calls 19395->19400 19396->19395 19397 2c25c03 ___lock_fhandle 19396->19397 19398 2c22f74 _free 59 API calls 19396->19398 19397->19373 19398->19395 19401 2c25b32 19399->19401 19402 2c22f74 _free 59 API calls 19399->19402 19400->19399 19403 2c25b41 19401->19403 19404 2c22f74 _free 59 API calls 19401->19404 19402->19401 19405 2c22f74 _free 59 API calls 19403->19405 19407 2c25b50 19403->19407 19404->19403 19405->19407 19406 2c25b5f 19409 2c25b6e 19406->19409 19410 2c22f74 _free 59 API calls 19406->19410 19407->19406 19408 2c22f74 _free 59 API calls 19407->19408 19408->19406 19411 2c25b80 19409->19411 19412 2c22f74 _free 59 API calls 19409->19412 19410->19409 19413 2c288ee __lock 59 API calls 19411->19413 19412->19411 19417 2c25b88 19413->19417 19414 2c25bab 19694 2c25c0f 19414->19694 19417->19414 19418 2c22f74 _free 59 API calls 19417->19418 19418->19414 19419 2c288ee __lock 59 API calls 19424 2c25bbf ___removelocaleref 19419->19424 19420 2c25bf0 19727 2c25c1b 19420->19727 19424->19420 19697 2c24fc5 19424->19697 19444 2c21610 19426->19444 19429 2c221b0 19466 2c1ddb4 19429->19466 19430 2c221a8 TlsSetValue 19430->19429 19447 2c21674 19444->19447 19445 2c216f0 19446 2c21706 19445->19446 19449 2c21703 CloseHandle 19445->19449 19451 2c2454b __cftog_l 6 API calls 19446->19451 19447->19445 19448 2c2168c 19447->19448 19453 2c2179c WaitForSingleObject 19447->19453 19460 2c21770 CreateEventA 19447->19460 19462 2c21c10 GetCurrentProcessId 19447->19462 19464 2c2178e CloseHandle 19447->19464 19450 2c216ce ResetEvent 19448->19450 19454 2c216a5 OpenEventA 19448->19454 19482 2c21c10 19448->19482 19449->19446 19452 2c216d5 19450->19452 19455 2c2171e 19451->19455 19486 2c21850 19452->19486 19453->19447 19457 2c216c7 19454->19457 19458 2c216bf 19454->19458 19455->19429 19455->19430 19457->19450 19457->19452 19458->19457 19459 2c216c4 CloseHandle 19458->19459 19459->19457 19460->19447 19461 2c216a2 19461->19454 19462->19447 19464->19447 19467 2c1ddd6 19466->19467 19497 2c14d86 19467->19497 19496 2c20c70 19482->19496 19484 2c21c62 GetCurrentProcessId 19485 2c21c75 19484->19485 19485->19461 19491 2c2185f 19486->19491 19487 2c218b7 19488 2c218c3 SetEvent 19487->19488 19489 2c216ed 19487->19489 19488->19489 19489->19445 19490 2c21895 CreateEventA 19490->19487 19493 2c218ab 19490->19493 19491->19487 19491->19490 19492 2c21c10 GetCurrentProcessId 19491->19492 19494 2c21892 19492->19494 19493->19487 19495 2c218b0 CloseHandle 19493->19495 19494->19490 19495->19487 19496->19484 19730 2c28a58 RtlLeaveCriticalSection 19694->19730 19696 2c25bb8 19696->19419 19698 2c2503e 19697->19698 19699 2c24fda 19697->19699 19699->19698 19730->19696 19951 2c224d3 19948->19951 19952 2c22599 std::exception::_Copy_str 59 API calls 19951->19952 19953 2c1182a 19952->19953 19953->19241 19960 2c1d70a 19954->19960 19957 2c1cc5d 19969 2c1d742 19957->19969 19959 2c1a6b8 19959->19247 19963 2c1b22e 19960->19963 19964 2c1b238 __EH_prolog 19963->19964 19965 2c22513 std::exception::exception 59 API calls 19964->19965 19966 2c1b249 19965->19966 19967 2c17cfe std::bad_exception::bad_exception 60 API calls 19966->19967 19968 2c1a6aa 19967->19968 19968->19957 19970 2c1d74c __EH_prolog 19969->19970 19973 2c1b626 19970->19973 19972 2c1d783 Mailbox 19972->19959 19974 2c1b630 __EH_prolog 19973->19974 19975 2c1b22e std::bad_exception::bad_exception 60 API calls 19974->19975 19976 2c1b641 Mailbox 19975->19976 19976->19972 19998 2c1353e 19977->19998 19981 2c12ae8 WSASetLastError connect 19980->19981 19982 2c12ad8 19980->19982 19983 2c1a509 69 API calls 19981->19983 19984 2c20b10 Mailbox 68 API calls 19982->19984 19985 2c12b07 19983->19985 19986 2c12add 19984->19986 19985->19986 19987 2c20b10 Mailbox 68 API calls 19985->19987 19988 2c20b10 Mailbox 68 API calls 19986->19988 19987->19986 19990 2c12b1b 19988->19990 19989 2c12b38 19994 2c12b87 19989->19994 20058 2c13027 19989->20058 19990->19989 19992 2c20b10 Mailbox 68 API calls 19990->19992 19992->19989 19994->19065 19997 2c20b10 Mailbox 68 API calls 19997->19994 19999 2c13548 __EH_prolog 19998->19999 20000 2c13557 19999->20000 20001 2c13576 19999->20001 20002 2c11996 68 API calls 20000->20002 20020 2c12edd WSASetLastError WSASocketA 20001->20020 20017 2c1355f 20002->20017 20005 2c135ad CreateIoCompletionPort 20006 2c135c5 GetLastError 20005->20006 20007 2c135db 20005->20007 20009 2c20b10 Mailbox 68 API calls 20006->20009 20008 2c20b10 Mailbox 68 API calls 20007->20008 20010 2c135d2 20008->20010 20009->20010 20011 2c13626 20010->20011 20012 2c135ef 20010->20012 20046 2c1def3 20011->20046 20013 2c20b10 Mailbox 68 API calls 20012->20013 20014 2c13608 20013->20014 20028 2c129ee 20014->20028 20017->19062 20018 2c13659 20019 2c20b10 Mailbox 68 API calls 20018->20019 20019->20017 20021 2c20b10 Mailbox 68 API calls 20020->20021 20022 2c12f0a WSAGetLastError 20021->20022 20023 2c12f21 20022->20023 20027 2c12f41 20022->20027 20024 2c12f27 setsockopt 20023->20024 20025 2c12f3c 20023->20025 20024->20025 20026 2c20b10 Mailbox 68 API calls 20025->20026 20026->20027 20027->20005 20027->20017 20029 2c12aad 20028->20029 20030 2c12a0c 20028->20030 20032 2c20b10 Mailbox 68 API calls 20029->20032 20034 2c12ab8 20029->20034 20031 2c12a39 WSASetLastError closesocket 20030->20031 20036 2c20b10 Mailbox 68 API calls 20030->20036 20033 2c1a509 69 API calls 20031->20033 20032->20034 20035 2c12a51 20033->20035 20034->20017 20035->20029 20038 2c20b10 Mailbox 68 API calls 20035->20038 20037 2c12a21 20036->20037 20050 2c12f50 20037->20050 20040 2c12a5c 20038->20040 20042 2c12a7b ioctlsocket WSASetLastError closesocket 20040->20042 20043 2c20b10 Mailbox 68 API calls 20040->20043 20045 2c1a509 69 API calls 20042->20045 20044 2c12a6e 20043->20044 20044->20029 20044->20042 20045->20029 20047 2c1defd __EH_prolog 20046->20047 20048 2c23b4c _Allocate 60 API calls 20047->20048 20049 2c1df11 20048->20049 20049->20018 20051 2c12f70 WSASetLastError setsockopt 20050->20051 20052 2c12f5b 20050->20052 20054 2c1a509 69 API calls 20051->20054 20053 2c20b10 Mailbox 68 API calls 20052->20053 20055 2c12a36 20053->20055 20056 2c12f9e 20054->20056 20055->20031 20056->20055 20057 2c20b10 Mailbox 68 API calls 20056->20057 20057->20055 20059 2c1303b 20058->20059 20060 2c1304d WSASetLastError select 20058->20060 20061 2c20b10 Mailbox 68 API calls 20059->20061 20062 2c1a509 69 API calls 20060->20062 20065 2c12b59 20061->20065 20063 2c13095 20062->20063 20064 2c20b10 Mailbox 68 API calls 20063->20064 20063->20065 20064->20065 20065->19994 20066 2c12fb4 20065->20066 20067 2c12fc0 20066->20067 20068 2c12fd5 WSASetLastError getsockopt 20066->20068 20070 2c20b10 Mailbox 68 API calls 20067->20070 20069 2c1a509 69 API calls 20068->20069 20071 2c1300f 20069->20071 20073 2c12b7a 20070->20073 20072 2c20b10 Mailbox 68 API calls 20071->20072 20071->20073 20072->20073 20073->19994 20073->19997 20081 2c353f0 20074->20081 20076 2c132b5 RtlEnterCriticalSection 20077 2c20b10 Mailbox 68 API calls 20076->20077 20078 2c132d6 20077->20078 20082 2c13307 20078->20082 20081->20076 20083 2c13311 __EH_prolog 20082->20083 20085 2c13350 20083->20085 20094 2c17e82 20083->20094 20098 2c1239d 20085->20098 20088 2c13390 20104 2c17e2b 20088->20104 20090 2c20b10 Mailbox 68 API calls 20092 2c1337c 20090->20092 20093 2c12d39 71 API calls 20092->20093 20093->20088 20097 2c17e90 20094->20097 20095 2c17f06 20095->20083 20097->20095 20108 2c189e7 20097->20108 20101 2c123ab 20098->20101 20099 2c12417 20099->20088 20099->20090 20100 2c123c1 PostQueuedCompletionStatus 20100->20101 20102 2c123da RtlEnterCriticalSection 20100->20102 20101->20099 20101->20100 20103 2c123f8 InterlockedExchange RtlLeaveCriticalSection 20101->20103 20102->20101 20103->20101 20106 2c17e30 20104->20106 20105 2c132ee RtlLeaveCriticalSection 20105->19080 20106->20105 20124 2c11e7f 20106->20124 20109 2c18a11 20108->20109 20110 2c17e2b 68 API calls 20109->20110 20111 2c18a57 20110->20111 20112 2c18a7e 20111->20112 20114 2c1a274 20111->20114 20112->20095 20115 2c1a28e 20114->20115 20116 2c1a27e 20114->20116 20115->20112 20116->20115 20119 2c1fb32 20116->20119 20120 2c224d3 std::exception::exception 59 API calls 20119->20120 20121 2c1fb4a 20120->20121 20122 2c2455a __CxxThrowException@8 RaiseException 20121->20122 20123 2c1fb5f 20122->20123 20125 2c20b10 Mailbox 68 API calls 20124->20125 20126 2c11e90 20125->20126 20126->20106 20137 2c2227b 20127->20137 20130 2c223a5 20131 2c25e5b __filbuf 59 API calls 20130->20131 20132 2c223aa 20131->20132 20133 2c24ef5 __filbuf 9 API calls 20132->20133 20134 2c223b5 ___ascii_stricmp 20133->20134 20134->19091 20135 2c2597a 66 API calls __tolower_l 20136 2c223bc 20135->20136 20136->20134 20136->20135 20138 2c2228c 20137->20138 20144 2c222d9 20137->20144 20139 2c25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 20138->20139 20140 2c22292 20139->20140 20141 2c222b9 20140->20141 20145 2c251bf 20140->20145 20141->20144 20160 2c25541 20141->20160 20144->20130 20144->20136 20146 2c251cb ___lock_fhandle 20145->20146 20147 2c25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 20146->20147 20148 2c251d4 20147->20148 20149 2c25203 20148->20149 20151 2c251e7 20148->20151 20150 2c288ee __lock 59 API calls 20149->20150 20152 2c2520a 20150->20152 20153 2c25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 20151->20153 20172 2c2523f 20152->20172 20155 2c251ec 20153->20155 20158 2c251fa ___lock_fhandle 20155->20158 20159 2c28440 __amsg_exit 59 API calls 20155->20159 20158->20141 20159->20158 20161 2c2554d ___lock_fhandle 20160->20161 20162 2c25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 20161->20162 20163 2c25557 20162->20163 20164 2c288ee __lock 59 API calls 20163->20164 20165 2c25569 20163->20165 20170 2c25587 20164->20170 20166 2c25577 ___lock_fhandle 20165->20166 20168 2c28440 __amsg_exit 59 API calls 20165->20168 20166->20144 20167 2c255b4 20180 2c255de 20167->20180 20168->20166 20170->20167 20171 2c22f74 _free 59 API calls 20170->20171 20171->20167 20173 2c2524a ___addlocaleref ___removelocaleref 20172->20173 20175 2c2521e 20172->20175 20174 2c24fc5 ___freetlocinfo 59 API calls 20173->20174 20173->20175 20174->20175 20176 2c25236 20175->20176 20179 2c28a58 RtlLeaveCriticalSection 20176->20179 20178 2c2523d 20178->20155 20179->20178 20183 2c28a58 RtlLeaveCriticalSection 20180->20183 20182 2c255e5 20182->20165 20183->20182 20185 2c2288b 20184->20185 20186 2c25e5b __filbuf 59 API calls 20185->20186 20189 2c2289b _strlen 20185->20189 20187 2c22890 20186->20187 20188 2c24ef5 __filbuf 9 API calls 20187->20188 20188->20189 20189->19098 20191 2c1e00a __EH_prolog 20190->20191 20192 2c23b4c _Allocate 60 API calls 20191->20192 20193 2c1e021 20192->20193 20193->19109 20195 2c1a712 GetProcessHeap HeapFree 20194->20195 20195->19116 20217 2c29e31 20196->20217 20198 2c25f0f 20199 2c25f31 20198->20199 20200 2c25f1a 20198->20200 20202 2c25f36 20199->20202 20203 2c25f43 __flsbuf 20199->20203 20201 2c25e5b __filbuf 59 API calls 20200->20201 20210 2c25f1f 20201->20210 20204 2c25e5b __filbuf 59 API calls 20202->20204 20203->20210 20213 2c25f92 20203->20213 20216 2c25f9d 20203->20216 20224 2c2f7a2 20203->20224 20204->20210 20205 2c26021 20208 2c29e55 __write 79 API calls 20205->20208 20206 2c25fa7 20207 2c25fc1 20206->20207 20212 2c25fd8 20206->20212 20236 2c29e55 20207->20236 20208->20210 20210->19125 20212->20210 20264 2c2f7f6 20212->20264 20213->20216 20233 2c2f965 20213->20233 20216->20205 20216->20206 20218 2c29e50 20217->20218 20219 2c29e3b 20217->20219 20218->20198 20220 2c25e5b __filbuf 59 API calls 20219->20220 20221 2c29e40 20220->20221 20222 2c24ef5 __filbuf 9 API calls 20221->20222 20223 2c29e4b 20222->20223 20223->20198 20225 2c2f7ba 20224->20225 20226 2c2f7ad 20224->20226 20229 2c2f7c6 20225->20229 20230 2c25e5b __filbuf 59 API calls 20225->20230 20227 2c25e5b __filbuf 59 API calls 20226->20227 20228 2c2f7b2 20227->20228 20228->20213 20229->20213 20231 2c2f7e7 20230->20231 20232 2c24ef5 __filbuf 9 API calls 20231->20232 20232->20228 20234 2c28ab5 __malloc_crt 59 API calls 20233->20234 20235 2c2f97a 20234->20235 20235->20216 20237 2c29e61 ___lock_fhandle 20236->20237 20238 2c29e6e 20237->20238 20240 2c29e85 20237->20240 20241 2c25e27 __write_nolock 59 API calls 20238->20241 20239 2c29f24 20243 2c25e27 __write_nolock 59 API calls 20239->20243 20240->20239 20242 2c29e99 20240->20242 20244 2c29e73 20241->20244 20245 2c29ec1 20242->20245 20246 2c29eb7 20242->20246 20247 2c29ebc 20243->20247 20248 2c25e5b __filbuf 59 API calls 20244->20248 20289 2c30c87 20245->20289 20249 2c25e27 __write_nolock 59 API calls 20246->20249 20252 2c25e5b __filbuf 59 API calls 20247->20252 20259 2c29e7a ___lock_fhandle 20248->20259 20249->20247 20251 2c29ec7 20253 2c29eda 20251->20253 20254 2c29eed 20251->20254 20255 2c29f30 20252->20255 20298 2c29f44 20253->20298 20258 2c25e5b __filbuf 59 API calls 20254->20258 20257 2c24ef5 __filbuf 9 API calls 20255->20257 20257->20259 20261 2c29ef2 20258->20261 20259->20210 20260 2c29ee6 20357 2c29f1c 20260->20357 20262 2c25e27 __write_nolock 59 API calls 20261->20262 20262->20260 20265 2c2f802 ___lock_fhandle 20264->20265 20266 2c2f813 20265->20266 20267 2c2f82b 20265->20267 20269 2c25e27 __write_nolock 59 API calls 20266->20269 20268 2c2f8d0 20267->20268 20273 2c2f860 20267->20273 20271 2c25e27 __write_nolock 59 API calls 20268->20271 20270 2c2f818 20269->20270 20272 2c25e5b __filbuf 59 API calls 20270->20272 20274 2c2f8d5 20271->20274 20275 2c2f820 ___lock_fhandle 20272->20275 20276 2c30c87 ___lock_fhandle 60 API calls 20273->20276 20277 2c25e5b __filbuf 59 API calls 20274->20277 20275->20210 20278 2c2f866 20276->20278 20279 2c2f8dd 20277->20279 20280 2c2f894 20278->20280 20281 2c2f87c 20278->20281 20282 2c24ef5 __filbuf 9 API calls 20279->20282 20284 2c25e5b __filbuf 59 API calls 20280->20284 20283 2c2f8f2 __lseeki64_nolock 61 API calls 20281->20283 20282->20275 20285 2c2f88b 20283->20285 20286 2c2f899 20284->20286 20393 2c2f8c8 20285->20393 20287 2c25e27 __write_nolock 59 API calls 20286->20287 20287->20285 20290 2c30c93 ___lock_fhandle 20289->20290 20291 2c30ce2 RtlEnterCriticalSection 20290->20291 20292 2c288ee __lock 59 API calls 20290->20292 20294 2c30d08 ___lock_fhandle 20291->20294 20293 2c30cb8 20292->20293 20295 2c30cd0 20293->20295 20296 2c2920c ___lock_fhandle InitializeCriticalSectionAndSpinCount 20293->20296 20294->20251 20360 2c30d0c 20295->20360 20296->20295 20299 2c29f51 __write_nolock 20298->20299 20300 2c29f90 20299->20300 20301 2c29faf 20299->20301 20329 2c29f85 20299->20329 20303 2c25e27 __write_nolock 59 API calls 20300->20303 20304 2c2a007 20301->20304 20305 2c29feb 20301->20305 20302 2c2454b __cftog_l 6 API calls 20306 2c2a7a5 20302->20306 20307 2c29f95 20303->20307 20309 2c2a020 20304->20309 20364 2c2f8f2 20304->20364 20308 2c25e27 __write_nolock 59 API calls 20305->20308 20306->20260 20310 2c25e5b __filbuf 59 API calls 20307->20310 20314 2c29ff0 20308->20314 20313 2c2f7a2 __write_nolock 59 API calls 20309->20313 20312 2c29f9c 20310->20312 20315 2c24ef5 __filbuf 9 API calls 20312->20315 20316 2c2a02e 20313->20316 20317 2c25e5b __filbuf 59 API calls 20314->20317 20315->20329 20318 2c2a387 20316->20318 20323 2c25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 20316->20323 20319 2c29ff7 20317->20319 20320 2c2a3a5 20318->20320 20321 2c2a71a WriteFile 20318->20321 20322 2c24ef5 __filbuf 9 API calls 20319->20322 20324 2c2a4c9 20320->20324 20333 2c2a3bb 20320->20333 20325 2c2a37a GetLastError 20321->20325 20331 2c2a347 20321->20331 20322->20329 20326 2c2a05a GetConsoleMode 20323->20326 20335 2c2a4d4 20324->20335 20348 2c2a5be 20324->20348 20325->20331 20326->20318 20328 2c2a099 20326->20328 20327 2c2a753 20327->20329 20330 2c25e5b __filbuf 59 API calls 20327->20330 20328->20318 20332 2c2a0a9 GetConsoleCP 20328->20332 20329->20302 20336 2c2a781 20330->20336 20331->20327 20331->20329 20337 2c2a4a7 20331->20337 20332->20327 20355 2c2a0d8 20332->20355 20333->20327 20333->20331 20334 2c2a42a WriteFile 20333->20334 20334->20325 20334->20333 20335->20327 20335->20331 20338 2c2a539 WriteFile 20335->20338 20339 2c25e27 __write_nolock 59 API calls 20336->20339 20340 2c2a4b2 20337->20340 20341 2c2a74a 20337->20341 20338->20325 20338->20335 20339->20329 20343 2c25e5b __filbuf 59 API calls 20340->20343 20344 2c25e3a __dosmaperr 59 API calls 20341->20344 20342 2c2a633 WideCharToMultiByte 20342->20325 20342->20348 20346 2c2a4b7 20343->20346 20344->20329 20345 2c2a682 WriteFile 20345->20348 20349 2c2a6d5 GetLastError 20345->20349 20350 2c25e27 __write_nolock 59 API calls 20346->20350 20348->20327 20348->20331 20348->20342 20348->20345 20349->20348 20350->20329 20351 2c31053 WriteConsoleW CreateFileW __putwch_nolock 20351->20355 20352 2c3000a 61 API calls __write_nolock 20352->20355 20353 2c2a1c1 WideCharToMultiByte 20353->20331 20354 2c2a1fc WriteFile 20353->20354 20354->20325 20354->20355 20355->20325 20355->20331 20355->20351 20355->20352 20355->20353 20356 2c2a256 WriteFile 20355->20356 20373 2c2dd48 20355->20373 20356->20325 20356->20355 20392 2c3102d RtlLeaveCriticalSection 20357->20392 20359 2c29f22 20359->20259 20363 2c28a58 RtlLeaveCriticalSection 20360->20363 20362 2c30d13 20362->20291 20363->20362 20376 2c30f44 20364->20376 20366 2c2f902 20367 2c2f90a 20366->20367 20368 2c2f91b SetFilePointerEx 20366->20368 20369 2c25e5b __filbuf 59 API calls 20367->20369 20370 2c2f933 GetLastError 20368->20370 20371 2c2f90f 20368->20371 20369->20371 20372 2c25e3a __dosmaperr 59 API calls 20370->20372 20371->20309 20372->20371 20389 2c2dd0e 20373->20389 20377 2c30f64 20376->20377 20378 2c30f4f 20376->20378 20380 2c25e27 __write_nolock 59 API calls 20377->20380 20383 2c30f89 20377->20383 20379 2c25e27 __write_nolock 59 API calls 20378->20379 20381 2c30f54 20379->20381 20384 2c30f93 20380->20384 20382 2c25e5b __filbuf 59 API calls 20381->20382 20385 2c30f5c 20382->20385 20383->20366 20386 2c25e5b __filbuf 59 API calls 20384->20386 20385->20366 20387 2c30f9b 20386->20387 20388 2c24ef5 __filbuf 9 API calls 20387->20388 20388->20385 20390 2c2227b _LocaleUpdate::_LocaleUpdate 59 API calls 20389->20390 20391 2c2dd1f 20390->20391 20391->20355 20392->20359 20396 2c3102d RtlLeaveCriticalSection 20393->20396 20395 2c2f8ce 20395->20275 20396->20395 20397->19129 20399 2c1e33a __EH_prolog 20398->20399 20400 2c23b4c _Allocate 60 API calls 20399->20400 20401 2c1e343 20400->20401 20402 2c11bfa RtlEnterCriticalSection 20401->20402 20404 2c1e551 20401->20404 20402->19134 20405 2c1e55b __EH_prolog 20404->20405 20408 2c126db RtlEnterCriticalSection 20405->20408 20407 2c1e5b1 20407->20402 20409 2c12728 CreateWaitableTimerA 20408->20409 20410 2c1277e 20408->20410 20412 2c12738 GetLastError 20409->20412 20413 2c1275b SetWaitableTimer 20409->20413 20411 2c127d5 RtlLeaveCriticalSection 20410->20411 20414 2c23b4c _Allocate 60 API calls 20410->20414 20411->20407 20415 2c20b10 Mailbox 68 API calls 20412->20415 20413->20410 20416 2c1278a 20414->20416 20417 2c12745 20415->20417 20419 2c127c8 20416->20419 20420 2c23b4c _Allocate 60 API calls 20416->20420 20452 2c11712 20417->20452 20458 2c17e03 20419->20458 20422 2c127a9 20420->20422 20424 2c11cf8 CreateEventA 20422->20424 20425 2c11d23 GetLastError 20424->20425 20426 2c11d52 CreateEventA 20424->20426 20429 2c11d33 20425->20429 20427 2c11d6b GetLastError 20426->20427 20444 2c11d96 20426->20444 20432 2c11d7b 20427->20432 20428 2c233b9 __beginthreadex 201 API calls 20430 2c11db6 20428->20430 20431 2c20b10 Mailbox 68 API calls 20429->20431 20434 2c11dc6 GetLastError 20430->20434 20435 2c11e0d 20430->20435 20436 2c11d3c 20431->20436 20433 2c20b10 Mailbox 68 API calls 20432->20433 20437 2c11d84 20433->20437 20442 2c11dd8 20434->20442 20438 2c11e11 WaitForSingleObject CloseHandle 20435->20438 20439 2c11e1d 20435->20439 20440 2c11712 60 API calls 20436->20440 20441 2c11712 60 API calls 20437->20441 20438->20439 20439->20419 20443 2c11d4e 20440->20443 20441->20444 20445 2c11ddc CloseHandle 20442->20445 20446 2c11ddf 20442->20446 20443->20426 20444->20428 20445->20446 20447 2c11de9 CloseHandle 20446->20447 20448 2c11dee 20446->20448 20447->20448 20449 2c20b10 Mailbox 68 API calls 20448->20449 20450 2c11dfb 20449->20450 20451 2c11712 60 API calls 20450->20451 20451->20435 20453 2c1171c __EH_prolog 20452->20453 20454 2c1173e 20453->20454 20455 2c11815 Mailbox 59 API calls 20453->20455 20454->20413 20456 2c11732 20455->20456 20461 2c1a4a2 20456->20461 20459 2c17e1f 20458->20459 20460 2c17e10 CloseHandle 20458->20460 20459->20411 20460->20459 20462 2c1a4ac __EH_prolog 20461->20462 20469 2c1ca07 20462->20469 20466 2c1a4cd 20467 2c2455a __CxxThrowException@8 RaiseException 20466->20467 20468 2c1a4db 20467->20468 20470 2c1b22e std::bad_exception::bad_exception 60 API calls 20469->20470 20471 2c1a4bf 20470->20471 20472 2c1ca43 20471->20472 20473 2c1ca4d __EH_prolog 20472->20473 20476 2c1b1dd 20473->20476 20475 2c1ca7c Mailbox 20475->20466 20477 2c1b1e7 __EH_prolog 20476->20477 20478 2c1b22e std::bad_exception::bad_exception 60 API calls 20477->20478 20479 2c1b1f8 Mailbox 20478->20479 20479->20475 20491 2c130ae WSASetLastError 20480->20491 20483 2c130ae 71 API calls 20484 2c13c90 20483->20484 20485 2c116ae 20484->20485 20486 2c116b8 __EH_prolog 20485->20486 20487 2c11701 20486->20487 20488 2c224d3 std::exception::exception 59 API calls 20486->20488 20487->18994 20489 2c116dc 20488->20489 20490 2c1a4a2 60 API calls 20489->20490 20490->20487 20492 2c130ec WSAStringToAddressA 20491->20492 20493 2c130ce 20491->20493 20494 2c1a509 69 API calls 20492->20494 20493->20492 20495 2c130d3 20493->20495 20496 2c13114 20494->20496 20497 2c20b10 Mailbox 68 API calls 20495->20497 20500 2c13154 20496->20500 20502 2c1311e _memcmp 20496->20502 20498 2c130d8 20497->20498 20498->20483 20498->20484 20499 2c13135 20501 2c13193 20499->20501 20504 2c20b10 Mailbox 68 API calls 20499->20504 20500->20499 20503 2c20b10 Mailbox 68 API calls 20500->20503 20501->20498 20506 2c20b10 Mailbox 68 API calls 20501->20506 20502->20499 20505 2c20b10 Mailbox 68 API calls 20502->20505 20503->20499 20504->20501 20505->20499 20506->20498 20508 2c13bdd __EH_prolog 20507->20508 20509 2c13bfe htonl htonl 20508->20509 20519 2c224b7 20508->20519 20509->19149 20514 2c13c20 __EH_prolog 20513->20514 20515 2c13c41 20514->20515 20516 2c224b7 std::bad_exception::bad_exception 59 API calls 20514->20516 20515->19149 20517 2c13c35 20516->20517 20518 2c1a657 60 API calls 20517->20518 20518->20515 20520 2c224d3 std::exception::exception 59 API calls 20519->20520 20521 2c13bf2 20520->20521 20522 2c1a657 20521->20522 20523 2c1a661 __EH_prolog 20522->20523 20530 2c1cb7a 20523->20530 20527 2c1a67c 20528 2c2455a __CxxThrowException@8 RaiseException 20527->20528 20529 2c1a68a 20528->20529 20537 2c2249c 20530->20537 20533 2c1cbb6 20534 2c1cbc0 __EH_prolog 20533->20534 20540 2c1b54c 20534->20540 20536 2c1cbef Mailbox 20536->20527 20538 2c22513 std::exception::exception 59 API calls 20537->20538 20539 2c1a66e 20538->20539 20539->20533 20541 2c1b556 __EH_prolog 20540->20541 20542 2c2249c std::bad_exception::bad_exception 59 API calls 20541->20542 20543 2c1b567 Mailbox 20542->20543 20543->20536 20545 2c13770 20544->20545 20546 2c13755 InterlockedCompareExchange 20544->20546 20548 2c20b10 Mailbox 68 API calls 20545->20548 20546->20545 20547 2c13765 20546->20547 20549 2c132ab 78 API calls 20547->20549 20550 2c13779 20548->20550 20549->20545 20551 2c129ee 76 API calls 20550->20551 20552 2c1378e 20551->20552 20552->19153 20582 2c236ad 20553->20582 20555 2c153c8 20555->19163 20556 2c23906 20555->20556 20557 2c23912 ___lock_fhandle 20556->20557 20558 2c23930 20557->20558 20559 2c23948 20557->20559 20560 2c23940 ___lock_fhandle 20557->20560 20562 2c25e5b __filbuf 59 API calls 20558->20562 20724 2c297f2 20559->20724 20560->19165 20564 2c23935 20562->20564 20566 2c24ef5 __filbuf 9 API calls 20564->20566 20566->20560 20570 2c23a90 ___lock_fhandle 20569->20570 20571 2c23aa4 20570->20571 20572 2c23abc 20570->20572 20573 2c25e5b __filbuf 59 API calls 20571->20573 20574 2c297f2 __lock_file 60 API calls 20572->20574 20578 2c23ab4 ___lock_fhandle 20572->20578 20575 2c23aa9 20573->20575 20576 2c23ace 20574->20576 20577 2c24ef5 __filbuf 9 API calls 20575->20577 20751 2c23a18 20576->20751 20577->20578 20578->19163 20585 2c236b9 ___lock_fhandle 20582->20585 20583 2c236cb 20584 2c25e5b __filbuf 59 API calls 20583->20584 20586 2c236d0 20584->20586 20585->20583 20587 2c236f8 20585->20587 20588 2c24ef5 __filbuf 9 API calls 20586->20588 20601 2c298c8 20587->20601 20599 2c236db ___lock_fhandle @_EH4_CallFilterFunc@8 20588->20599 20590 2c236fd 20591 2c23713 20590->20591 20592 2c23706 20590->20592 20594 2c2373c 20591->20594 20595 2c2371c 20591->20595 20593 2c25e5b __filbuf 59 API calls 20592->20593 20593->20599 20616 2c299e7 20594->20616 20597 2c25e5b __filbuf 59 API calls 20595->20597 20597->20599 20599->20555 20602 2c298d4 ___lock_fhandle 20601->20602 20603 2c288ee __lock 59 API calls 20602->20603 20613 2c298e2 20603->20613 20604 2c29956 20646 2c299de 20604->20646 20605 2c2995d 20607 2c28ab5 __malloc_crt 59 API calls 20605->20607 20609 2c29964 20607->20609 20608 2c299d3 ___lock_fhandle 20608->20590 20609->20604 20611 2c2920c ___lock_fhandle InitializeCriticalSectionAndSpinCount 20609->20611 20614 2c2998a RtlEnterCriticalSection 20611->20614 20612 2c28976 __mtinitlocknum 59 API calls 20612->20613 20613->20604 20613->20605 20613->20612 20636 2c29831 20613->20636 20641 2c2989b 20613->20641 20614->20604 20617 2c29a04 20616->20617 20618 2c29a18 20617->20618 20632 2c29bbf 20617->20632 20651 2c3084e 20617->20651 20619 2c25e5b __filbuf 59 API calls 20618->20619 20620 2c29a1d 20619->20620 20621 2c24ef5 __filbuf 9 API calls 20620->20621 20623 2c23747 20621->20623 20622 2c29c1b 20657 2c30830 20622->20657 20633 2c23769 20623->20633 20629 2c3097d __openfile 59 API calls 20630 2c29bd7 20629->20630 20631 2c3097d __openfile 59 API calls 20630->20631 20630->20632 20631->20632 20632->20618 20632->20622 20717 2c29861 20633->20717 20635 2c2376f 20635->20599 20637 2c29852 RtlEnterCriticalSection 20636->20637 20638 2c2983c 20636->20638 20637->20613 20639 2c288ee __lock 59 API calls 20638->20639 20640 2c29845 20639->20640 20640->20613 20642 2c298a9 20641->20642 20643 2c298bc RtlLeaveCriticalSection 20641->20643 20649 2c28a58 RtlLeaveCriticalSection 20642->20649 20643->20613 20645 2c298b9 20645->20613 20650 2c28a58 RtlLeaveCriticalSection 20646->20650 20648 2c299e5 20648->20608 20649->20645 20650->20648 20660 2c30866 20651->20660 20653 2c29b85 20653->20618 20654 2c3097d 20653->20654 20668 2c30995 20654->20668 20656 2c29bb8 20656->20629 20656->20632 20675 2c30719 20657->20675 20659 2c30849 20659->20623 20661 2c3087b 20660->20661 20667 2c30874 20660->20667 20662 2c2227b _LocaleUpdate::_LocaleUpdate 59 API calls 20661->20662 20663 2c30888 20662->20663 20664 2c25e5b __filbuf 59 API calls 20663->20664 20663->20667 20665 2c308bb 20664->20665 20666 2c24ef5 __filbuf 9 API calls 20665->20666 20666->20667 20667->20653 20669 2c2227b _LocaleUpdate::_LocaleUpdate 59 API calls 20668->20669 20671 2c309a8 20669->20671 20670 2c309bd 20670->20656 20671->20670 20672 2c25e5b __filbuf 59 API calls 20671->20672 20673 2c309e9 20672->20673 20674 2c24ef5 __filbuf 9 API calls 20673->20674 20674->20670 20678 2c30725 ___lock_fhandle 20675->20678 20676 2c3073b 20677 2c25e5b __filbuf 59 API calls 20676->20677 20679 2c30740 20677->20679 20678->20676 20680 2c30771 20678->20680 20681 2c24ef5 __filbuf 9 API calls 20679->20681 20686 2c307e2 20680->20686 20685 2c3074a ___lock_fhandle 20681->20685 20685->20659 20695 2c28237 20686->20695 20688 2c3078d 20691 2c307b6 20688->20691 20689 2c307f6 20689->20688 20690 2c22f74 _free 59 API calls 20689->20690 20690->20688 20692 2c307e0 20691->20692 20693 2c307bc 20691->20693 20692->20685 20716 2c3102d RtlLeaveCriticalSection 20693->20716 20696 2c28244 20695->20696 20697 2c2825a 20695->20697 20698 2c25e5b __filbuf 59 API calls 20696->20698 20697->20696 20701 2c28261 ___crtIsPackagedApp 20697->20701 20699 2c28249 20698->20699 20700 2c24ef5 __filbuf 9 API calls 20699->20700 20709 2c28253 20700->20709 20702 2c28277 MultiByteToWideChar 20701->20702 20703 2c2826a AreFileApisANSI 20701->20703 20704 2c282a2 20702->20704 20705 2c28291 GetLastError 20702->20705 20703->20702 20706 2c28274 20703->20706 20708 2c28ab5 __malloc_crt 59 API calls 20704->20708 20707 2c25e3a __dosmaperr 59 API calls 20705->20707 20706->20702 20707->20709 20710 2c282aa 20708->20710 20709->20689 20710->20709 20711 2c282b1 MultiByteToWideChar 20710->20711 20711->20709 20712 2c282c7 GetLastError 20711->20712 20713 2c25e3a __dosmaperr 59 API calls 20712->20713 20714 2c282d3 20713->20714 20715 2c22f74 _free 59 API calls 20714->20715 20715->20709 20716->20692 20718 2c29870 20717->20718 20719 2c2988f RtlLeaveCriticalSection 20717->20719 20718->20719 20720 2c29877 20718->20720 20719->20635 20723 2c28a58 RtlLeaveCriticalSection 20720->20723 20722 2c2988c 20722->20635 20723->20722 20725 2c29802 20724->20725 20726 2c29824 RtlEnterCriticalSection 20724->20726 20725->20726 20727 2c2980a 20725->20727 20728 2c2394e 20726->20728 20729 2c288ee __lock 59 API calls 20727->20729 20730 2c237ad 20728->20730 20729->20728 20733 2c237bc 20730->20733 20737 2c237da 20730->20737 20731 2c237ca 20732 2c25e5b __filbuf 59 API calls 20731->20732 20734 2c237cf 20732->20734 20733->20731 20733->20737 20740 2c237f4 _memmove 20733->20740 20735 2c24ef5 __filbuf 9 API calls 20734->20735 20735->20737 20736 2c25f01 __flsbuf 79 API calls 20736->20740 20742 2c23980 20737->20742 20739 2c29e31 __filbuf 59 API calls 20739->20740 20740->20736 20740->20737 20740->20739 20741 2c29e55 __write 79 API calls 20740->20741 20745 2c2a7ef 20740->20745 20741->20740 20743 2c29861 __fsopen 2 API calls 20742->20743 20744 2c23986 20743->20744 20744->20560 20746 2c2a802 20745->20746 20750 2c2a826 20745->20750 20747 2c29e31 __filbuf 59 API calls 20746->20747 20746->20750 20748 2c2a81f 20747->20748 20749 2c29e55 __write 79 API calls 20748->20749 20749->20750 20750->20740 20752 2c23a27 20751->20752 20753 2c23a3b 20751->20753 20755 2c25e5b __filbuf 59 API calls 20752->20755 20754 2c23a37 20753->20754 20756 2c2a7ef __flush 79 API calls 20753->20756 20767 2c23af3 20754->20767 20757 2c23a2c 20755->20757 20759 2c23a47 20756->20759 20758 2c24ef5 __filbuf 9 API calls 20757->20758 20758->20754 20770 2c2b29b 20759->20770 20762 2c29e31 __filbuf 59 API calls 20763 2c23a55 20762->20763 20774 2c2b126 20763->20774 20765 2c23a5b 20765->20754 20766 2c22f74 _free 59 API calls 20765->20766 20766->20754 20768 2c29861 __fsopen 2 API calls 20767->20768 20769 2c23af9 20768->20769 20769->20578 20771 2c23a4f 20770->20771 20772 2c2b2a8 20770->20772 20771->20762 20772->20771 20773 2c22f74 _free 59 API calls 20772->20773 20773->20771 20775 2c2b132 ___lock_fhandle 20774->20775 20776 2c2b156 20775->20776 20777 2c2b13f 20775->20777 20778 2c2b1e1 20776->20778 20780 2c2b166 20776->20780 20779 2c25e27 __write_nolock 59 API calls 20777->20779 20781 2c25e27 __write_nolock 59 API calls 20778->20781 20782 2c2b144 20779->20782 20783 2c2b184 20780->20783 20784 2c2b18e 20780->20784 20785 2c2b189 20781->20785 20786 2c25e5b __filbuf 59 API calls 20782->20786 20787 2c25e27 __write_nolock 59 API calls 20783->20787 20788 2c30c87 ___lock_fhandle 60 API calls 20784->20788 20789 2c25e5b __filbuf 59 API calls 20785->20789 20794 2c2b14b ___lock_fhandle 20786->20794 20787->20785 20790 2c2b194 20788->20790 20791 2c2b1ed 20789->20791 20792 2c2b1b2 20790->20792 20793 2c2b1a7 20790->20793 20795 2c24ef5 __filbuf 9 API calls 20791->20795 20797 2c25e5b __filbuf 59 API calls 20792->20797 20800 2c2b201 20793->20800 20794->20765 20795->20794 20798 2c2b1ad 20797->20798 20815 2c2b1d9 20798->20815 20801 2c30f44 __chsize_nolock 59 API calls 20800->20801 20802 2c2b20f 20801->20802 20803 2c2b265 20802->20803 20805 2c30f44 __chsize_nolock 59 API calls 20802->20805 20814 2c2b243 20802->20814 20818 2c30ebe 20803->20818 20809 2c2b23a 20805->20809 20806 2c30f44 __chsize_nolock 59 API calls 20810 2c2b24f CloseHandle 20806->20810 20808 2c2b28f 20808->20798 20812 2c30f44 __chsize_nolock 59 API calls 20809->20812 20810->20803 20813 2c2b25b GetLastError 20810->20813 20811 2c25e3a __dosmaperr 59 API calls 20811->20808 20812->20814 20813->20803 20814->20803 20814->20806 20827 2c3102d RtlLeaveCriticalSection 20815->20827 20817 2c2b1df 20817->20794 20819 2c30f2a 20818->20819 20820 2c30eca 20818->20820 20821 2c25e5b __filbuf 59 API calls 20819->20821 20820->20819 20825 2c30ef3 20820->20825 20822 2c30f2f 20821->20822 20823 2c25e27 __write_nolock 59 API calls 20822->20823 20824 2c2b26d 20823->20824 20824->20808 20824->20811 20825->20824 20826 2c30f15 SetStdHandle 20825->20826 20826->20824 20827->20817 18549 2c1104d 18554 2c233a4 18549->18554 18560 2c232a8 18554->18560 18556 2c11057 18557 2c11aa9 InterlockedIncrement 18556->18557 18558 2c11ac5 WSAStartup InterlockedExchange 18557->18558 18559 2c1105c 18557->18559 18558->18559 18561 2c232b4 ___lock_fhandle 18560->18561 18568 2c28593 18561->18568 18567 2c232db ___lock_fhandle 18567->18556 18585 2c288ee 18568->18585 18570 2c232bd 18571 2c232ec RtlDecodePointer RtlDecodePointer 18570->18571 18572 2c232c9 18571->18572 18573 2c23319 18571->18573 18582 2c232e6 18572->18582 18573->18572 18884 2c2915d 18573->18884 18575 2c2337c RtlEncodePointer RtlEncodePointer 18575->18572 18576 2c2332b 18576->18575 18579 2c23350 18576->18579 18891 2c28afc 18576->18891 18578 2c28afc __realloc_crt 62 API calls 18581 2c23364 18578->18581 18579->18572 18579->18578 18580 2c2336a RtlEncodePointer 18579->18580 18580->18575 18581->18572 18581->18580 18918 2c2859c 18582->18918 18586 2c28912 RtlEnterCriticalSection 18585->18586 18587 2c288ff 18585->18587 18586->18570 18592 2c28976 18587->18592 18589 2c28905 18589->18586 18614 2c28440 18589->18614 18593 2c28982 ___lock_fhandle 18592->18593 18594 2c289a1 18593->18594 18621 2c286d4 18593->18621 18603 2c289c4 ___lock_fhandle 18594->18603 18668 2c28ab5 18594->18668 18600 2c28997 18665 2c2831d 18600->18665 18601 2c289ce 18604 2c288ee __lock 59 API calls 18601->18604 18602 2c289bf 18673 2c25e5b 18602->18673 18603->18589 18607 2c289d5 18604->18607 18608 2c289e2 18607->18608 18609 2c289fa 18607->18609 18676 2c2920c 18608->18676 18679 2c22f74 18609->18679 18612 2c289ee 18685 2c28a16 18612->18685 18615 2c286d4 __FF_MSGBANNER 59 API calls 18614->18615 18616 2c28448 18615->18616 18617 2c28731 __NMSG_WRITE 59 API calls 18616->18617 18618 2c28450 18617->18618 18854 2c284ef 18618->18854 18688 2c3017e 18621->18688 18623 2c286db 18624 2c3017e __NMSG_WRITE 59 API calls 18623->18624 18626 2c286e8 18623->18626 18624->18626 18625 2c28731 __NMSG_WRITE 59 API calls 18627 2c28700 18625->18627 18626->18625 18628 2c2870a 18626->18628 18629 2c28731 __NMSG_WRITE 59 API calls 18627->18629 18630 2c28731 18628->18630 18629->18628 18631 2c2874f __NMSG_WRITE 18630->18631 18633 2c3017e __NMSG_WRITE 55 API calls 18631->18633 18664 2c28876 18631->18664 18635 2c28762 18633->18635 18634 2c288df 18634->18600 18636 2c2887b GetStdHandle 18635->18636 18637 2c3017e __NMSG_WRITE 55 API calls 18635->18637 18640 2c28889 _strlen 18636->18640 18636->18664 18638 2c28773 18637->18638 18638->18636 18639 2c28785 18638->18639 18639->18664 18710 2c2f53d 18639->18710 18642 2c288c2 WriteFile 18640->18642 18640->18664 18642->18664 18644 2c287b2 GetModuleFileNameW 18646 2c287d2 18644->18646 18652 2c287e2 __NMSG_WRITE 18644->18652 18645 2c288e3 18647 2c24f05 __invoke_watson 8 API calls 18645->18647 18648 2c2f53d __NMSG_WRITE 55 API calls 18646->18648 18649 2c288ed 18647->18649 18648->18652 18650 2c28912 RtlEnterCriticalSection 18649->18650 18654 2c28976 __mtinitlocknum 55 API calls 18649->18654 18650->18600 18651 2c28828 18651->18645 18728 2c2f4d1 18651->18728 18652->18645 18652->18651 18719 2c2f5b2 18652->18719 18656 2c28905 18654->18656 18656->18650 18658 2c28440 __amsg_exit 55 API calls 18656->18658 18660 2c28911 18658->18660 18659 2c2f4d1 __NMSG_WRITE 55 API calls 18661 2c2885f 18659->18661 18660->18650 18661->18645 18662 2c28866 18661->18662 18737 2c301be RtlEncodePointer 18662->18737 18762 2c2454b 18664->18762 18777 2c282e9 GetModuleHandleExW 18665->18777 18672 2c28ac3 18668->18672 18670 2c289b8 18670->18601 18670->18602 18672->18670 18780 2c22fac 18672->18780 18797 2c29505 Sleep 18672->18797 18800 2c25c72 GetLastError 18673->18800 18675 2c25e60 18675->18603 18677 2c29229 InitializeCriticalSectionAndSpinCount 18676->18677 18678 2c2921c 18676->18678 18677->18612 18678->18612 18680 2c22f7d HeapFree 18679->18680 18684 2c22fa6 __dosmaperr 18679->18684 18681 2c22f92 18680->18681 18680->18684 18682 2c25e5b __filbuf 57 API calls 18681->18682 18683 2c22f98 GetLastError 18682->18683 18683->18684 18684->18612 18853 2c28a58 RtlLeaveCriticalSection 18685->18853 18687 2c28a1d 18687->18603 18689 2c30188 18688->18689 18690 2c25e5b __filbuf 59 API calls 18689->18690 18691 2c30192 18689->18691 18692 2c301ae 18690->18692 18691->18623 18695 2c24ef5 18692->18695 18698 2c24eca RtlDecodePointer 18695->18698 18699 2c24edd 18698->18699 18704 2c24f05 IsProcessorFeaturePresent 18699->18704 18702 2c24eca __filbuf 8 API calls 18703 2c24f01 18702->18703 18703->18623 18705 2c24f10 18704->18705 18706 2c24d98 __call_reportfault 7 API calls 18705->18706 18707 2c24f25 18706->18707 18708 2c29513 ___raise_securityfailure GetCurrentProcess TerminateProcess 18707->18708 18709 2c24ef4 18708->18709 18709->18702 18711 2c2f548 18710->18711 18713 2c2f556 18710->18713 18711->18713 18717 2c2f56f 18711->18717 18712 2c25e5b __filbuf 59 API calls 18714 2c2f560 18712->18714 18713->18712 18715 2c24ef5 __filbuf 9 API calls 18714->18715 18716 2c287a5 18715->18716 18716->18644 18716->18645 18717->18716 18718 2c25e5b __filbuf 59 API calls 18717->18718 18718->18714 18720 2c2f5c0 18719->18720 18722 2c2f5c9 18720->18722 18723 2c2f5c4 18720->18723 18726 2c2f603 18720->18726 18721 2c25e5b __filbuf 59 API calls 18724 2c2f5f4 18721->18724 18722->18651 18723->18721 18723->18722 18725 2c24ef5 __filbuf 9 API calls 18724->18725 18725->18722 18726->18722 18727 2c25e5b __filbuf 59 API calls 18726->18727 18727->18724 18729 2c2f4eb 18728->18729 18730 2c2f4dd 18728->18730 18731 2c25e5b __filbuf 59 API calls 18729->18731 18730->18729 18735 2c2f517 18730->18735 18732 2c2f4f5 18731->18732 18733 2c24ef5 __filbuf 9 API calls 18732->18733 18734 2c28848 18733->18734 18734->18645 18734->18659 18735->18734 18736 2c25e5b __filbuf 59 API calls 18735->18736 18736->18732 18738 2c301f2 ___crtIsPackagedApp 18737->18738 18739 2c302b1 IsDebuggerPresent 18738->18739 18740 2c30201 LoadLibraryExW 18738->18740 18743 2c302d6 18739->18743 18744 2c302bb 18739->18744 18741 2c30218 GetLastError 18740->18741 18742 2c3023e GetProcAddress 18740->18742 18747 2c30227 LoadLibraryExW 18741->18747 18752 2c302ce 18741->18752 18748 2c30252 7 API calls 18742->18748 18742->18752 18745 2c302c9 18743->18745 18746 2c302db RtlDecodePointer 18743->18746 18744->18745 18749 2c302c2 OutputDebugStringW 18744->18749 18745->18752 18756 2c30302 RtlDecodePointer RtlDecodePointer 18745->18756 18760 2c3031a 18745->18760 18746->18752 18747->18742 18747->18752 18750 2c3029a GetProcAddress RtlEncodePointer 18748->18750 18751 2c302ae 18748->18751 18749->18745 18750->18751 18751->18739 18755 2c2454b __cftog_l 6 API calls 18752->18755 18753 2c30352 RtlDecodePointer 18754 2c3033e RtlDecodePointer 18753->18754 18757 2c30359 18753->18757 18754->18752 18758 2c303a0 18755->18758 18756->18760 18757->18754 18761 2c3036a RtlDecodePointer 18757->18761 18758->18664 18760->18753 18760->18754 18761->18754 18763 2c24553 18762->18763 18764 2c24555 IsProcessorFeaturePresent 18762->18764 18763->18634 18766 2c2958f 18764->18766 18769 2c2953e IsDebuggerPresent 18766->18769 18770 2c29553 ___raise_securityfailure 18769->18770 18775 2c29528 SetUnhandledExceptionFilter UnhandledExceptionFilter 18770->18775 18772 2c2955b ___raise_securityfailure 18776 2c29513 GetCurrentProcess TerminateProcess 18772->18776 18774 2c29578 18774->18634 18775->18772 18776->18774 18778 2c28302 GetProcAddress 18777->18778 18779 2c28314 ExitProcess 18777->18779 18778->18779 18781 2c23027 18780->18781 18785 2c22fb8 18780->18785 18782 2c28204 __calloc_impl RtlDecodePointer 18781->18782 18783 2c2302d 18782->18783 18786 2c25e5b __filbuf 58 API calls 18783->18786 18784 2c286d4 __FF_MSGBANNER 58 API calls 18788 2c22fc3 18784->18788 18785->18788 18789 2c22feb RtlAllocateHeap 18785->18789 18791 2c23013 18785->18791 18795 2c23011 18785->18795 18798 2c28204 RtlDecodePointer 18785->18798 18787 2c2301f 18786->18787 18787->18672 18788->18784 18788->18785 18790 2c28731 __NMSG_WRITE 58 API calls 18788->18790 18794 2c2831d __mtinitlocknum 3 API calls 18788->18794 18789->18785 18789->18787 18790->18788 18793 2c25e5b __filbuf 58 API calls 18791->18793 18793->18795 18794->18788 18796 2c25e5b __filbuf 58 API calls 18795->18796 18796->18787 18797->18672 18799 2c28217 18798->18799 18799->18785 18814 2c291cb 18800->18814 18802 2c25c87 18803 2c25cd5 SetLastError 18802->18803 18817 2c28a6d 18802->18817 18803->18675 18807 2c25cae 18808 2c25cb4 18807->18808 18809 2c25ccc 18807->18809 18826 2c25ce1 18808->18826 18811 2c22f74 _free 56 API calls 18809->18811 18813 2c25cd2 18811->18813 18812 2c25cbc GetCurrentThreadId 18812->18803 18813->18803 18815 2c291e2 TlsGetValue 18814->18815 18816 2c291de 18814->18816 18815->18802 18816->18802 18819 2c28a74 18817->18819 18820 2c25c9a 18819->18820 18822 2c28a92 18819->18822 18836 2c304b8 18819->18836 18820->18803 18823 2c291ea 18820->18823 18822->18819 18822->18820 18844 2c29505 Sleep 18822->18844 18824 2c29200 18823->18824 18825 2c29204 TlsSetValue 18823->18825 18824->18807 18825->18807 18827 2c25ced ___lock_fhandle 18826->18827 18828 2c288ee __lock 59 API calls 18827->18828 18829 2c25d2a 18828->18829 18845 2c25d82 18829->18845 18832 2c288ee __lock 59 API calls 18833 2c25d4b ___addlocaleref 18832->18833 18848 2c25d8b 18833->18848 18835 2c25d76 ___lock_fhandle 18835->18812 18837 2c304c3 18836->18837 18841 2c304de 18836->18841 18838 2c304cf 18837->18838 18837->18841 18840 2c25e5b __filbuf 58 API calls 18838->18840 18839 2c304ee RtlAllocateHeap 18839->18841 18842 2c304d4 18839->18842 18840->18842 18841->18839 18841->18842 18843 2c28204 __calloc_impl RtlDecodePointer 18841->18843 18842->18819 18843->18841 18844->18822 18851 2c28a58 RtlLeaveCriticalSection 18845->18851 18847 2c25d44 18847->18832 18852 2c28a58 RtlLeaveCriticalSection 18848->18852 18850 2c25d92 18850->18835 18851->18847 18852->18850 18853->18687 18857 2c285a5 18854->18857 18856 2c2845b 18858 2c285b1 ___lock_fhandle 18857->18858 18859 2c288ee __lock 52 API calls 18858->18859 18860 2c285b8 18859->18860 18861 2c285e6 RtlDecodePointer 18860->18861 18863 2c28671 __cinit 18860->18863 18861->18863 18864 2c285fd RtlDecodePointer 18861->18864 18877 2c286bf 18863->18877 18870 2c2860d 18864->18870 18866 2c286ce ___lock_fhandle 18866->18856 18868 2c2861a RtlEncodePointer 18868->18870 18869 2c286b6 18871 2c286bf 18869->18871 18872 2c2831d __mtinitlocknum 3 API calls 18869->18872 18870->18863 18870->18868 18874 2c2862a RtlDecodePointer RtlEncodePointer 18870->18874 18873 2c286cc 18871->18873 18882 2c28a58 RtlLeaveCriticalSection 18871->18882 18872->18871 18873->18856 18876 2c2863c RtlDecodePointer RtlDecodePointer 18874->18876 18876->18870 18878 2c286c5 18877->18878 18879 2c2869f 18877->18879 18883 2c28a58 RtlLeaveCriticalSection 18878->18883 18879->18866 18881 2c28a58 RtlLeaveCriticalSection 18879->18881 18881->18869 18882->18873 18883->18879 18885 2c29166 18884->18885 18886 2c2917b RtlSizeHeap 18884->18886 18887 2c25e5b __filbuf 59 API calls 18885->18887 18886->18576 18888 2c2916b 18887->18888 18889 2c24ef5 __filbuf 9 API calls 18888->18889 18890 2c29176 18889->18890 18890->18576 18894 2c28b03 18891->18894 18893 2c28b40 18893->18579 18894->18893 18896 2c303a4 18894->18896 18917 2c29505 Sleep 18894->18917 18897 2c303b8 18896->18897 18898 2c303ad 18896->18898 18900 2c303c0 18897->18900 18908 2c303cd 18897->18908 18899 2c22fac _malloc 59 API calls 18898->18899 18901 2c303b5 18899->18901 18902 2c22f74 _free 59 API calls 18900->18902 18901->18894 18916 2c303c8 __dosmaperr 18902->18916 18903 2c30405 18905 2c28204 __calloc_impl RtlDecodePointer 18903->18905 18904 2c303d5 RtlReAllocateHeap 18904->18908 18904->18916 18906 2c3040b 18905->18906 18909 2c25e5b __filbuf 59 API calls 18906->18909 18907 2c30435 18911 2c25e5b __filbuf 59 API calls 18907->18911 18908->18903 18908->18904 18908->18907 18910 2c28204 __calloc_impl RtlDecodePointer 18908->18910 18913 2c3041d 18908->18913 18909->18916 18910->18908 18912 2c3043a GetLastError 18911->18912 18912->18916 18914 2c25e5b __filbuf 59 API calls 18913->18914 18915 2c30422 GetLastError 18914->18915 18915->18916 18916->18894 18917->18894 18921 2c28a58 RtlLeaveCriticalSection 18918->18921 18920 2c232eb 18920->18567 18921->18920 18922 40d00e RegSetValueExA 18923 40d414 RegCloseKey 18922->18923 18924 40d41a 18923->18924 18924->18924 18925 2c29752 18926 2c2975f 18925->18926 18927 2c28a6d __calloc_crt 59 API calls 18926->18927 18928 2c29779 18927->18928 18929 2c29792 18928->18929 18930 2c28a6d __calloc_crt 59 API calls 18928->18930 18930->18929 20828 402eb0 GetVersion 20852 403ff4 HeapCreate 20828->20852 20830 402f0f 20831 402f14 20830->20831 20832 402f1c 20830->20832 20927 402fcb 20831->20927 20864 403cd4 20832->20864 20836 402f24 GetCommandLineA 20878 403ba2 20836->20878 20840 402f3e 20910 40389c 20840->20910 20842 402f43 20843 402f48 GetStartupInfoA 20842->20843 20923 403844 20843->20923 20845 402f5a GetModuleHandleA 20847 402f7e 20845->20847 20933 4035eb 20847->20933 20853 404014 20852->20853 20854 40404a 20852->20854 20940 403eac 20853->20940 20854->20830 20857 404030 20859 40404d 20857->20859 20954 404c1c 20857->20954 20858 404023 20952 4043cb HeapAlloc 20858->20952 20859->20830 20861 40402d 20861->20859 20863 40403e HeapDestroy 20861->20863 20863->20854 21017 402fef 20864->21017 20867 403cf3 GetStartupInfoA 20874 403e04 20867->20874 20877 403d3f 20867->20877 20870 403e6b SetHandleCount 20870->20836 20871 403e2b GetStdHandle 20873 403e39 GetFileType 20871->20873 20871->20874 20872 402fef 12 API calls 20872->20877 20873->20874 20874->20870 20874->20871 20875 403db0 20875->20874 20876 403dd2 GetFileType 20875->20876 20876->20875 20877->20872 20877->20874 20877->20875 20879 403bf0 20878->20879 20880 403bbd GetEnvironmentStringsW 20878->20880 20882 403bc5 20879->20882 20883 403be1 20879->20883 20881 403bd1 GetEnvironmentStrings 20880->20881 20880->20882 20881->20883 20884 402f34 20881->20884 20885 403bfd GetEnvironmentStringsW 20882->20885 20889 403c09 WideCharToMultiByte 20882->20889 20883->20884 20887 403c83 GetEnvironmentStrings 20883->20887 20888 403c8f 20883->20888 20901 403955 20884->20901 20885->20884 20885->20889 20887->20884 20887->20888 20888->20888 20892 402fef 12 API calls 20888->20892 20890 403c3d 20889->20890 20891 403c6f FreeEnvironmentStringsW 20889->20891 20893 402fef 12 API calls 20890->20893 20891->20884 20899 403caa 20892->20899 20894 403c43 20893->20894 20894->20891 20895 403c4c WideCharToMultiByte 20894->20895 20897 403c66 20895->20897 20898 403c5d 20895->20898 20896 403cc0 FreeEnvironmentStringsA 20896->20884 20897->20891 21083 4030a1 20898->21083 20899->20896 20902 403967 20901->20902 20903 40396c GetModuleFileNameA 20901->20903 21113 4061b4 20902->21113 20905 40398f 20903->20905 20906 402fef 12 API calls 20905->20906 20907 4039b0 20906->20907 20908 4039c0 20907->20908 20909 402fa6 7 API calls 20907->20909 20908->20840 20909->20908 20911 4038a9 20910->20911 20915 4038ae 20910->20915 20912 4061b4 19 API calls 20911->20912 20912->20915 20913 402fef 12 API calls 20914 4038db 20913->20914 20916 402fa6 7 API calls 20914->20916 20922 4038ef 20914->20922 20915->20913 20916->20922 20917 403932 20918 4030a1 7 API calls 20917->20918 20919 40393e 20918->20919 20919->20842 20920 402fef 12 API calls 20920->20922 20921 402fa6 7 API calls 20921->20922 20922->20917 20922->20920 20922->20921 20924 40384d 20923->20924 20926 403852 20923->20926 20925 4061b4 19 API calls 20924->20925 20925->20926 20926->20845 20928 402fd4 20927->20928 20929 402fd9 20927->20929 20930 404224 7 API calls 20928->20930 20931 40425d 7 API calls 20929->20931 20930->20929 20932 402fe2 ExitProcess 20931->20932 21137 40360d 20933->21137 20936 4036c0 20937 4036cc 20936->20937 20938 4037f5 UnhandledExceptionFilter 20937->20938 20939 402f98 20937->20939 20938->20939 20963 402d40 20940->20963 20943 403ed5 20944 403eef GetEnvironmentVariableA 20943->20944 20947 403ee7 20943->20947 20945 403fcc 20944->20945 20946 403f0e 20944->20946 20945->20947 20968 403e7f GetModuleHandleA 20945->20968 20949 403f53 GetModuleFileNameA 20946->20949 20950 403f4b 20946->20950 20947->20857 20947->20858 20949->20950 20950->20945 20965 4061d0 20950->20965 20953 4043e7 20952->20953 20953->20861 20955 404c30 HeapAlloc 20954->20955 20956 404c29 20954->20956 20957 404c4d VirtualAlloc 20955->20957 20962 404c85 20955->20962 20956->20957 20958 404d42 20957->20958 20959 404c6d VirtualAlloc 20957->20959 20960 404d4a HeapFree 20958->20960 20958->20962 20961 404d34 VirtualFree 20959->20961 20959->20962 20960->20962 20961->20958 20962->20861 20964 402d4c GetVersionExA 20963->20964 20964->20943 20964->20944 20970 4061e7 20965->20970 20969 403e96 20968->20969 20969->20947 20972 4061ff 20970->20972 20974 40622f 20972->20974 20977 4053a6 20972->20977 20973 4053a6 6 API calls 20973->20974 20974->20973 20976 4061e3 20974->20976 20981 4073ab 20974->20981 20976->20945 20978 4053c4 20977->20978 20980 4053b8 20977->20980 20987 40670e 20978->20987 20980->20972 20982 4073d6 20981->20982 20986 4073b9 20981->20986 20983 4073f2 20982->20983 20984 4053a6 6 API calls 20982->20984 20983->20986 20999 406857 20983->20999 20984->20983 20986->20974 20988 406757 20987->20988 20989 40673f GetStringTypeW 20987->20989 20991 406782 GetStringTypeA 20988->20991 20992 4067a6 20988->20992 20989->20988 20990 40675b GetStringTypeA 20989->20990 20990->20988 20994 406843 20990->20994 20991->20994 20992->20994 20995 4067bc MultiByteToWideChar 20992->20995 20994->20980 20995->20994 20996 4067e0 20995->20996 20996->20994 20997 40681a MultiByteToWideChar 20996->20997 20997->20994 20998 406833 GetStringTypeW 20997->20998 20998->20994 21000 406887 LCMapStringW 20999->21000 21001 4068a3 20999->21001 21000->21001 21002 4068ab LCMapStringA 21000->21002 21004 406909 21001->21004 21005 4068ec LCMapStringA 21001->21005 21002->21001 21003 4069e5 21002->21003 21003->20986 21004->21003 21006 40691f MultiByteToWideChar 21004->21006 21005->21003 21006->21003 21007 406949 21006->21007 21007->21003 21008 40697f MultiByteToWideChar 21007->21008 21008->21003 21009 406998 LCMapStringW 21008->21009 21009->21003 21010 4069b3 21009->21010 21011 4069b9 21010->21011 21013 4069f9 21010->21013 21011->21003 21012 4069c7 LCMapStringW 21011->21012 21012->21003 21013->21003 21014 406a31 LCMapStringW 21013->21014 21014->21003 21015 406a49 WideCharToMultiByte 21014->21015 21015->21003 21026 403001 21017->21026 21020 402fa6 21021 402fb4 21020->21021 21022 402faf 21020->21022 21069 40425d 21021->21069 21063 404224 21022->21063 21027 402ffe 21026->21027 21029 403008 21026->21029 21027->20867 21027->21020 21029->21027 21030 40302d 21029->21030 21031 40303c 21030->21031 21034 403051 21030->21034 21038 40304a 21031->21038 21039 404767 21031->21039 21033 403090 HeapAlloc 21035 40309f 21033->21035 21034->21033 21034->21038 21045 404f14 21034->21045 21035->21029 21036 40304f 21036->21029 21038->21033 21038->21035 21038->21036 21040 404799 21039->21040 21041 404838 21040->21041 21043 404847 21040->21043 21052 404a70 21040->21052 21041->21043 21059 404b21 21041->21059 21043->21038 21050 404f22 21045->21050 21046 40500e VirtualAlloc 21051 404fdf 21046->21051 21047 4050e3 21048 404c1c 5 API calls 21047->21048 21048->21051 21050->21046 21050->21047 21050->21051 21051->21038 21053 404ab3 HeapAlloc 21052->21053 21054 404a83 HeapReAlloc 21052->21054 21056 404b03 21053->21056 21057 404ad9 VirtualAlloc 21053->21057 21055 404aa2 21054->21055 21054->21056 21055->21053 21056->21041 21057->21056 21058 404af3 HeapFree 21057->21058 21058->21056 21060 404b33 VirtualAlloc 21059->21060 21062 404b7c 21060->21062 21062->21043 21064 40422e 21063->21064 21065 40425b 21064->21065 21066 40425d 7 API calls 21064->21066 21065->21021 21067 404245 21066->21067 21068 40425d 7 API calls 21067->21068 21068->21065 21071 404270 21069->21071 21070 404387 21073 40439a GetStdHandle WriteFile 21070->21073 21071->21070 21072 4042b0 21071->21072 21077 402fbd 21071->21077 21074 4042bc GetModuleFileNameA 21072->21074 21072->21077 21073->21077 21075 4042d4 21074->21075 21078 406578 21075->21078 21077->20867 21079 406585 LoadLibraryA 21078->21079 21081 4065c7 21078->21081 21080 406596 GetProcAddress 21079->21080 21079->21081 21080->21081 21082 4065ad GetProcAddress GetProcAddress 21080->21082 21081->21077 21082->21081 21084 4030c9 21083->21084 21085 4030ad 21083->21085 21084->20897 21086 4030b7 21085->21086 21087 4030cd 21085->21087 21089 4030f9 HeapFree 21086->21089 21090 4030c3 21086->21090 21088 4030f8 21087->21088 21091 4030e7 21087->21091 21088->21089 21089->21084 21094 40443e 21090->21094 21100 404ecf 21091->21100 21096 40447c 21094->21096 21099 404732 21094->21099 21095 404678 VirtualFree 21097 4046dc 21095->21097 21096->21095 21096->21099 21098 4046eb VirtualFree HeapFree 21097->21098 21097->21099 21098->21099 21099->21084 21101 404f12 21100->21101 21102 404efc 21100->21102 21101->21084 21102->21101 21104 404db6 21102->21104 21107 404dc3 21104->21107 21105 404e73 21105->21101 21106 404de4 VirtualFree 21106->21107 21107->21105 21107->21106 21109 404d60 VirtualFree 21107->21109 21110 404d7d 21109->21110 21111 404dad 21110->21111 21112 404d8d HeapFree 21110->21112 21111->21107 21112->21107 21114 4061bd 21113->21114 21115 4061c4 21113->21115 21117 405df0 21114->21117 21115->20903 21124 405f89 21117->21124 21119 405f7d 21119->21115 21121 405e33 GetCPInfo 21123 405e47 21121->21123 21123->21119 21129 40602f GetCPInfo 21123->21129 21125 405fa9 21124->21125 21126 405f99 GetOEMCP 21124->21126 21127 405e01 21125->21127 21128 405fae GetACP 21125->21128 21126->21125 21127->21119 21127->21121 21127->21123 21128->21127 21133 406052 21129->21133 21136 40611a 21129->21136 21130 40670e 6 API calls 21131 4060ce 21130->21131 21132 406857 9 API calls 21131->21132 21134 4060f2 21132->21134 21133->21130 21135 406857 9 API calls 21134->21135 21135->21136 21136->21119 21138 403619 GetCurrentProcess TerminateProcess 21137->21138 21139 40362a 21137->21139 21138->21139 21140 402f87 21139->21140 21141 403694 ExitProcess 21139->21141 21140->20936 21142 40d1f3 21145 401f64 FindResourceA 21142->21145 21144 40d200 21146 401f86 GetLastError SizeofResource 21145->21146 21152 401f9f 21145->21152 21147 401fa6 LoadResource LockResource GlobalAlloc 21146->21147 21146->21152 21148 401fd2 21147->21148 21149 401ffb GetTickCount 21148->21149 21151 402005 GlobalAlloc 21149->21151 21151->21152 21152->21144 21153 402175 CommandLineToArgvW 21154 40d683 GetLocalTime 21153->21154 21157 401f27 21154->21157 21158 401f3c 21157->21158 21161 401a1d 21158->21161 21160 401f45 21162 401a2c 21161->21162 21167 401a4f CreateFileA 21162->21167 21166 401a3e 21166->21160 21168 401a35 21167->21168 21172 401a7d 21167->21172 21175 401b4b LoadLibraryA 21168->21175 21169 401a98 DeviceIoControl 21169->21172 21170 401b3a CloseHandle 21170->21168 21172->21169 21172->21170 21173 401b0e GetLastError 21172->21173 21184 402ca6 21172->21184 21187 402c98 21172->21187 21173->21170 21173->21172 21176 401c21 21175->21176 21177 401b6e GetProcAddress 21175->21177 21176->21166 21178 401c18 FreeLibrary 21177->21178 21182 401b85 21177->21182 21178->21176 21179 401b95 GetAdaptersInfo 21179->21182 21180 402ca6 7 API calls 21180->21182 21181 401c15 21181->21178 21182->21179 21182->21180 21182->21181 21183 402c98 12 API calls 21182->21183 21183->21182 21185 4030a1 7 API calls 21184->21185 21186 402caf 21185->21186 21186->21172 21188 403001 12 API calls 21187->21188 21189 402ca3 21188->21189 21189->21172 21190 40d13a VirtualAlloc 18931 40d35c CopyFileA 21191 40d03c 21192 40d66a 21191->21192 21195 2c23d0f 21192->21195 21196 2c23d18 21195->21196 21197 2c23d1d 21195->21197 21209 2c2b8e1 21196->21209 21201 2c23d32 21197->21201 21200 40d66c 21202 2c23d3e ___lock_fhandle 21201->21202 21206 2c23d8c ___DllMainCRTStartup 21202->21206 21208 2c23de9 ___lock_fhandle 21202->21208 21213 2c23b9d 21202->21213 21204 2c23dc6 21205 2c23b9d __CRT_INIT@12 138 API calls 21204->21205 21204->21208 21205->21208 21206->21204 21207 2c23b9d __CRT_INIT@12 138 API calls 21206->21207 21206->21208 21207->21204 21208->21200 21210 2c2b911 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 21209->21210 21211 2c2b904 21209->21211 21212 2c2b908 21210->21212 21211->21210 21211->21212 21212->21197 21214 2c23ba9 ___lock_fhandle 21213->21214 21215 2c23bb1 21214->21215 21216 2c23c2b 21214->21216 21261 2c281e7 GetProcessHeap 21215->21261 21218 2c23c94 21216->21218 21219 2c23c2f 21216->21219 21221 2c23cf7 21218->21221 21222 2c23c99 21218->21222 21224 2c23c50 21219->21224 21254 2c23bba ___lock_fhandle __CRT_INIT@12 21219->21254 21362 2c2845c 21219->21362 21220 2c23bb6 21220->21254 21262 2c25d94 21220->21262 21225 2c25c24 __freeptd 59 API calls 21221->21225 21221->21254 21223 2c291cb __CRT_INIT@12 TlsGetValue 21222->21223 21227 2c23ca4 21223->21227 21365 2c28333 RtlDecodePointer 21224->21365 21225->21254 21233 2c28a6d __calloc_crt 59 API calls 21227->21233 21227->21254 21231 2c23bc6 __RTC_Initialize 21238 2c23bd6 GetCommandLineA 21231->21238 21231->21254 21232 2c23c66 __CRT_INIT@12 21389 2c23c7f 21232->21389 21234 2c23cb5 21233->21234 21239 2c291ea __CRT_INIT@12 TlsSetValue 21234->21239 21234->21254 21235 2c2b57f __ioterm 60 API calls 21237 2c23c61 21235->21237 21240 2c25e0a __mtterm 62 API calls 21237->21240 21283 2c2b97d GetEnvironmentStringsW 21238->21283 21242 2c23ccd 21239->21242 21240->21232 21244 2c23cd3 21242->21244 21245 2c23ceb 21242->21245 21247 2c25ce1 __initptd 59 API calls 21244->21247 21248 2c22f74 _free 59 API calls 21245->21248 21250 2c23cdb GetCurrentThreadId 21247->21250 21248->21254 21249 2c23bf0 21251 2c23bf4 21249->21251 21315 2c2b5d1 21249->21315 21250->21254 21348 2c25e0a 21251->21348 21254->21206 21256 2c23c14 21256->21254 21357 2c2b57f 21256->21357 21261->21220 21393 2c28503 RtlEncodePointer 21262->21393 21264 2c25d99 21398 2c28a1f 21264->21398 21267 2c25da2 21268 2c25e0a __mtterm 62 API calls 21267->21268 21271 2c25da7 21268->21271 21271->21231 21272 2c25dbf 21273 2c28a6d __calloc_crt 59 API calls 21272->21273 21274 2c25dcc 21273->21274 21275 2c25e01 21274->21275 21276 2c291ea __CRT_INIT@12 TlsSetValue 21274->21276 21277 2c25e0a __mtterm 62 API calls 21275->21277 21278 2c25de0 21276->21278 21279 2c25e06 21277->21279 21278->21275 21280 2c25de6 21278->21280 21279->21231 21281 2c25ce1 __initptd 59 API calls 21280->21281 21282 2c25dee GetCurrentThreadId 21281->21282 21282->21231 21284 2c2b990 WideCharToMultiByte 21283->21284 21289 2c23be6 21283->21289 21286 2c2b9c3 21284->21286 21287 2c2b9fa FreeEnvironmentStringsW 21284->21287 21288 2c28ab5 __malloc_crt 59 API calls 21286->21288 21287->21289 21290 2c2b9c9 21288->21290 21296 2c2b2cb 21289->21296 21290->21287 21291 2c2b9d0 WideCharToMultiByte 21290->21291 21292 2c2b9e6 21291->21292 21293 2c2b9ef FreeEnvironmentStringsW 21291->21293 21294 2c22f74 _free 59 API calls 21292->21294 21293->21289 21295 2c2b9ec 21294->21295 21295->21293 21297 2c2b2d7 ___lock_fhandle 21296->21297 21298 2c288ee __lock 59 API calls 21297->21298 21299 2c2b2de 21298->21299 21300 2c28a6d __calloc_crt 59 API calls 21299->21300 21302 2c2b2ef 21300->21302 21301 2c2b35a GetStartupInfoW 21309 2c2b36f 21301->21309 21312 2c2b49e 21301->21312 21302->21301 21303 2c2b2fa ___lock_fhandle @_EH4_CallFilterFunc@8 21302->21303 21303->21249 21304 2c2b566 21406 2c2b576 21304->21406 21306 2c28a6d __calloc_crt 59 API calls 21306->21309 21307 2c2b4eb GetStdHandle 21307->21312 21308 2c2b4fe GetFileType 21308->21312 21309->21306 21311 2c2b3bd 21309->21311 21309->21312 21310 2c2b3f1 GetFileType 21310->21311 21311->21310 21311->21312 21313 2c2920c ___lock_fhandle InitializeCriticalSectionAndSpinCount 21311->21313 21312->21304 21312->21307 21312->21308 21314 2c2920c ___lock_fhandle InitializeCriticalSectionAndSpinCount 21312->21314 21313->21311 21314->21312 21316 2c2b5e4 GetModuleFileNameA 21315->21316 21317 2c2b5df 21315->21317 21318 2c2b611 21316->21318 21416 2c2528a 21317->21416 21410 2c2b684 21318->21410 21321 2c23c00 21321->21256 21326 2c2b800 21321->21326 21323 2c28ab5 __malloc_crt 59 API calls 21324 2c2b64a 21323->21324 21324->21321 21325 2c2b684 _parse_cmdline 59 API calls 21324->21325 21325->21321 21327 2c2b809 21326->21327 21330 2c2b80e _strlen 21326->21330 21328 2c2528a ___initmbctable 71 API calls 21327->21328 21328->21330 21329 2c23c09 21329->21256 21342 2c2846b 21329->21342 21330->21329 21331 2c28a6d __calloc_crt 59 API calls 21330->21331 21335 2c2b844 _strlen 21331->21335 21332 2c2b896 21333 2c22f74 _free 59 API calls 21332->21333 21333->21329 21334 2c28a6d __calloc_crt 59 API calls 21334->21335 21335->21329 21335->21332 21335->21334 21336 2c2b8bd 21335->21336 21339 2c2b8d4 21335->21339 21530 2c26cbc 21335->21530 21338 2c22f74 _free 59 API calls 21336->21338 21338->21329 21343 2c28477 __IsNonwritableInCurrentImage 21342->21343 21349 2c25e1a 21348->21349 21350 2c25e14 21348->21350 21352 2c28938 RtlDeleteCriticalSection 21349->21352 21353 2c28954 21349->21353 21542 2c291ac 21350->21542 21354 2c22f74 _free 59 API calls 21352->21354 21355 2c28960 RtlDeleteCriticalSection 21353->21355 21356 2c28973 21353->21356 21354->21349 21355->21353 21356->21254 21359 2c2b586 21357->21359 21358 2c2b5ce 21358->21251 21359->21358 21360 2c22f74 _free 59 API calls 21359->21360 21361 2c2b59f RtlDeleteCriticalSection 21359->21361 21360->21359 21361->21359 21363 2c285a5 _doexit 59 API calls 21362->21363 21364 2c28467 21363->21364 21364->21224 21366 2c2834d 21365->21366 21368 2c2835f 21365->21368 21366->21368 21370 2c22f74 _free 59 API calls 21366->21370 21367 2c22f74 _free 59 API calls 21369 2c2836c 21367->21369 21368->21367 21371 2c28390 21369->21371 21373 2c22f74 _free 59 API calls 21369->21373 21370->21366 21372 2c22f74 _free 59 API calls 21371->21372 21374 2c2839c 21372->21374 21373->21369 21375 2c22f74 _free 59 API calls 21374->21375 21376 2c283ad 21375->21376 21377 2c22f74 _free 59 API calls 21376->21377 21378 2c283b8 21377->21378 21379 2c283dd RtlEncodePointer 21378->21379 21382 2c22f74 _free 59 API calls 21378->21382 21380 2c283f2 21379->21380 21381 2c283f8 21379->21381 21383 2c22f74 _free 59 API calls 21380->21383 21384 2c2840e 21381->21384 21386 2c22f74 _free 59 API calls 21381->21386 21385 2c283dc 21382->21385 21383->21381 21387 2c23c55 21384->21387 21388 2c22f74 _free 59 API calls 21384->21388 21385->21379 21386->21384 21387->21232 21387->21235 21388->21387 21390 2c23c91 21389->21390 21391 2c23c83 21389->21391 21390->21254 21391->21390 21392 2c25e0a __mtterm 62 API calls 21391->21392 21392->21390 21394 2c28514 __init_pointers __initp_misc_winsig 21393->21394 21405 2c23a07 RtlEncodePointer 21394->21405 21396 2c2852c __init_pointers 21397 2c2927a 34 API calls 21396->21397 21397->21264 21401 2c28a2b 21398->21401 21399 2c2920c ___lock_fhandle InitializeCriticalSectionAndSpinCount 21399->21401 21400 2c25d9e 21400->21267 21402 2c2918e 21400->21402 21401->21399 21401->21400 21403 2c291a5 TlsAlloc 21402->21403 21404 2c25db4 21402->21404 21404->21267 21404->21272 21405->21396 21409 2c28a58 RtlLeaveCriticalSection 21406->21409 21408 2c2b57d 21408->21303 21409->21408 21412 2c2b6a6 21410->21412 21415 2c2b70a 21412->21415 21420 2c315d6 21412->21420 21413 2c2b627 21413->21321 21413->21323 21414 2c315d6 _parse_cmdline 59 API calls 21414->21415 21415->21413 21415->21414 21417 2c25293 21416->21417 21418 2c2529a 21416->21418 21426 2c255e7 21417->21426 21418->21316 21423 2c3157c 21420->21423 21424 2c2227b _LocaleUpdate::_LocaleUpdate 59 API calls 21423->21424 21425 2c3158e 21424->21425 21425->21412 21427 2c255f3 ___lock_fhandle 21426->21427 21428 2c25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 21427->21428 21429 2c255fb 21428->21429 21430 2c25541 _LocaleUpdate::_LocaleUpdate 59 API calls 21429->21430 21431 2c25605 21430->21431 21451 2c252e2 21431->21451 21452 2c2227b _LocaleUpdate::_LocaleUpdate 59 API calls 21451->21452 21453 2c252f2 21452->21453 21531 2c26cd5 21530->21531 21532 2c26cc7 21530->21532 21532->21531 21543 2c291c3 TlsFree 21542->21543 21544 2c291bf 21542->21544 21543->21349 21544->21349 21545 4021bc 21546 40d10c RegCreateKeyExA 21545->21546 21547 40d22f 21546->21547 21548 40d77d 21549 40d729 21548->21549 21549->21548 21550 40dab8 lstrcmpiW 21549->21550 18932 2c4e11b 18933 2c4e0b3 18932->18933 18934 2c9c1a3 DeleteFileA 18933->18934 18935 2c9c1a5 18933->18935 18934->18935 21551 2c8f5b7 21552 2ca843c WriteFile 21551->21552

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 0 2c172ab-2c172c3 InternetOpenA 1 2c17389-2c1738f 0->1 2 2c172c9-2c1731d InternetSetOptionA * 3 call 2c24af0 0->2 4 2c17391-2c17397 1->4 5 2c173ab-2c173b9 1->5 8 2c17322-2c17340 InternetOpenUrlA 2->8 9 2c17399-2c1739b 4->9 10 2c1739d-2c173aa call 2c153ec 4->10 6 2c166f4-2c166f6 5->6 7 2c173bf-2c173e3 call 2c24af0 call 2c1439c 5->7 13 2c166f8-2c166fd 6->13 14 2c166ff-2c16701 6->14 7->6 31 2c173e9-2c17417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c2233c 7->31 15 2c17382-2c17383 InternetCloseHandle 8->15 16 2c17342 8->16 9->5 10->5 19 2c16708 Sleep 13->19 20 2c16703 14->20 21 2c1670e-2c16742 RtlEnterCriticalSection RtlLeaveCriticalSection 14->21 15->1 22 2c17346-2c1736c InternetReadFile 16->22 19->21 20->19 26 2c16792 21->26 27 2c16744-2c16750 21->27 24 2c17377-2c1737e InternetCloseHandle 22->24 25 2c1736e-2c17375 22->25 24->15 25->22 28 2c16796 26->28 27->26 30 2c16752-2c1675f 27->30 28->0 32 2c16761-2c16765 30->32 33 2c16767-2c16768 30->33 38 2c17419-2c1742b call 2c2233c 31->38 39 2c1746d-2c17488 call 2c2233c 31->39 35 2c1676c-2c16790 call 2c24af0 * 2 32->35 33->35 35->28 38->39 49 2c1742d-2c1743f call 2c2233c 38->49 47 2c17742-2c17754 call 2c2233c 39->47 48 2c1748e-2c17490 39->48 57 2c17756-2c17758 47->57 58 2c1779d-2c177a6 call 2c2233c 47->58 48->47 51 2c17496-2c17548 call 2c22fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c24af0 * 5 call 2c1439c * 2 48->51 49->39 56 2c17441-2c17453 call 2c2233c 49->56 115 2c17585 51->115 116 2c1754a-2c1754c 51->116 56->39 70 2c17455-2c17467 call 2c2233c 56->70 57->58 62 2c1775a-2c17798 call 2c24af0 RtlEnterCriticalSection RtlLeaveCriticalSection 57->62 65 2c177ab-2c177af 58->65 62->6 71 2c177b1-2c177bf call 2c161f5 call 2c16303 65->71 72 2c177d0-2c177e2 call 2c2233c 65->72 70->6 70->39 86 2c177c4-2c177cb call 2c1640e 71->86 83 2c17b00-2c17b12 call 2c2233c 72->83 84 2c177e8-2c177ea 72->84 83->6 96 2c17b18-2c17b46 call 2c22fac call 2c24af0 call 2c1439c 83->96 84->83 88 2c177f0-2c17807 call 2c1439c 84->88 86->6 88->6 97 2c1780d-2c178db call 2c22418 call 2c11ba7 88->97 117 2c17b48-2c17b4a call 2c1534d 96->117 118 2c17b4f-2c17b56 call 2c22f74 96->118 113 2c178e2-2c17903 RtlEnterCriticalSection 97->113 114 2c178dd call 2c1143f 97->114 121 2c17905-2c1790c 113->121 122 2c1790f-2c17945 RtlLeaveCriticalSection call 2c13c67 call 2c13d7e 113->122 114->113 119 2c17589-2c175b7 call 2c22fac call 2c24af0 call 2c1439c 115->119 116->115 123 2c1754e-2c17560 call 2c2233c 116->123 117->118 118->6 146 2c175b9-2c175c8 call 2c235e6 119->146 147 2c175f8-2c17601 call 2c22f74 119->147 121->122 138 2c1794a-2c17967 call 2c1833b 122->138 123->115 133 2c17562-2c17583 call 2c1439c 123->133 133->119 142 2c1796c-2c17973 138->142 144 2c17ae7-2c17afb call 2c19003 142->144 145 2c17979-2c179b3 call 2c1a725 142->145 144->6 152 2c179b8-2c179c1 145->152 146->147 160 2c175ca 146->160 158 2c17607-2c1761f call 2c23b4c 147->158 159 2c17738-2c1773b 147->159 156 2c17ab1-2c17ae2 call 2c183ea call 2c133b2 152->156 157 2c179c7-2c179ce 152->157 156->144 162 2c179d1-2c179d6 157->162 172 2c17621-2c17629 call 2c19737 158->172 173 2c1762b 158->173 159->47 164 2c175cf-2c175e1 call 2c22850 160->164 162->162 167 2c179d8-2c17a15 call 2c1a725 162->167 175 2c175e3 164->175 176 2c175e6-2c175f6 call 2c235e6 164->176 177 2c17a1a-2c17a23 167->177 174 2c1762d-2c17661 call 2c1a84f call 2c13863 172->174 173->174 188 2c17666-2c17682 call 2c15119 174->188 175->176 176->147 176->164 177->156 181 2c17a29-2c17a2f 177->181 185 2c17a32-2c17a37 181->185 185->185 187 2c17a39-2c17a74 call 2c1a725 185->187 187->156 193 2c17a76-2c17aaa call 2c1d117 187->193 192 2c17687-2c176b8 call 2c13863 call 2c1aaf5 188->192 199 2c176bd-2c176cf call 2c1ac0f 192->199 196 2c17aaf-2c17ab0 193->196 196->156 201 2c176d4-2c176e5 199->201 202 2c176e7 call 2c1380b 201->202 203 2c176ec-2c176fb Sleep 201->203 202->203 204 2c17703-2c17717 call 2c218f0 203->204 207 2c17723-2c17731 204->207 208 2c17719-2c17722 call 2c14100 204->208 207->159 210 2c17733 call 2c1380b 207->210 208->207 210->159
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(0000EA60), ref: 02C16708
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C16713
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C16724
                                                                                        • InternetOpenA.WININET(?), ref: 02C172B5
                                                                                        • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02C172DD
                                                                                        • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02C172F5
                                                                                        • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02C1730D
                                                                                        • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02C17336
                                                                                        • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02C17358
                                                                                        • InternetCloseHandle.WININET(00000000), ref: 02C17378
                                                                                        • InternetCloseHandle.WININET(00000000), ref: 02C17383
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C173EE
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C173FF
                                                                                        • _malloc.LIBCMT ref: 02C17498
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C174AA
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C174B6
                                                                                        • _malloc.LIBCMT ref: 02C1758E
                                                                                        • _strtok.LIBCMT ref: 02C175BF
                                                                                        • _swscanf.LIBCMT ref: 02C175D6
                                                                                        • _strtok.LIBCMT ref: 02C175ED
                                                                                        • _free.LIBCMT ref: 02C175F9
                                                                                        • Sleep.KERNEL32(000007D0), ref: 02C176F1
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C17772
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C17784
                                                                                        • _sprintf.LIBCMT ref: 02C17822
                                                                                        • RtlEnterCriticalSection.NTDLL(00000020), ref: 02C178E6
                                                                                        • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C1791A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                                                        • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                                                        • API String ID: 1657546717-1839899575
                                                                                        • Opcode ID: 228ee2b1f8350917f5ceb29f38084bec1c84b802d7a8f279098c228a776c4bed
                                                                                        • Instruction ID: 991943f7757d5462bf29c3293e0096b628f677ad8c40cacd7af7b8b30705a4b2
                                                                                        • Opcode Fuzzy Hash: 228ee2b1f8350917f5ceb29f38084bec1c84b802d7a8f279098c228a776c4bed
                                                                                        • Instruction Fuzzy Hash: 3B3212715483819FE735AB20DC02BABB7E9AFC6310F100C1DF58A97291EB719508EB93

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 480 2c1648b-2c166f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2c142c7 GetTickCount call 2c1605a GetVersionExA call 2c24af0 call 2c22fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c24af0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c22fac * 4 QueryPerformanceCounter Sleep call 2c22fac * 2 call 2c24af0 * 2 526 2c166f4-2c166f6 480->526 527 2c166f8-2c166fd 526->527 528 2c166ff-2c16701 526->528 529 2c16708 Sleep 527->529 530 2c16703 528->530 531 2c1670e-2c16742 RtlEnterCriticalSection RtlLeaveCriticalSection 528->531 529->531 530->529 532 2c16792 531->532 533 2c16744-2c16750 531->533 534 2c16796-2c172c3 InternetOpenA 532->534 533->532 535 2c16752-2c1675f 533->535 539 2c17389-2c1738f 534->539 540 2c172c9-2c17340 InternetSetOptionA * 3 call 2c24af0 InternetOpenUrlA 534->540 537 2c16761-2c16765 535->537 538 2c16767-2c16768 535->538 541 2c1676c-2c16790 call 2c24af0 * 2 537->541 538->541 543 2c17391-2c17397 539->543 544 2c173ab-2c173b9 539->544 554 2c17382-2c17383 InternetCloseHandle 540->554 555 2c17342 540->555 541->534 548 2c17399-2c1739b 543->548 549 2c1739d-2c173aa call 2c153ec 543->549 544->526 546 2c173bf-2c173e3 call 2c24af0 call 2c1439c 544->546 546->526 564 2c173e9-2c17417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c2233c 546->564 548->544 549->544 554->539 559 2c17346-2c1736c InternetReadFile 555->559 561 2c17377-2c1737e InternetCloseHandle 559->561 562 2c1736e-2c17375 559->562 561->554 562->559 567 2c17419-2c1742b call 2c2233c 564->567 568 2c1746d-2c17488 call 2c2233c 564->568 567->568 575 2c1742d-2c1743f call 2c2233c 567->575 573 2c17742-2c17754 call 2c2233c 568->573 574 2c1748e-2c17490 568->574 583 2c17756-2c17758 573->583 584 2c1779d-2c177af call 2c2233c 573->584 574->573 577 2c17496-2c17548 call 2c22fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c24af0 * 5 call 2c1439c * 2 574->577 575->568 582 2c17441-2c17453 call 2c2233c 575->582 641 2c17585 577->641 642 2c1754a-2c1754c 577->642 582->568 596 2c17455-2c17467 call 2c2233c 582->596 583->584 588 2c1775a-2c17798 call 2c24af0 RtlEnterCriticalSection RtlLeaveCriticalSection 583->588 597 2c177b1-2c177bf call 2c161f5 call 2c16303 584->597 598 2c177d0-2c177e2 call 2c2233c 584->598 588->526 596->526 596->568 612 2c177c4-2c177cb call 2c1640e 597->612 609 2c17b00-2c17b12 call 2c2233c 598->609 610 2c177e8-2c177ea 598->610 609->526 622 2c17b18-2c17b46 call 2c22fac call 2c24af0 call 2c1439c 609->622 610->609 614 2c177f0-2c17807 call 2c1439c 610->614 612->526 614->526 623 2c1780d-2c178db call 2c22418 call 2c11ba7 614->623 643 2c17b48-2c17b4a call 2c1534d 622->643 644 2c17b4f-2c17b56 call 2c22f74 622->644 639 2c178e2-2c17903 RtlEnterCriticalSection 623->639 640 2c178dd call 2c1143f 623->640 647 2c17905-2c1790c 639->647 648 2c1790f-2c17973 RtlLeaveCriticalSection call 2c13c67 call 2c13d7e call 2c1833b 639->648 640->639 645 2c17589-2c175b7 call 2c22fac call 2c24af0 call 2c1439c 641->645 642->641 649 2c1754e-2c17560 call 2c2233c 642->649 643->644 644->526 672 2c175b9-2c175c8 call 2c235e6 645->672 673 2c175f8-2c17601 call 2c22f74 645->673 647->648 670 2c17ae7-2c17afb call 2c19003 648->670 671 2c17979-2c179c1 call 2c1a725 648->671 649->641 659 2c17562-2c17583 call 2c1439c 649->659 659->645 670->526 682 2c17ab1-2c17ae2 call 2c183ea call 2c133b2 671->682 683 2c179c7-2c179ce 671->683 672->673 686 2c175ca 672->686 684 2c17607-2c1761f call 2c23b4c 673->684 685 2c17738-2c1773b 673->685 682->670 688 2c179d1-2c179d6 683->688 698 2c17621-2c17629 call 2c19737 684->698 699 2c1762b 684->699 685->573 690 2c175cf-2c175e1 call 2c22850 686->690 688->688 693 2c179d8-2c17a23 call 2c1a725 688->693 701 2c175e3 690->701 702 2c175e6-2c175f6 call 2c235e6 690->702 693->682 707 2c17a29-2c17a2f 693->707 700 2c1762d-2c176cf call 2c1a84f call 2c13863 call 2c15119 call 2c13863 call 2c1aaf5 call 2c1ac0f 698->700 699->700 727 2c176d4-2c176e5 700->727 701->702 702->673 702->690 711 2c17a32-2c17a37 707->711 711->711 713 2c17a39-2c17a74 call 2c1a725 711->713 713->682 719 2c17a76-2c17aaa call 2c1d117 713->719 722 2c17aaf-2c17ab0 719->722 722->682 728 2c176e7 call 2c1380b 727->728 729 2c176ec-2c17717 Sleep call 2c218f0 727->729 728->729 733 2c17723-2c17731 729->733 734 2c17719-2c17722 call 2c14100 729->734 733->685 736 2c17733 call 2c1380b 733->736 734->733 736->685
                                                                                        APIs
                                                                                        • RtlInitializeCriticalSection.NTDLL(02C471E0), ref: 02C164BA
                                                                                        • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02C164D1
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 02C164DA
                                                                                        • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C164E9
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 02C164EC
                                                                                        • GetTickCount.KERNEL32 ref: 02C164F8
                                                                                          • Part of subcall function 02C1605A: _malloc.LIBCMT ref: 02C16068
                                                                                        • GetVersionExA.KERNEL32(02C47038), ref: 02C16525
                                                                                        • _malloc.LIBCMT ref: 02C16551
                                                                                          • Part of subcall function 02C22FAC: __FF_MSGBANNER.LIBCMT ref: 02C22FC3
                                                                                          • Part of subcall function 02C22FAC: __NMSG_WRITE.LIBCMT ref: 02C22FCA
                                                                                          • Part of subcall function 02C22FAC: RtlAllocateHeap.NTDLL(00980000,00000000,00000001), ref: 02C22FEF
                                                                                        • _malloc.LIBCMT ref: 02C16561
                                                                                        • _malloc.LIBCMT ref: 02C1656C
                                                                                        • _malloc.LIBCMT ref: 02C16577
                                                                                        • _malloc.LIBCMT ref: 02C16582
                                                                                        • _malloc.LIBCMT ref: 02C1658D
                                                                                        • _malloc.LIBCMT ref: 02C16598
                                                                                        • _malloc.LIBCMT ref: 02C165A7
                                                                                        • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C165BE
                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02C165C7
                                                                                        • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C165D6
                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02C165D9
                                                                                        • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C165E4
                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02C165E7
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C16621
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C1662E
                                                                                        • _malloc.LIBCMT ref: 02C16652
                                                                                        • _malloc.LIBCMT ref: 02C16660
                                                                                        • _malloc.LIBCMT ref: 02C16667
                                                                                        • _malloc.LIBCMT ref: 02C1668D
                                                                                        • QueryPerformanceCounter.KERNEL32(00000200), ref: 02C166A0
                                                                                        • Sleep.KERNELBASE ref: 02C166AE
                                                                                        • _malloc.LIBCMT ref: 02C166BA
                                                                                        • _malloc.LIBCMT ref: 02C166C7
                                                                                        • Sleep.KERNELBASE(0000EA60), ref: 02C16708
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C16713
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C16724
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _malloc$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                                        • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                                        • API String ID: 4273019447-2678694477
                                                                                        • Opcode ID: 15b37267180f1c2106dfa3c74890a3687fb442688e1cd8fa4ca412fa9aacf5d8
                                                                                        • Instruction ID: 82de381206acf55ae0fc24c04fc817debf96317655741cd5750ba1a878c12783
                                                                                        • Opcode Fuzzy Hash: 15b37267180f1c2106dfa3c74890a3687fb442688e1cd8fa4ca412fa9aacf5d8
                                                                                        • Instruction Fuzzy Hash: 7C71B4B1D48360AFE720AF749C45B5BBBE8AF85310F100C29F98597280DBB59818DF96

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 840 401b4b-401b68 LoadLibraryA 841 401c21-401c25 840->841 842 401b6e-401b7f GetProcAddress 840->842 843 401b85-401b8e 842->843 844 401c18-401c1b FreeLibrary 842->844 845 401b95-401ba5 GetAdaptersInfo 843->845 844->841 846 401ba7-401bb0 845->846 847 401bdb-401be3 845->847 850 401bc1-401bd7 call 402cc0 call 4018cc 846->850 851 401bb2-401bb6 846->851 848 401be5-401beb call 402ca6 847->848 849 401bec-401bf0 847->849 848->849 854 401bf2-401bf6 849->854 855 401c15-401c17 849->855 850->847 851->847 856 401bb8-401bbf 851->856 854->855 859 401bf8-401bfb 854->859 855->844 856->850 856->851 861 401c06-401c13 call 402c98 859->861 862 401bfd-401c03 859->862 861->845 861->855 862->861
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                                                        • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                                        • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                                        • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                        • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                                        • API String ID: 514930453-3667123677
                                                                                        • Opcode ID: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                                                        • Instruction ID: 38440359ad4724572ca0372a4bc8090c683b298b5ffde01d95b1867a6a9b844d
                                                                                        • Opcode Fuzzy Hash: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                                                        • Instruction Fuzzy Hash: F921B870904109AFEF119F65C9447EF7BB8EF41344F1440BAD504B22E1E7789985CB69

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 914 2c1f9a7-2c1f9ca LoadLibraryA 915 2c1f9d0-2c1f9de GetProcAddress 914->915 916 2c1fa8a-2c1fa91 914->916 917 2c1fa83-2c1fa84 FreeLibrary 915->917 918 2c1f9e4-2c1f9f4 915->918 917->916 919 2c1f9f6-2c1fa02 GetAdaptersInfo 918->919 920 2c1fa04 919->920 921 2c1fa3a-2c1fa42 919->921 922 2c1fa06-2c1fa0d 920->922 923 2c1fa44-2c1fa4a call 2c237a8 921->923 924 2c1fa4b-2c1fa50 921->924 925 2c1fa17-2c1fa1f 922->925 926 2c1fa0f-2c1fa13 922->926 923->924 928 2c1fa52-2c1fa55 924->928 929 2c1fa7e-2c1fa82 924->929 931 2c1fa22-2c1fa27 925->931 926->922 930 2c1fa15 926->930 928->929 933 2c1fa57-2c1fa5c 928->933 929->917 930->921 931->931 934 2c1fa29-2c1fa36 call 2c1f6f6 931->934 935 2c1fa69-2c1fa74 call 2c23b4c 933->935 936 2c1fa5e-2c1fa66 933->936 934->921 935->929 941 2c1fa76-2c1fa79 935->941 936->935 941->919
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02C1F9BD
                                                                                        • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02C1F9D6
                                                                                        • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02C1F9FB
                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 02C1FA84
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                        • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                                        • API String ID: 514930453-3114217049
                                                                                        • Opcode ID: a36d6a803fb2f61cdf374aaa6854cef251b582be97abc60a0a810a058fe0241b
                                                                                        • Instruction ID: 2ea84eae1871da8ca47f2769cb939614dd1f3a13d93f39895e98b6693715401b
                                                                                        • Opcode Fuzzy Hash: a36d6a803fb2f61cdf374aaa6854cef251b582be97abc60a0a810a058fe0241b
                                                                                        • Instruction Fuzzy Hash: E321F671E40309AFDB10DBA8D881AEEBBF8EF46314F1441ADD505E7690DB788A45DBA0

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 999 2c1f8a3-2c1f8ce CreateFileA 1000 2c1f8d4-2c1f8e9 999->1000 1001 2c1f99f-2c1f9a6 999->1001 1002 2c1f8ec-2c1f90e DeviceIoControl 1000->1002 1003 2c1f910-2c1f918 1002->1003 1004 2c1f947-2c1f94f 1002->1004 1005 2c1f921-2c1f926 1003->1005 1006 2c1f91a-2c1f91f 1003->1006 1007 2c1f951-2c1f957 call 2c237a8 1004->1007 1008 2c1f958-2c1f95a 1004->1008 1005->1004 1012 2c1f928-2c1f930 1005->1012 1006->1004 1007->1008 1010 2c1f995-2c1f99e CloseHandle 1008->1010 1011 2c1f95c-2c1f95f 1008->1011 1010->1001 1014 2c1f961-2c1f96a GetLastError 1011->1014 1015 2c1f97b-2c1f988 call 2c23b4c 1011->1015 1016 2c1f933-2c1f938 1012->1016 1014->1010 1017 2c1f96c-2c1f96f 1014->1017 1015->1010 1023 2c1f98a-2c1f990 1015->1023 1016->1016 1019 2c1f93a-2c1f946 call 2c1f6f6 1016->1019 1017->1015 1020 2c1f971-2c1f978 1017->1020 1019->1004 1020->1015 1023->1002
                                                                                        APIs
                                                                                        • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02C1F8C2
                                                                                        • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02C1F900
                                                                                        • GetLastError.KERNEL32 ref: 02C1F961
                                                                                        • CloseHandle.KERNELBASE(?), ref: 02C1F998
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                        • String ID: \\.\PhysicalDrive0
                                                                                        • API String ID: 4026078076-1180397377
                                                                                        • Opcode ID: d4df1fe015f833353e6a38178ab1cf78a331c395198fe4446f2d142c850868f4
                                                                                        • Instruction ID: a6adcc47c00812c793861520cc854123b48387bef779bc9470b73801ec8fa4c7
                                                                                        • Opcode Fuzzy Hash: d4df1fe015f833353e6a38178ab1cf78a331c395198fe4446f2d142c850868f4
                                                                                        • Instruction Fuzzy Hash: B031C071D00319BBDB24EF95D885BAEBBB9FF86714F20416EE504A7680C7705B04DB90

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1025 401a4f-401a77 CreateFileA 1026 401b45-401b4a 1025->1026 1027 401a7d-401a91 1025->1027 1028 401a98-401ac0 DeviceIoControl 1027->1028 1029 401ac2-401aca 1028->1029 1030 401af3-401afb 1028->1030 1031 401ad4-401ad9 1029->1031 1032 401acc-401ad2 1029->1032 1033 401b04-401b07 1030->1033 1034 401afd-401b03 call 402ca6 1030->1034 1031->1030 1037 401adb-401af1 call 402cc0 call 4018cc 1031->1037 1032->1030 1035 401b09-401b0c 1033->1035 1036 401b3a-401b44 CloseHandle 1033->1036 1034->1033 1039 401b27-401b34 call 402c98 1035->1039 1040 401b0e-401b17 GetLastError 1035->1040 1036->1026 1037->1030 1039->1028 1039->1036 1040->1036 1043 401b19-401b1c 1040->1043 1043->1039 1046 401b1e-401b24 1043->1046 1046->1039
                                                                                        APIs
                                                                                        • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                                        • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                                        • GetLastError.KERNEL32 ref: 00401B0E
                                                                                        • CloseHandle.KERNELBASE(?), ref: 00401B3D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                        • String ID: \\.\PhysicalDrive0
                                                                                        • API String ID: 4026078076-1180397377
                                                                                        • Opcode ID: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                                                        • Instruction ID: fc4aaa1cf60edb7db06fdbd05dea25136cd7d186831ecbc7bbbcf924abbffa34
                                                                                        • Opcode Fuzzy Hash: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                                                        • Instruction Fuzzy Hash: 74318B71D00218EADB21AFA5CD849EFBBB9FF41750F20407AE554B32A0E7785E45CB98

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 213 2c16421-2c16434 214 2c16435 213->214 215 2c164b2 214->215 216 2c16437-2c16447 214->216 219 2c16525-2c166f1 GetVersionExA call 2c24af0 call 2c22fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c24af0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c22fac * 4 QueryPerformanceCounter Sleep call 2c22fac * 2 call 2c24af0 * 2 215->219 220 2c164b4-2c164ec RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 215->220 217 2c163f0-2c16408 216->217 218 2c16449-2c16454 216->218 221 2c16409-2c1640d 217->221 218->214 222 2c16456 218->222 267 2c166f4-2c166f6 219->267 224 2c164f3-2c1651b GetTickCount call 2c1605a 220->224 225 2c164ee call 2c142c7 220->225 222->221 224->219 225->224 268 2c166f8-2c166fd 267->268 269 2c166ff-2c16701 267->269 270 2c16708 Sleep 268->270 271 2c16703 269->271 272 2c1670e-2c16742 RtlEnterCriticalSection RtlLeaveCriticalSection 269->272 270->272 271->270 273 2c16792 272->273 274 2c16744-2c16750 272->274 275 2c16796-2c172c3 InternetOpenA 273->275 274->273 276 2c16752-2c1675f 274->276 280 2c17389-2c1738f 275->280 281 2c172c9-2c17340 InternetSetOptionA * 3 call 2c24af0 InternetOpenUrlA 275->281 278 2c16761-2c16765 276->278 279 2c16767-2c16768 276->279 282 2c1676c-2c16790 call 2c24af0 * 2 278->282 279->282 284 2c17391-2c17397 280->284 285 2c173ab-2c173b9 280->285 295 2c17382-2c17383 InternetCloseHandle 281->295 296 2c17342 281->296 282->275 289 2c17399-2c1739b 284->289 290 2c1739d-2c173aa call 2c153ec 284->290 285->267 287 2c173bf-2c173e3 call 2c24af0 call 2c1439c 285->287 287->267 305 2c173e9-2c17417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c2233c 287->305 289->285 290->285 295->280 300 2c17346-2c1736c InternetReadFile 296->300 302 2c17377-2c1737e InternetCloseHandle 300->302 303 2c1736e-2c17375 300->303 302->295 303->300 308 2c17419-2c1742b call 2c2233c 305->308 309 2c1746d-2c17488 call 2c2233c 305->309 308->309 316 2c1742d-2c1743f call 2c2233c 308->316 314 2c17742-2c17754 call 2c2233c 309->314 315 2c1748e-2c17490 309->315 324 2c17756-2c17758 314->324 325 2c1779d-2c177af call 2c2233c 314->325 315->314 318 2c17496-2c17548 call 2c22fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c24af0 * 5 call 2c1439c * 2 315->318 316->309 323 2c17441-2c17453 call 2c2233c 316->323 382 2c17585 318->382 383 2c1754a-2c1754c 318->383 323->309 337 2c17455-2c17467 call 2c2233c 323->337 324->325 329 2c1775a-2c17798 call 2c24af0 RtlEnterCriticalSection RtlLeaveCriticalSection 324->329 338 2c177b1-2c177cb call 2c161f5 call 2c16303 call 2c1640e 325->338 339 2c177d0-2c177e2 call 2c2233c 325->339 329->267 337->267 337->309 338->267 350 2c17b00-2c17b12 call 2c2233c 339->350 351 2c177e8-2c177ea 339->351 350->267 363 2c17b18-2c17b46 call 2c22fac call 2c24af0 call 2c1439c 350->363 351->350 355 2c177f0-2c17807 call 2c1439c 351->355 355->267 364 2c1780d-2c178db call 2c22418 call 2c11ba7 355->364 384 2c17b48-2c17b4a call 2c1534d 363->384 385 2c17b4f-2c17b56 call 2c22f74 363->385 380 2c178e2-2c17903 RtlEnterCriticalSection 364->380 381 2c178dd call 2c1143f 364->381 388 2c17905-2c1790c 380->388 389 2c1790f-2c17973 RtlLeaveCriticalSection call 2c13c67 call 2c13d7e call 2c1833b 380->389 381->380 386 2c17589-2c175b7 call 2c22fac call 2c24af0 call 2c1439c 382->386 383->382 390 2c1754e-2c17560 call 2c2233c 383->390 384->385 385->267 413 2c175b9-2c175c8 call 2c235e6 386->413 414 2c175f8-2c17601 call 2c22f74 386->414 388->389 411 2c17ae7-2c17afb call 2c19003 389->411 412 2c17979-2c179c1 call 2c1a725 389->412 390->382 400 2c17562-2c17583 call 2c1439c 390->400 400->386 411->267 423 2c17ab1-2c17ae2 call 2c183ea call 2c133b2 412->423 424 2c179c7-2c179ce 412->424 413->414 427 2c175ca 413->427 425 2c17607-2c1761f call 2c23b4c 414->425 426 2c17738-2c1773b 414->426 423->411 429 2c179d1-2c179d6 424->429 439 2c17621-2c17629 call 2c19737 425->439 440 2c1762b 425->440 426->314 431 2c175cf-2c175e1 call 2c22850 427->431 429->429 434 2c179d8-2c17a23 call 2c1a725 429->434 442 2c175e3 431->442 443 2c175e6-2c175f6 call 2c235e6 431->443 434->423 448 2c17a29-2c17a2f 434->448 441 2c1762d-2c176e5 call 2c1a84f call 2c13863 call 2c15119 call 2c13863 call 2c1aaf5 call 2c1ac0f 439->441 440->441 469 2c176e7 call 2c1380b 441->469 470 2c176ec-2c17717 Sleep call 2c218f0 441->470 442->443 443->414 443->431 452 2c17a32-2c17a37 448->452 452->452 454 2c17a39-2c17a74 call 2c1a725 452->454 454->423 460 2c17a76-2c17ab0 call 2c1d117 454->460 460->423 469->470 474 2c17723-2c17731 470->474 475 2c17719-2c17722 call 2c14100 470->475 474->426 477 2c17733 call 2c1380b 474->477 475->474 477->426
                                                                                        APIs
                                                                                        • RtlInitializeCriticalSection.NTDLL(02C471E0), ref: 02C164BA
                                                                                        • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02C164D1
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 02C164DA
                                                                                        • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C164E9
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 02C164EC
                                                                                        • GetTickCount.KERNEL32 ref: 02C164F8
                                                                                        • GetVersionExA.KERNEL32(02C47038), ref: 02C16525
                                                                                        • _malloc.LIBCMT ref: 02C16551
                                                                                        • _malloc.LIBCMT ref: 02C16561
                                                                                        • _malloc.LIBCMT ref: 02C1656C
                                                                                        • _malloc.LIBCMT ref: 02C16577
                                                                                        • _malloc.LIBCMT ref: 02C16582
                                                                                        • _malloc.LIBCMT ref: 02C1658D
                                                                                        • _malloc.LIBCMT ref: 02C16598
                                                                                        • _malloc.LIBCMT ref: 02C165A7
                                                                                        • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C165BE
                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02C165C7
                                                                                        • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C165D6
                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02C165D9
                                                                                        • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C165E4
                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02C165E7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _malloc$Heap$AllocateProcess$AddressHandleModuleProc$CountCriticalInitializeSectionTickVersion
                                                                                        • String ID: !}'|$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                                        • API String ID: 2374473808-3485603643
                                                                                        • Opcode ID: 8a98fb51d381b00856b702498390cfc4f464dab24513c476cdc4dbd05994df1c
                                                                                        • Instruction ID: d6829d10e5ade6ffc151975073b09d8fc56a39b4734d28880e29d1a48ec1d736
                                                                                        • Opcode Fuzzy Hash: 8a98fb51d381b00856b702498390cfc4f464dab24513c476cdc4dbd05994df1c
                                                                                        • Instruction Fuzzy Hash: 6E81D3B1D483609FE320AF749C45B5BBBE9AF85310F110C2AF98997240DFB59808DF96

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C11D11
                                                                                        • GetLastError.KERNEL32 ref: 02C11D23
                                                                                          • Part of subcall function 02C11712: __EH_prolog.LIBCMT ref: 02C11717
                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C11D59
                                                                                        • GetLastError.KERNEL32 ref: 02C11D6B
                                                                                        • __beginthreadex.LIBCMT ref: 02C11DB1
                                                                                        • GetLastError.KERNEL32 ref: 02C11DC6
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C11DDD
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C11DEC
                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02C11E14
                                                                                        • CloseHandle.KERNELBASE(00000000), ref: 02C11E1B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                                        • String ID: thread$thread.entry_event$thread.exit_event
                                                                                        • API String ID: 831262434-3017686385
                                                                                        • Opcode ID: c61a651fb4d8904ad69aec1b49c5102aa96c3122e9c7edf4d205a2ede41f5434
                                                                                        • Instruction ID: 593728912c3fc1bfb45e1bd8d005ebacb00626d92b3d43e46cc1087636eb52de
                                                                                        • Opcode Fuzzy Hash: c61a651fb4d8904ad69aec1b49c5102aa96c3122e9c7edf4d205a2ede41f5434
                                                                                        • Instruction Fuzzy Hash: C831AEB1A003009FD700EF24C889B2FBBA5EF85354F14496EF9599B290DBB49949DFD2

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C14D8B
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C14DB7
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C14DC3
                                                                                          • Part of subcall function 02C14BED: __EH_prolog.LIBCMT ref: 02C14BF2
                                                                                          • Part of subcall function 02C14BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02C14CF2
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C14E93
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C14E99
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C14EA0
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C14EA6
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C150A7
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C150AD
                                                                                        • RtlEnterCriticalSection.NTDLL(02C471E0), ref: 02C150B8
                                                                                        • RtlLeaveCriticalSection.NTDLL(02C471E0), ref: 02C150C1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                                        • String ID:
                                                                                        • API String ID: 2062355503-0
                                                                                        • Opcode ID: c28ef5eb3de0ed41afa5243d9adee1fe50b87009133558398bd9932227446b5d
                                                                                        • Instruction ID: afa23ba4a9254b8acb82aac67df1e403fda4e8f267efe618d3dc9efa4ccebd8f
                                                                                        • Opcode Fuzzy Hash: c28ef5eb3de0ed41afa5243d9adee1fe50b87009133558398bd9932227446b5d
                                                                                        • Instruction Fuzzy Hash: 35B15971D0025DEFEF25DFA0C841BEEBBB5AF46314F20419AE40567280DBB45A49EF92

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 866 401f64-401f84 FindResourceA 867 401f86-401f9d GetLastError SizeofResource 866->867 868 401f9f-401fa1 866->868 867->868 869 401fa6-401fec LoadResource LockResource GlobalAlloc call 402900 * 2 867->869 870 402096-40209a 868->870 875 401fee-401ff9 869->875 875->875 876 401ffb-402003 GetTickCount 875->876 877 402032-402038 876->877 878 402005-402007 876->878 879 402053-402083 GlobalAlloc call 401c26 877->879 881 40203a-40204a 877->881 878->879 880 402009-40200f 878->880 888 402088-402093 879->888 880->879 882 402011-402023 880->882 883 40204c 881->883 884 40204e-402051 881->884 886 402025 882->886 887 402027-40202a 882->887 883->884 884->879 884->881 886->887 887->882 889 40202c-40202e 887->889 888->870 889->880 890 402030 889->890 890->879
                                                                                        APIs
                                                                                        • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                                        • GetLastError.KERNEL32 ref: 00401F86
                                                                                        • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                                        • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                                        • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                                        • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                                                        • GetTickCount.KERNEL32 ref: 00401FFB
                                                                                        • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                                        • String ID:
                                                                                        • API String ID: 564119183-0
                                                                                        • Opcode ID: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                                                        • Instruction ID: 5f40b5bb2c798fd06435bc38b1d437300a77b6e6fc54339f6675bf13ecd45336
                                                                                        • Opcode Fuzzy Hash: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                                                        • Instruction Fuzzy Hash: 45314E71A00255AFDB105FB59F8896F7F68EF45344F10807AFE86F7281DA748845C7A8

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • RtlEnterCriticalSection.NTDLL(?), ref: 02C12706
                                                                                        • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C1272B
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C35B53), ref: 02C12738
                                                                                          • Part of subcall function 02C11712: __EH_prolog.LIBCMT ref: 02C11717
                                                                                        • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02C12778
                                                                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 02C127D9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                        • String ID: timer
                                                                                        • API String ID: 4293676635-1792073242
                                                                                        • Opcode ID: d0e814fbe70d220cee09abc273717bea18efaf4055299eae147e737be269b3ca
                                                                                        • Instruction ID: 8c1fe7875a68c65ef07970c95bb5a4c2a40dca17ad4a74d301a7a0fec083d682
                                                                                        • Opcode Fuzzy Hash: d0e814fbe70d220cee09abc273717bea18efaf4055299eae147e737be269b3ca
                                                                                        • Instruction Fuzzy Hash: 613189B1904715AFD310DF25C945B27BBE8FF49B24F004A2AF95582680E770E914DFA6

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 942 2c12b95-2c12baf 943 2c12bb1-2c12bb9 call 2c20b10 942->943 944 2c12bc7-2c12bcb 942->944 952 2c12bbf-2c12bc2 943->952 946 2c12bcd-2c12bd0 944->946 947 2c12bdf 944->947 946->947 950 2c12bd2-2c12bdd call 2c20b10 946->950 948 2c12be2-2c12c11 WSASetLastError WSARecv call 2c1a509 947->948 954 2c12c16-2c12c1d 948->954 950->952 955 2c12d30 952->955 957 2c12c2c-2c12c32 954->957 958 2c12c1f-2c12c2a call 2c20b10 954->958 959 2c12d32-2c12d38 955->959 961 2c12c34-2c12c39 call 2c20b10 957->961 962 2c12c46-2c12c48 957->962 967 2c12c3f-2c12c42 958->967 961->967 965 2c12c4a-2c12c4d 962->965 966 2c12c4f-2c12c60 call 2c20b10 962->966 969 2c12c66-2c12c69 965->969 966->959 966->969 967->962 972 2c12c73-2c12c76 969->972 973 2c12c6b-2c12c6d 969->973 972->955 975 2c12c7c-2c12c9a call 2c20b10 call 2c1166f 972->975 973->972 974 2c12d22-2c12d2d call 2c11996 973->974 974->955 982 2c12cbc-2c12cfa WSASetLastError select call 2c1a509 975->982 983 2c12c9c-2c12cba call 2c20b10 call 2c1166f 975->983 988 2c12d08 982->988 989 2c12cfc-2c12d06 call 2c20b10 982->989 983->955 983->982 992 2c12d15-2c12d17 988->992 993 2c12d0a-2c12d12 call 2c20b10 988->993 997 2c12d19-2c12d1d 989->997 992->955 992->997 993->992 997->948
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C12BE4
                                                                                        • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02C12C07
                                                                                          • Part of subcall function 02C1A509: WSAGetLastError.WS2_32(00000000,?,?,02C12A51), ref: 02C1A517
                                                                                        • WSASetLastError.WS2_32 ref: 02C12CD3
                                                                                        • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02C12CE7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$Recvselect
                                                                                        • String ID: 3'
                                                                                        • API String ID: 886190287-280543908
                                                                                        • Opcode ID: b2d1240b2ceffb11e8328e76bc2a458dfe6e4886b43e40eaa26122d35f87f61d
                                                                                        • Instruction ID: 822e5b0816b8dbda4e37556c3c4da974a07dad685d7f0d85c551ea575845e08a
                                                                                        • Opcode Fuzzy Hash: b2d1240b2ceffb11e8328e76bc2a458dfe6e4886b43e40eaa26122d35f87f61d
                                                                                        • Instruction Fuzzy Hash: 4341CFB4A043158FD720EF74C41576BBBE9AF86358F104D1EE899C3280EBB0C544EB92

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetVersion.KERNEL32 ref: 00402ED6
                                                                                          • Part of subcall function 00403FF4: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                                                          • Part of subcall function 00403FF4: HeapDestroy.KERNEL32 ref: 00404044
                                                                                        • GetCommandLineA.KERNEL32 ref: 00402F24
                                                                                        • GetStartupInfoA.KERNEL32(?), ref: 00402F4F
                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402F72
                                                                                          • Part of subcall function 00402FCB: ExitProcess.KERNEL32 ref: 00402FE8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                        • String ID: Y
                                                                                        • API String ID: 2057626494-4136946213
                                                                                        • Opcode ID: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                                                        • Instruction ID: ae24bdd31f92ba5c0019e7eb98566f973638ce5b9b082510a96f2684413349a7
                                                                                        • Opcode Fuzzy Hash: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                                                        • Instruction Fuzzy Hash: 3721A1B1840615ABDB14AFA6DE4AA6E7FB8EF44705F10413FF501B72D1DB384500CB58

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1078 2c129ee-2c12a06 1079 2c12ab3-2c12abb call 2c20b10 1078->1079 1080 2c12a0c-2c12a10 1078->1080 1088 2c12abe-2c12ac6 1079->1088 1081 2c12a12-2c12a15 1080->1081 1082 2c12a39-2c12a4c WSASetLastError closesocket call 2c1a509 1080->1082 1081->1082 1084 2c12a17-2c12a36 call 2c20b10 call 2c12f50 1081->1084 1087 2c12a51-2c12a55 1082->1087 1084->1082 1087->1079 1090 2c12a57-2c12a5f call 2c20b10 1087->1090 1096 2c12a61-2c12a67 1090->1096 1097 2c12a69-2c12a71 call 2c20b10 1090->1097 1096->1097 1098 2c12a7b-2c12aad ioctlsocket WSASetLastError closesocket call 2c1a509 1096->1098 1102 2c12a73-2c12a79 1097->1102 1103 2c12aaf-2c12ab1 1097->1103 1098->1103 1102->1098 1102->1103 1103->1079 1103->1088
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C12A3B
                                                                                        • closesocket.WS2_32 ref: 02C12A42
                                                                                        • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02C12A89
                                                                                        • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02C12A97
                                                                                        • closesocket.WS2_32 ref: 02C12A9E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLastclosesocket$ioctlsocket
                                                                                        • String ID:
                                                                                        • API String ID: 1561005644-0
                                                                                        • Opcode ID: f1ea053c6eb39d72a3e8d76bd65b87212c3920b8568986f193ef8014e8f0d2ef
                                                                                        • Instruction ID: b475e7bc92cab381e954fbefd76243d97d4a0a113164b421ce62f74eb6e0bd5a
                                                                                        • Opcode Fuzzy Hash: f1ea053c6eb39d72a3e8d76bd65b87212c3920b8568986f193ef8014e8f0d2ef
                                                                                        • Instruction Fuzzy Hash: 72214BB5A00215EBDB309BB8980576AB3E9EF85315F104D6AEC05D32C1FB70CA44DB51

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1105 2c11ba7-2c11bcf call 2c353f0 RtlEnterCriticalSection 1108 2c11bd1 1105->1108 1109 2c11be9-2c11bf7 RtlLeaveCriticalSection call 2c1e330 1105->1109 1110 2c11bd4-2c11be0 call 2c11b79 1108->1110 1112 2c11bfa-2c11c20 RtlEnterCriticalSection 1109->1112 1117 2c11be2-2c11be7 1110->1117 1118 2c11c55-2c11c6e RtlLeaveCriticalSection 1110->1118 1114 2c11c34-2c11c36 1112->1114 1115 2c11c22-2c11c2f call 2c11b79 1114->1115 1116 2c11c38-2c11c43 1114->1116 1119 2c11c45-2c11c4b 1115->1119 1123 2c11c31 1115->1123 1116->1119 1117->1109 1117->1110 1119->1118 1121 2c11c4d-2c11c51 1119->1121 1121->1118 1123->1114
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C11BAC
                                                                                        • RtlEnterCriticalSection.NTDLL ref: 02C11BBC
                                                                                        • RtlLeaveCriticalSection.NTDLL ref: 02C11BEA
                                                                                        • RtlEnterCriticalSection.NTDLL ref: 02C11C13
                                                                                        • RtlLeaveCriticalSection.NTDLL ref: 02C11C56
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeave$H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 1633115879-0
                                                                                        • Opcode ID: cee5d7dc3b389b1f813f7ed5c84a0abfad84f7d11989978cd272048ee90f7972
                                                                                        • Instruction ID: ae0b3cab2636b4f90983d532df639d9088a951c57c4def2e2d85f7454e4d45a7
                                                                                        • Opcode Fuzzy Hash: cee5d7dc3b389b1f813f7ed5c84a0abfad84f7d11989978cd272048ee90f7972
                                                                                        • Instruction Fuzzy Hash: B921BFB5A00604EFCB14CF68C44479ABBB5FF89314F148989E90997301DBB8EA05DBE0
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C12EEE
                                                                                        • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C12EFD
                                                                                        • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C12F0C
                                                                                        • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02C12F36
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$Socketsetsockopt
                                                                                        • String ID:
                                                                                        • API String ID: 2093263913-0
                                                                                        • Opcode ID: 8f9f946b21c6e5bf57aac4fe5f643ff5cf2881970f485f3ae55ebb9dd3509bd6
                                                                                        • Instruction ID: a7543458ae7bf39d31f0a69fec12cef37ede47d348fb497a17c9248c380afbbe
                                                                                        • Opcode Fuzzy Hash: 8f9f946b21c6e5bf57aac4fe5f643ff5cf2881970f485f3ae55ebb9dd3509bd6
                                                                                        • Instruction Fuzzy Hash: AD01D871A00218FBDB205F65DC48F5ABBA9EB89761F008965F908DB181D7718904CBB0
                                                                                        APIs
                                                                                          • Part of subcall function 02C12D39: WSASetLastError.WS2_32(00000000), ref: 02C12D47
                                                                                          • Part of subcall function 02C12D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C12D5C
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C12E6D
                                                                                        • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02C12E83
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$Sendselect
                                                                                        • String ID: 3'
                                                                                        • API String ID: 2958345159-280543908
                                                                                        • Opcode ID: 21aa26bee56cfce9173a3c35ea422cfd18a89b42ca906e8155abe7145b461f16
                                                                                        • Instruction ID: 8b360ccfd60e1d9554445322683ded1d44b4df695a5c07a6f96cfd2d4659f03c
                                                                                        • Opcode Fuzzy Hash: 21aa26bee56cfce9173a3c35ea422cfd18a89b42ca906e8155abe7145b461f16
                                                                                        • Instruction Fuzzy Hash: 9431E5B4E102299FDF10EF64C8167EEBBB5EF46318F00495ADC0493280EBB59545EFA1
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C12AEA
                                                                                        • connect.WS2_32(?,?,?), ref: 02C12AF5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLastconnect
                                                                                        • String ID: 3'
                                                                                        • API String ID: 374722065-280543908
                                                                                        • Opcode ID: 0d0e4657d9fb28a2ebaae82186cb9ed89fae9fb355632818e8744ad19285c0ed
                                                                                        • Instruction ID: 8285254fc940a28522c7cbf5fea48dde1065c2f1d3f3286cc39c90faf23cb347
                                                                                        • Opcode Fuzzy Hash: 0d0e4657d9fb28a2ebaae82186cb9ed89fae9fb355632818e8744ad19285c0ed
                                                                                        • Instruction Fuzzy Hash: 4421CC75E101189BCF20EF74D4156ADB7BAEF45324F00459ADD19A3280EBB44605AF91
                                                                                        APIs
                                                                                        • RegCreateKeyExA.KERNELBASE(80000002,Software\SigmaTuner), ref: 0040D111
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID: ($Software\SigmaTuner
                                                                                        • API String ID: 2289755597-617436208
                                                                                        • Opcode ID: 68ecb0ecf7fd6b17a69812d9f308e3fbd180a96da1e4e3e34fe81336dd00a499
                                                                                        • Instruction ID: 4e71f31e88a44f22f3ef1633652564cfddd31b509460d534b387b1c09af00864
                                                                                        • Opcode Fuzzy Hash: 68ecb0ecf7fd6b17a69812d9f308e3fbd180a96da1e4e3e34fe81336dd00a499
                                                                                        • Instruction Fuzzy Hash: D0F07872F082519BDB104FB4BE91BF237A59311310F14427BD682722E3C2348C0ADB0D
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseValue
                                                                                        • String ID: (
                                                                                        • API String ID: 3132538880-3887548279
                                                                                        • Opcode ID: aed333041bc2f966ea0d86e6d9dd230b11369b025f5e39ad2aa4dee1748e457e
                                                                                        • Instruction ID: dc5d4dd49975a6bd079c04f8d868fc6ffa73d12d3e4352ab84a8b01ab3bf0992
                                                                                        • Opcode Fuzzy Hash: aed333041bc2f966ea0d86e6d9dd230b11369b025f5e39ad2aa4dee1748e457e
                                                                                        • Instruction Fuzzy Hash: 1CF0B436E095518BCB014FB4BB50BA57BA1A715310718427AC592622B2C235480ADB49
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: ae251d2f6c727d6f31e8fc594dc5f2dc9d2c628b48098a3544aa725ee6f69461
                                                                                        • Instruction ID: 8663c23ef3ed86c82507d19dbc5d11073b48d4be2c74f5d0a92caca09701f135
                                                                                        • Opcode Fuzzy Hash: ae251d2f6c727d6f31e8fc594dc5f2dc9d2c628b48098a3544aa725ee6f69461
                                                                                        • Instruction Fuzzy Hash: 6A515DB190425ADFCB05CF68C4416AABBF1FF49724F14859EE8299B380D774DA10DFA1
                                                                                        APIs
                                                                                        • InterlockedIncrement.KERNEL32(?), ref: 02C136A7
                                                                                          • Part of subcall function 02C12420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C12432
                                                                                          • Part of subcall function 02C12420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C12445
                                                                                          • Part of subcall function 02C12420: RtlEnterCriticalSection.NTDLL(?), ref: 02C12454
                                                                                          • Part of subcall function 02C12420: InterlockedExchange.KERNEL32(?,00000001), ref: 02C12469
                                                                                          • Part of subcall function 02C12420: RtlLeaveCriticalSection.NTDLL(?), ref: 02C12470
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                                        • String ID:
                                                                                        • API String ID: 1601054111-0
                                                                                        • Opcode ID: 5d2f025b7e699a649329da110a966b9a57fbc09d4ddd01ac809404366aec195c
                                                                                        • Instruction ID: 17d32b71ac4289f6005d11c298c259f6892219dc0bed06fd21947102e7fd4ce8
                                                                                        • Opcode Fuzzy Hash: 5d2f025b7e699a649329da110a966b9a57fbc09d4ddd01ac809404366aec195c
                                                                                        • Instruction Fuzzy Hash: 061101B6200248ABDF218E14CC86FAA3B6AFF42358F004556FD528B290CB34D960EBD4
                                                                                        APIs
                                                                                        • __beginthreadex.LIBCMT ref: 02C22106
                                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02C1A989,00000000), ref: 02C22137
                                                                                        • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,02C1A989,00000000), ref: 02C22145
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandleResumeThread__beginthreadex
                                                                                        • String ID:
                                                                                        • API String ID: 1685284544-0
                                                                                        • Opcode ID: 7ebebffd2a4d630189f0cdbe18513715b4e7e4d2796926ebf66423b4767310e8
                                                                                        • Instruction ID: ff2e4602db46f1565f7d3db77ef54a32e2100e676b17120426f4938887199057
                                                                                        • Opcode Fuzzy Hash: 7ebebffd2a4d630189f0cdbe18513715b4e7e4d2796926ebf66423b4767310e8
                                                                                        • Instruction Fuzzy Hash: 0EF068712402215BD7209E5CDC84F95B3E9AF88725F14056AF658D7280CB71AC5A9A90
                                                                                        APIs
                                                                                        • InterlockedIncrement.KERNEL32(02C472B4), ref: 02C11ABA
                                                                                        • WSAStartup.WS2_32(00000002,00000000), ref: 02C11ACB
                                                                                        • InterlockedExchange.KERNEL32(02C472B8,00000000), ref: 02C11AD7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Interlocked$ExchangeIncrementStartup
                                                                                        • String ID:
                                                                                        • API String ID: 1856147945-0
                                                                                        • Opcode ID: d1b74520681d253ceff30cfca0635f0f1b63216bee3901f43ab0f53f6ee6ad2f
                                                                                        • Instruction ID: a07de6e87d302603e117e0580d3fbae96c589357cc429719814a179d86d44075
                                                                                        • Opcode Fuzzy Hash: d1b74520681d253ceff30cfca0635f0f1b63216bee3901f43ab0f53f6ee6ad2f
                                                                                        • Instruction Fuzzy Hash: 66D05EB19906199BF2206AA4AD4FB79FB2CE706611F000B61FDAEC04C0EB60562895F6
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C14BF2
                                                                                          • Part of subcall function 02C11BA7: __EH_prolog.LIBCMT ref: 02C11BAC
                                                                                          • Part of subcall function 02C11BA7: RtlEnterCriticalSection.NTDLL ref: 02C11BBC
                                                                                          • Part of subcall function 02C11BA7: RtlLeaveCriticalSection.NTDLL ref: 02C11BEA
                                                                                          • Part of subcall function 02C11BA7: RtlEnterCriticalSection.NTDLL ref: 02C11C13
                                                                                          • Part of subcall function 02C11BA7: RtlLeaveCriticalSection.NTDLL ref: 02C11C56
                                                                                          • Part of subcall function 02C1E0F8: __EH_prolog.LIBCMT ref: 02C1E0FD
                                                                                          • Part of subcall function 02C1E0F8: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C1E17C
                                                                                        • InterlockedExchange.KERNEL32(?,00000000), ref: 02C14CF2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                                        • String ID:
                                                                                        • API String ID: 1927618982-0
                                                                                        • Opcode ID: 7f353e59ed8b0cdf5e51bd1a3e884d6de4da29d5f77f81f50909b8d130449e78
                                                                                        • Instruction ID: 4fa2b9f148381eed4ad8b3b88c850df75a6509b5338f8b820e63aad5ae4f466a
                                                                                        • Opcode Fuzzy Hash: 7f353e59ed8b0cdf5e51bd1a3e884d6de4da29d5f77f81f50909b8d130449e78
                                                                                        • Instruction Fuzzy Hash: 325138B1D04248DFDB15DFA8C485AEEFBB5EF0A314F1481AAE805AB351DB309A04EF51
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32 ref: 004028B3
                                                                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 0040D946
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastLibraryLoad
                                                                                        • String ID:
                                                                                        • API String ID: 3568775529-0
                                                                                        • Opcode ID: 5e32a7a62a2c3ff601f2bf1730479b9b9c22381f82da0568651c35d061e48bbf
                                                                                        • Instruction ID: 14bdb63d2d4233b01c4e35551316813a013ab5b721472b8dd8d451ab0b286682
                                                                                        • Opcode Fuzzy Hash: 5e32a7a62a2c3ff601f2bf1730479b9b9c22381f82da0568651c35d061e48bbf
                                                                                        • Instruction Fuzzy Hash: F7310374D04306EBCB148F94C9947B67BA0BF45300F24417BDC42AB2C6D7BCD98A8B5A
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: lstrcmpi
                                                                                        • String ID: O<]}
                                                                                        • API String ID: 1586166983-4007896347
                                                                                        • Opcode ID: d1d643a03db5ca920fdaa33caf752c300a0e9c74b5cf396b89437d58e9dce264
                                                                                        • Instruction ID: a107d446fcec8cea12b60b8710785c80873d44211d031ab5c554c046b18c2fa1
                                                                                        • Opcode Fuzzy Hash: d1d643a03db5ca920fdaa33caf752c300a0e9c74b5cf396b89437d58e9dce264
                                                                                        • Instruction Fuzzy Hash: 8A11CE71D88225EFC316A6A58C815D53B91DE56360326497AC086EF1D3D23EC407CBDB
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32 ref: 004028B3
                                                                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 0040D946
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastLibraryLoad
                                                                                        • String ID:
                                                                                        • API String ID: 3568775529-0
                                                                                        • Opcode ID: c231a5a298bfc6b2c3fce7fb805361251ba588e7d467b8734fab562acfc34325
                                                                                        • Instruction ID: c6b9045d156e3b0491d472cac6c1520b606c53a1eabdefe8f38e378a33d37938
                                                                                        • Opcode Fuzzy Hash: c231a5a298bfc6b2c3fce7fb805361251ba588e7d467b8734fab562acfc34325
                                                                                        • Instruction Fuzzy Hash: D001A9759483568FDB118F98C9957A63BE0AF06700F2440ABEC40AF2C2D7BCD44A8B86
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C12D47
                                                                                        • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C12D5C
                                                                                          • Part of subcall function 02C1A509: WSAGetLastError.WS2_32(00000000,?,?,02C12A51), ref: 02C1A517
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$Send
                                                                                        • String ID:
                                                                                        • API String ID: 1282938840-0
                                                                                        • Opcode ID: 3320bc96072bf4e1fc5e7168179ff42954c8b2f171e7a8a1c62de2ebdceb5252
                                                                                        • Instruction ID: 28ec6f509970474b2a2a7ac5fb54b5b65524ab5e072a04ff312c6602b4db06e5
                                                                                        • Opcode Fuzzy Hash: 3320bc96072bf4e1fc5e7168179ff42954c8b2f171e7a8a1c62de2ebdceb5252
                                                                                        • Instruction Fuzzy Hash: 6A0175B5500219EFD7306F59C84596BFAEDFB85764710092FE85993200EB709D00EB61
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __calloc_crt
                                                                                        • String ID:
                                                                                        • API String ID: 3494438863-0
                                                                                        • Opcode ID: 4ff428272cadc99ac6d2432350d331fadea855b84c0c1b7762712fb45d587c2c
                                                                                        • Instruction ID: 6c4992c57ea3c01ee0336d700e7becec12073c1ae7221b113e70978ca8428465
                                                                                        • Opcode Fuzzy Hash: 4ff428272cadc99ac6d2432350d331fadea855b84c0c1b7762712fb45d587c2c
                                                                                        • Instruction Fuzzy Hash: F7F0AF796843219EFB149E2AFC507A377D9EB80B24F740A2AFA04CA184EF3488448750
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C18407
                                                                                        • shutdown.WS2_32(?,00000002), ref: 02C18410
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLastshutdown
                                                                                        • String ID:
                                                                                        • API String ID: 1920494066-0
                                                                                        • Opcode ID: 6a2eead28f169781dfa30294fe7ca70a21da745c93770e41a328349fb0ae242a
                                                                                        • Instruction ID: 8342f32ad2d6f6b08d2d3888cd53576d7779d727db956b1221948e264937aac5
                                                                                        • Opcode Fuzzy Hash: 6a2eead28f169781dfa30294fe7ca70a21da745c93770e41a328349fb0ae242a
                                                                                        • Instruction Fuzzy Hash: 68F09071608328CFD7209F18D412B5AB7E5FF09320F01891DE995A7381DB71A800DBA1
                                                                                        APIs
                                                                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                                                          • Part of subcall function 00403EAC: GetVersionExA.KERNEL32 ref: 00403ECB
                                                                                        • HeapDestroy.KERNEL32 ref: 00404044
                                                                                          • Part of subcall function 004043CB: HeapAlloc.KERNEL32(00000000,00000140,0040402D,000003F8), ref: 004043D8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Heap$AllocCreateDestroyVersion
                                                                                        • String ID:
                                                                                        • API String ID: 2507506473-0
                                                                                        • Opcode ID: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                                                        • Instruction ID: b1684c5e0161eeb02f30399066ba6d75b4260e35b9d13e26dc8fbe5d47634710
                                                                                        • Opcode Fuzzy Hash: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                                                        • Instruction Fuzzy Hash: F5F092F0656301DAEB301B75AE46B3A39949BC0796F20443BF740F91E1EF7C8481960D
                                                                                        APIs
                                                                                        • RegCloseKey.KERNELBASE(?), ref: 0040263F
                                                                                        • RegQueryValueExA.KERNELBASE ref: 004027A9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseQueryValue
                                                                                        • String ID:
                                                                                        • API String ID: 3356406503-0
                                                                                        • Opcode ID: 3a752099dc3ba32706746d708bf85e67e1f70151bae1a7f05650382248a4425e
                                                                                        • Instruction ID: eed0c90a6080577ec03916f51dc8e38553dd5cf0d5711bab45b55d63f478d8ae
                                                                                        • Opcode Fuzzy Hash: 3a752099dc3ba32706746d708bf85e67e1f70151bae1a7f05650382248a4425e
                                                                                        • Instruction Fuzzy Hash: E2D01230A4C505EBC7110BF09F0C52A7564AA0834033148777643B01E1CAFD940B761F
                                                                                        APIs
                                                                                        • CommandLineToArgvW.SHELL32 ref: 00402175
                                                                                        • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D683
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: ArgvCommandLineLocalTime
                                                                                        • String ID:
                                                                                        • API String ID: 561774760-0
                                                                                        • Opcode ID: 79145b21edf2ac6dda2109a267fdff3236d0004f234c2b47cbf863cbf4153f91
                                                                                        • Instruction ID: c9fac8fce97014ed45c11717307f247f8e5cf2d996a5b9b25bf419c26cb203c5
                                                                                        • Opcode Fuzzy Hash: 79145b21edf2ac6dda2109a267fdff3236d0004f234c2b47cbf863cbf4153f91
                                                                                        • Instruction Fuzzy Hash: 27C01230C08103EFC3002FE0AF0802C3AE0AA193413610A3FE087B56E0CBB8400B9B5E
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C1511E
                                                                                          • Part of subcall function 02C13D7E: htons.WS2_32(?), ref: 02C13DA2
                                                                                          • Part of subcall function 02C13D7E: htonl.WS2_32(00000000), ref: 02C13DB9
                                                                                          • Part of subcall function 02C13D7E: htonl.WS2_32(00000000), ref: 02C13DC0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: htonl$H_prologhtons
                                                                                        • String ID:
                                                                                        • API String ID: 4039807196-0
                                                                                        • Opcode ID: 2526759c9d64b374c86ba25330039e740a996e52caab1287d83c522774752ec8
                                                                                        • Instruction ID: 499403927361b7d9830d0f05d356babce91abc296985c0508222a560d2025b39
                                                                                        • Opcode Fuzzy Hash: 2526759c9d64b374c86ba25330039e740a996e52caab1287d83c522774752ec8
                                                                                        • Instruction Fuzzy Hash: 9A8169B1D0424E8ECF05DFA8D491AEEBBB5EF89314F10815AD855B7280EB355B05DFA0
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C4A000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c4a000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteFile
                                                                                        • String ID:
                                                                                        • API String ID: 4033686569-0
                                                                                        • Opcode ID: d555297dbdc848c54ca9384bf900fbd843fcb06e3ca054d7d67b3b27784116cb
                                                                                        • Instruction ID: 5c5e2b801b78bfe76a32d88c4c8eaa3c2de2078823bcecb9da375abe3152a5fe
                                                                                        • Opcode Fuzzy Hash: d555297dbdc848c54ca9384bf900fbd843fcb06e3ca054d7d67b3b27784116cb
                                                                                        • Instruction Fuzzy Hash: 25515AB250C620AFE7056E19EC85BBEBBE8EF58760F16093DE6C893740D63558408BD7
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C1E9C6
                                                                                          • Part of subcall function 02C11A01: TlsGetValue.KERNEL32 ref: 02C11A0A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prologValue
                                                                                        • String ID:
                                                                                        • API String ID: 3700342317-0
                                                                                        • Opcode ID: 5780d2f17800943539c420dfe89de69469708d8937b4bd5830b318cc4421d2fb
                                                                                        • Instruction ID: df2fa43823f0945afe530ea24b16cd2262313914f528845245350e667b8dea88
                                                                                        • Opcode Fuzzy Hash: 5780d2f17800943539c420dfe89de69469708d8937b4bd5830b318cc4421d2fb
                                                                                        • Instruction Fuzzy Hash: 7F2151B1904209AFDB00DFA4D441AEEBBF9FF49310F14451EE905E3280D771AA00EBA5
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C4A000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c4a000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteFile
                                                                                        • String ID:
                                                                                        • API String ID: 4033686569-0
                                                                                        • Opcode ID: d32f9c3eb6590c9b0b79d2dcb1871e697947d828a2ae4c8a5190860b9cc74306
                                                                                        • Instruction ID: 2c285740db7203edcb5b3f957eaa94f19835b805e6da8d3a0eaac7f9ba7d6a74
                                                                                        • Opcode Fuzzy Hash: d32f9c3eb6590c9b0b79d2dcb1871e697947d828a2ae4c8a5190860b9cc74306
                                                                                        • Instruction Fuzzy Hash: 740180B180C620AFE701AF19D8C15AAFBE4EF192A4F16092DE6C897700E6318844CBC3
                                                                                        APIs
                                                                                        • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02C133CC
                                                                                          • Part of subcall function 02C132AB: __EH_prolog.LIBCMT ref: 02C132B0
                                                                                          • Part of subcall function 02C132AB: RtlEnterCriticalSection.NTDLL(?), ref: 02C132C3
                                                                                          • Part of subcall function 02C132AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02C132EF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                                                        • String ID:
                                                                                        • API String ID: 1518410164-0
                                                                                        • Opcode ID: 392317e5496629601777e66f2c92c612f01646f4b06ff162729e3107962d90de
                                                                                        • Instruction ID: 68ce6deb149d0b81f78d9d2613cde0282fc0ec92f662c66dacb3be090af75060
                                                                                        • Opcode Fuzzy Hash: 392317e5496629601777e66f2c92c612f01646f4b06ff162729e3107962d90de
                                                                                        • Instruction Fuzzy Hash: 5C019270214606AFD708DF59D886F55FBA9FF85324F10835AE928872C0EB70E921DBA5
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C1E556
                                                                                          • Part of subcall function 02C126DB: RtlEnterCriticalSection.NTDLL(?), ref: 02C12706
                                                                                          • Part of subcall function 02C126DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C1272B
                                                                                          • Part of subcall function 02C126DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C35B53), ref: 02C12738
                                                                                          • Part of subcall function 02C126DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02C12778
                                                                                          • Part of subcall function 02C126DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02C127D9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                        • String ID:
                                                                                        • API String ID: 4293676635-0
                                                                                        • Opcode ID: 35fd93c8042fd6f2891b424ad6b04b0b524bc40659a6782c29cdc603927a5d4e
                                                                                        • Instruction ID: 439aebbbae85c4131e2c0777491f277ff4e121c142650f9c0514737dfea27baa
                                                                                        • Opcode Fuzzy Hash: 35fd93c8042fd6f2891b424ad6b04b0b524bc40659a6782c29cdc603927a5d4e
                                                                                        • Instruction Fuzzy Hash: F101DCB0910B089FC719CF1AC24098AFBF5EF88300B15C9AE944A8B321E771AA40CF90
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C1E335
                                                                                          • Part of subcall function 02C23B4C: _malloc.LIBCMT ref: 02C23B64
                                                                                          • Part of subcall function 02C1E551: __EH_prolog.LIBCMT ref: 02C1E556
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog$_malloc
                                                                                        • String ID:
                                                                                        • API String ID: 4254904621-0
                                                                                        • Opcode ID: c31fb2ff98672ef400a4ba818cf968ee89042a20d4ee8f79668a209692b3075a
                                                                                        • Instruction ID: 7ea74bd2bdde76b38158f221137e85c46956bde2034d193f9b224e63fed6eb2c
                                                                                        • Opcode Fuzzy Hash: c31fb2ff98672ef400a4ba818cf968ee89042a20d4ee8f79668a209692b3075a
                                                                                        • Instruction Fuzzy Hash: 3AE08CB1A00205ABCB0AAFA8D81176EB7A6EF44700F0045ADB80DD2240EF708A00AA14
                                                                                        APIs
                                                                                          • Part of subcall function 02C25C5A: __getptd_noexit.LIBCMT ref: 02C25C5B
                                                                                          • Part of subcall function 02C25C5A: __amsg_exit.LIBCMT ref: 02C25C68
                                                                                          • Part of subcall function 02C23493: __getptd_noexit.LIBCMT ref: 02C23497
                                                                                          • Part of subcall function 02C23493: __freeptd.LIBCMT ref: 02C234B1
                                                                                          • Part of subcall function 02C23493: RtlExitUserThread.NTDLL(?,00000000,?,02C23473,00000000), ref: 02C234BA
                                                                                        • __XcptFilter.LIBCMT ref: 02C2347F
                                                                                          • Part of subcall function 02C28D94: __getptd_noexit.LIBCMT ref: 02C28D98
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                                        • String ID:
                                                                                        • API String ID: 1405322794-0
                                                                                        • Opcode ID: 68bf1d3e8e92ec1bd2132c99011aae7decdf96c6291a841820dd12f77e5d8b7b
                                                                                        • Instruction ID: ee67e9f295908e37e1bcd616ab897b0654b3157ef8825c210c01cd844cb50605
                                                                                        • Opcode Fuzzy Hash: 68bf1d3e8e92ec1bd2132c99011aae7decdf96c6291a841820dd12f77e5d8b7b
                                                                                        • Instruction Fuzzy Hash: 88E0E6B19406119FEB08EBA0DC45F2E7766DF04311F600198E10167161DE78A948AE20
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C4A000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c4a000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3934441357-0
                                                                                        • Opcode ID: 1ba5bc16647f8f1f38432f278ffaafa989a59f88b910bdea54ba9acdca0c46a2
                                                                                        • Instruction ID: ff163dece5ac526edff6e8295d2fe18a314a7458e6b958cd4f76bdc22b138575
                                                                                        • Opcode Fuzzy Hash: 1ba5bc16647f8f1f38432f278ffaafa989a59f88b910bdea54ba9acdca0c46a2
                                                                                        • Instruction Fuzzy Hash: 94D0C9E148C71C9BD3263946EC893BAB3989B01312F490918D79102A40BE75A55886DF
                                                                                        APIs
                                                                                        • RegOpenKeyExA.KERNELBASE(80000002), ref: 00402785
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Open
                                                                                        • String ID:
                                                                                        • API String ID: 71445658-0
                                                                                        • Opcode ID: b9dfc41068c1b5d291bdbdbc84fddf3f64d5275fdf50a3483e31aeeb090e7f90
                                                                                        • Instruction ID: ca56b2446a588551f2403f31e7c053fbc99ac2fd5a3640d98c5fc45c2939eaf7
                                                                                        • Opcode Fuzzy Hash: b9dfc41068c1b5d291bdbdbc84fddf3f64d5275fdf50a3483e31aeeb090e7f90
                                                                                        • Instruction Fuzzy Hash: 01D01230D0C115D9D7048AE199087797A78AB00304F70087B9807F11C1D77D914EF62F
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: ManagerOpen
                                                                                        • String ID:
                                                                                        • API String ID: 1889721586-0
                                                                                        • Opcode ID: cdb7526835196681913ac0155e463db04f6b4f8e63d7ee15d1cff002c50a1800
                                                                                        • Instruction ID: 240b67f8705cb9076c0623859a7545af751c8d025e06b224c43a6711cbf49073
                                                                                        • Opcode Fuzzy Hash: cdb7526835196681913ac0155e463db04f6b4f8e63d7ee15d1cff002c50a1800
                                                                                        • Instruction Fuzzy Hash: F7B09270849002EBCB504EA04BC807AA5AAA2483023A4003B9206F61D0CA38490AA52E
                                                                                        APIs
                                                                                        • CreateDirectoryA.KERNELBASE ref: 0040DB3E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectory
                                                                                        • String ID:
                                                                                        • API String ID: 4241100979-0
                                                                                        • Opcode ID: a9629d5d2fb21f281e6044aa73513570e9f413eb4ce5910a4b5a35d18d45a0f4
                                                                                        • Instruction ID: fad92acf9b923c2af07deb86a728e4451b3f97c4118f46700dced8d837446823
                                                                                        • Opcode Fuzzy Hash: a9629d5d2fb21f281e6044aa73513570e9f413eb4ce5910a4b5a35d18d45a0f4
                                                                                        • Instruction Fuzzy Hash: 73B012B2C05001E7D20133901F1AE7A302C5D2038D3218077FB12700D3997E151F616F
                                                                                        APIs
                                                                                        • RegCloseKey.KERNELBASE(?), ref: 0040263F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close
                                                                                        • String ID:
                                                                                        • API String ID: 3535843008-0
                                                                                        • Opcode ID: 05a2ee5bebbc5d159e481fe2c33520640be66e01b3a834238b02adf1f8441739
                                                                                        • Instruction ID: 74a6d7cb786fbbe66452337ebc111935ecad2eb287567ffeef595b12702ef48a
                                                                                        • Opcode Fuzzy Hash: 05a2ee5bebbc5d159e481fe2c33520640be66e01b3a834238b02adf1f8441739
                                                                                        • Instruction Fuzzy Hash: 5DB01231D49008E7C70107D09F0CC5DB631BA0830033140777303300F086F95506670E
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: CopyFile
                                                                                        • String ID:
                                                                                        • API String ID: 1304948518-0
                                                                                        • Opcode ID: c083c7cfc82e9016a27fccbfa9f5961656b3f16f4cf7b66e01bab299863e5bba
                                                                                        • Instruction ID: c4a4222ff88a07967300a251c0495576c13a37ea384fb6842608f2ca133c09fe
                                                                                        • Opcode Fuzzy Hash: c083c7cfc82e9016a27fccbfa9f5961656b3f16f4cf7b66e01bab299863e5bba
                                                                                        • Instruction Fuzzy Hash: AE9002702041029BD2040A215B4C615276855046C1316497A6847E1090DA7580496529
                                                                                        APIs
                                                                                          • Part of subcall function 02C21610: OpenEventA.KERNEL32(00100002,00000000,00000000,A31C4731), ref: 02C216B0
                                                                                          • Part of subcall function 02C21610: CloseHandle.KERNEL32(00000000), ref: 02C216C5
                                                                                          • Part of subcall function 02C21610: ResetEvent.KERNEL32(00000000,A31C4731), ref: 02C216CF
                                                                                          • Part of subcall function 02C21610: CloseHandle.KERNEL32(00000000,A31C4731), ref: 02C21704
                                                                                        • TlsSetValue.KERNEL32(00000029,?), ref: 02C221AA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseEventHandle$OpenResetValue
                                                                                        • String ID:
                                                                                        • API String ID: 1556185888-0
                                                                                        • Opcode ID: 06cf58af0ea1d45f43a17f684dbcb994c3efd92492636263b180e4252f700266
                                                                                        • Instruction ID: 78c889f9239fb112a495c67bbbc8c8fbe61e0c06d0f69455ca8878a939b96572
                                                                                        • Opcode Fuzzy Hash: 06cf58af0ea1d45f43a17f684dbcb994c3efd92492636263b180e4252f700266
                                                                                        • Instruction Fuzzy Hash: 8E01DF75A40254ABD700CF68DC05B5ABBBCFB05670F104B2AF825D3380CB7169048AA4
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(000007D0), ref: 00402880
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Sleep
                                                                                        • String ID:
                                                                                        • API String ID: 3472027048-0
                                                                                        • Opcode ID: fcdf8377c6d591670fc2ab7deb0c0d8b04f78fe862352840c0f44e8a35e5a76a
                                                                                        • Instruction ID: dc7e34712b90a4a1d49b649de4b31b4b36ebb4f32c49b9ef89371c63b8583d10
                                                                                        • Opcode Fuzzy Hash: fcdf8377c6d591670fc2ab7deb0c0d8b04f78fe862352840c0f44e8a35e5a76a
                                                                                        • Instruction Fuzzy Hash: 10C00276D48501D6D30837E06E45B3535307714745F34963BEA07344F546BD044BAA0F
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000), ref: 0040D13C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: dc4d3f4b119927e28ce4ef4cb037440caf0631e8b0de32d9791d665ce5bdee7d
                                                                                        • Instruction ID: 46d8a236dd60763fed63611c77a9ddc440b4c311329ba46d719b5d6a320dcb47
                                                                                        • Opcode Fuzzy Hash: dc4d3f4b119927e28ce4ef4cb037440caf0631e8b0de32d9791d665ce5bdee7d
                                                                                        • Instruction Fuzzy Hash: 81B09236404126EFC21207A04A8C7A47650A708685F120121DA1ABB0D08AB4886996D5
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Sleep
                                                                                        • String ID:
                                                                                        • API String ID: 3472027048-0
                                                                                        • Opcode ID: fe0add5311c5579dce8cd4c7c79671da87a68a6a2ec4adbe056476ecdd2b1c1f
                                                                                        • Instruction ID: 87d70982a7b2a15c70736e2d032254c000848ca93dc8395af52185e3dc2b11a9
                                                                                        • Opcode Fuzzy Hash: fe0add5311c5579dce8cd4c7c79671da87a68a6a2ec4adbe056476ecdd2b1c1f
                                                                                        • Instruction Fuzzy Hash: 3CB00175948A01FAD7050BA0AA09B64BB31B714705F26012BA243758E18BBA556FAA8E
                                                                                        APIs
                                                                                          • Part of subcall function 02C19AD9: __EH_prolog.LIBCMT ref: 02C19ADE
                                                                                          • Part of subcall function 02C19AD9: _Allocate.LIBCPMT ref: 02C19B35
                                                                                          • Part of subcall function 02C19AD9: _memmove.LIBCMT ref: 02C19B8C
                                                                                        • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02C209A2
                                                                                        • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02C209AA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateErrorFormatH_prologLastMessage_memmove
                                                                                        • String ID: Unknown error$invalid string position
                                                                                        • API String ID: 1017912131-1837348584
                                                                                        • Opcode ID: 752ebbaa012683486b7aa22992fcd1d617cbb87d273630bec49a85ce81e28d3f
                                                                                        • Instruction ID: 33c938812b5cb3e7cf88653d830f273d73021bc16ec1fa8b5c17decc86f2bf1a
                                                                                        • Opcode Fuzzy Hash: 752ebbaa012683486b7aa22992fcd1d617cbb87d273630bec49a85ce81e28d3f
                                                                                        • Instruction Fuzzy Hash: C351BE70648341DFE714DF24C891B2FBBE4BBA8344F90092EF48297691DB71E648CB52
                                                                                        APIs
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02C24E96,?,?,?,00000001), ref: 02C2952D
                                                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02C29536
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                        • String ID:
                                                                                        • API String ID: 3192549508-0
                                                                                        • Opcode ID: 084f8f28a2a79e72ec59c6696c11fcb700bdcc4a6b981266b2114244e2527bb0
                                                                                        • Instruction ID: d5e81a8eb45caca88829d089e9b5e9f783b036c33855e5a69ea201a6b23ae8a0
                                                                                        • Opcode Fuzzy Hash: 084f8f28a2a79e72ec59c6696c11fcb700bdcc4a6b981266b2114244e2527bb0
                                                                                        • Instruction Fuzzy Hash: 69B0927548420CEBCB012B92EC0DB89BF68EB04662F004D10F60E440508B7254249AE1
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateService
                                                                                        • String ID:
                                                                                        • API String ID: 1592570254-0
                                                                                        • Opcode ID: 8e95771c23e8c6e3d91a148e3b7619d749bebc75584443c18e617c8894ae65a2
                                                                                        • Instruction ID: 7e43cd58b913195ca8fe3cf6c9af4156f387bce7921f6e62d15cd758d1c022dc
                                                                                        • Opcode Fuzzy Hash: 8e95771c23e8c6e3d91a148e3b7619d749bebc75584443c18e617c8894ae65a2
                                                                                        • Instruction Fuzzy Hash: 87C04C7090C010DACF249FA09F4CC2B3A35978432472244BAE142B71E0C7799E5ABA5D
                                                                                        APIs
                                                                                        • StartServiceCtrlDispatcherA.ADVAPI32 ref: 00402897
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: CtrlDispatcherServiceStart
                                                                                        • String ID:
                                                                                        • API String ID: 3789849863-0
                                                                                        • Opcode ID: d171440c70dddf5ff5f6f09b5c34b658e7916a85af511406e8e7e7b82395a660
                                                                                        • Instruction ID: 44d42dcb3c9eb455945ab79d64ca40490a768c7be7692145537aece49065146a
                                                                                        • Opcode Fuzzy Hash: d171440c70dddf5ff5f6f09b5c34b658e7916a85af511406e8e7e7b82395a660
                                                                                        • Instruction Fuzzy Hash:
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                                                        • Instruction ID: 89d01526bd6de0cf70893b6c7c5f9b4e000d9f08a48329308b7f2bbb9dae469c
                                                                                        • Opcode Fuzzy Hash: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                                                        • Instruction Fuzzy Hash: C2F082B1904309ABD714DF99D942B9DFBB8EB45310F208169D508A7340E6B17A159B94
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C124E6
                                                                                        • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02C124FC
                                                                                        • RtlEnterCriticalSection.NTDLL(?), ref: 02C1250E
                                                                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 02C1256D
                                                                                        • SetLastError.KERNEL32(00000000,?,74DEDFB0), ref: 02C1257F
                                                                                        • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,74DEDFB0), ref: 02C12599
                                                                                        • GetLastError.KERNEL32(?,74DEDFB0), ref: 02C125A2
                                                                                        • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C125F0
                                                                                        • InterlockedDecrement.KERNEL32(00000002), ref: 02C1262F
                                                                                        • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02C1268E
                                                                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C12699
                                                                                        • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02C126AD
                                                                                        • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,74DEDFB0), ref: 02C126BD
                                                                                        • GetLastError.KERNEL32(?,74DEDFB0), ref: 02C126C7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                                        • String ID:
                                                                                        • API String ID: 1213838671-0
                                                                                        • Opcode ID: 4f842987916d48007468426306a19b2a9de39772fd608a873da50281f5b90809
                                                                                        • Instruction ID: 75ed979782aca4f16d9ac4c390d17bc58ba4fdb0dd2f6d4f4e232ae416a95617
                                                                                        • Opcode Fuzzy Hash: 4f842987916d48007468426306a19b2a9de39772fd608a873da50281f5b90809
                                                                                        • Instruction Fuzzy Hash: C86171B5900219EFCB11DFA4D585AAEFBB9FF49314F10496AE906E3240D7349A04DFA1
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C14608
                                                                                          • Part of subcall function 02C23B4C: _malloc.LIBCMT ref: 02C23B64
                                                                                        • htons.WS2_32(?), ref: 02C14669
                                                                                        • htonl.WS2_32(?), ref: 02C1468C
                                                                                        • htonl.WS2_32(00000000), ref: 02C14693
                                                                                        • htons.WS2_32(00000000), ref: 02C14747
                                                                                        • _sprintf.LIBCMT ref: 02C1475D
                                                                                          • Part of subcall function 02C1898C: _memmove.LIBCMT ref: 02C189AC
                                                                                        • htons.WS2_32(?), ref: 02C146B0
                                                                                          • Part of subcall function 02C19737: __EH_prolog.LIBCMT ref: 02C1973C
                                                                                          • Part of subcall function 02C19737: RtlEnterCriticalSection.NTDLL(00000020), ref: 02C197B7
                                                                                          • Part of subcall function 02C19737: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C197D5
                                                                                          • Part of subcall function 02C11BA7: __EH_prolog.LIBCMT ref: 02C11BAC
                                                                                          • Part of subcall function 02C11BA7: RtlEnterCriticalSection.NTDLL ref: 02C11BBC
                                                                                          • Part of subcall function 02C11BA7: RtlLeaveCriticalSection.NTDLL ref: 02C11BEA
                                                                                          • Part of subcall function 02C11BA7: RtlEnterCriticalSection.NTDLL ref: 02C11C13
                                                                                          • Part of subcall function 02C11BA7: RtlLeaveCriticalSection.NTDLL ref: 02C11C56
                                                                                          • Part of subcall function 02C1DEF3: __EH_prolog.LIBCMT ref: 02C1DEF8
                                                                                        • htonl.WS2_32(?), ref: 02C1497C
                                                                                        • htonl.WS2_32(00000000), ref: 02C14983
                                                                                        • htonl.WS2_32(00000000), ref: 02C149C8
                                                                                        • htonl.WS2_32(00000000), ref: 02C149CF
                                                                                        • htons.WS2_32(?), ref: 02C149EF
                                                                                        • htons.WS2_32(?), ref: 02C149F9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                                                        • String ID:
                                                                                        • API String ID: 1645262487-0
                                                                                        • Opcode ID: ef7b1ee5d4237379c6dfe2bef44ee371c3d847b997a5adc890291a0e4f8a4784
                                                                                        • Instruction ID: 702c9dbca8af5571fd0b5da964117e9eb94c1170c8ed9f8ac33529840e63e0e6
                                                                                        • Opcode Fuzzy Hash: ef7b1ee5d4237379c6dfe2bef44ee371c3d847b997a5adc890291a0e4f8a4784
                                                                                        • Instruction Fuzzy Hash: 1A026C71C0025DEEEF25DFA4C846BEEBBB9AF09304F10455AE505B7280DB745A48EFA1
                                                                                        APIs
                                                                                        • RegisterServiceCtrlHandlerA.ADVAPI32(Draw Panel Cleaner 10.25.47,0040235E), ref: 004023C1
                                                                                        • SetServiceStatus.ADVAPI32(0040C408), ref: 00402420
                                                                                        • GetLastError.KERNEL32 ref: 00402422
                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                                                        • GetLastError.KERNEL32 ref: 00402450
                                                                                        • SetServiceStatus.ADVAPI32(0040C408), ref: 004024CA
                                                                                        Strings
                                                                                        • Draw Panel Cleaner 10.25.47, xrefs: 004023BC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Service$ErrorLastStatus$CreateCtrlEventHandlerRegister
                                                                                        • String ID: Draw Panel Cleaner 10.25.47
                                                                                        • API String ID: 2905805858-2223222615
                                                                                        • Opcode ID: e9876d2f1a2d11ea62e58e20cefa2c97a9c73c8cd214b6edffef01a1b6a72b5b
                                                                                        • Instruction ID: 26246bc156685e464645f4855d65d2e2b399e75ff43d370cbeaa02e593d77043
                                                                                        • Opcode Fuzzy Hash: e9876d2f1a2d11ea62e58e20cefa2c97a9c73c8cd214b6edffef01a1b6a72b5b
                                                                                        • Instruction Fuzzy Hash: AD212871440210EBC2109F26EFE99267FA8FBD5794711863FE540B22B2C7B9014ACF6D
                                                                                        APIs
                                                                                        • RtlDecodePointer.NTDLL(?), ref: 02C2833B
                                                                                        • _free.LIBCMT ref: 02C28354
                                                                                          • Part of subcall function 02C22F74: HeapFree.KERNEL32(00000000,00000000,?,02C25CD2,00000000,00000104,74DF0A60), ref: 02C22F88
                                                                                          • Part of subcall function 02C22F74: GetLastError.KERNEL32(00000000,?,02C25CD2,00000000,00000104,74DF0A60), ref: 02C22F9A
                                                                                        • _free.LIBCMT ref: 02C28367
                                                                                        • _free.LIBCMT ref: 02C28385
                                                                                        • _free.LIBCMT ref: 02C28397
                                                                                        • _free.LIBCMT ref: 02C283A8
                                                                                        • _free.LIBCMT ref: 02C283B3
                                                                                        • _free.LIBCMT ref: 02C283D7
                                                                                        • RtlEncodePointer.NTDLL(009899B8), ref: 02C283DE
                                                                                        • _free.LIBCMT ref: 02C283F3
                                                                                        • _free.LIBCMT ref: 02C28409
                                                                                        • _free.LIBCMT ref: 02C28431
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 3064303923-0
                                                                                        • Opcode ID: f3d857a34c81c7ae2c401e1a9fcf669b47b312c5cdc0f417b2d4de758ddc8100
                                                                                        • Instruction ID: 65271a55df389f4e883973a6f2abd1a0e01ee2a4013861521f1ff554e65f5aaf
                                                                                        • Opcode Fuzzy Hash: f3d857a34c81c7ae2c401e1a9fcf669b47b312c5cdc0f417b2d4de758ddc8100
                                                                                        • Instruction Fuzzy Hash: 1221AD7AD40230CBCB299F54F84070B77F9AB427247280B29E94893258CF31B96CDFA5
                                                                                        APIs
                                                                                        • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BBD
                                                                                        • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BD1
                                                                                        • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BFD
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C35
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C57
                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C70
                                                                                        • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403C83
                                                                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403CC1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                                        • String ID: 4/@
                                                                                        • API String ID: 1823725401-3101945251
                                                                                        • Opcode ID: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                                                        • Instruction ID: a2970ceca2a6c3f976dc545d3d2173026391ae6ff2d108e1c7f08cdddd2a955e
                                                                                        • Opcode Fuzzy Hash: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                                                        • Instruction Fuzzy Hash: AD31F27350C1245EE7202F785DC883B7E9CEA4534A711093FF942F3380EA798E81466D
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C13428
                                                                                        • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02C1346B
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 02C13472
                                                                                        • GetLastError.KERNEL32 ref: 02C13486
                                                                                        • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02C134D7
                                                                                        • RtlEnterCriticalSection.NTDLL(00000018), ref: 02C134ED
                                                                                        • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02C13518
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                                        • String ID: CancelIoEx$KERNEL32
                                                                                        • API String ID: 2902213904-434325024
                                                                                        • Opcode ID: 21b80e0e7ae1d07c97313cb611bf4eeaeeb34e790a82eb0cb8a55a300303a7f8
                                                                                        • Instruction ID: bfa546d87c29599a40f9d9768b7922d5d79bd699f28e9e030d763fe89a148a5b
                                                                                        • Opcode Fuzzy Hash: 21b80e0e7ae1d07c97313cb611bf4eeaeeb34e790a82eb0cb8a55a300303a7f8
                                                                                        • Instruction Fuzzy Hash: 0831B2B1900255DFDB11DF68C84576ABBF8FF8A314F00499AE805AB341DB70D915DFA1
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00404381,?,Microsoft Visual C++ Runtime Library,00012010,?,0040858C,?,004085DC,?,?,?,Runtime Error!Program: ), ref: 0040658A
                                                                                        • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004065A2
                                                                                        • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004065B3
                                                                                        • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004065C0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad
                                                                                        • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                                                        • API String ID: 2238633743-4044615076
                                                                                        • Opcode ID: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                                                        • Instruction ID: 34c45dea863b0ad37b671b2ee6745cf1fa65c172ae9c71c573f5c1b511995102
                                                                                        • Opcode Fuzzy Hash: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                                                        • Instruction Fuzzy Hash: FA017571A40201FFCB209FB5BFC492B3AE99B58690306193FB541F2291DE79C815DB68
                                                                                        APIs
                                                                                        • LCMapStringW.KERNEL32(00000000,00000100,00408658,00000001,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406899
                                                                                        • LCMapStringA.KERNEL32(00000000,00000100,00408654,00000001,00000000,00000000,?,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004068B5
                                                                                        • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,00406317,?,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 004068FE
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406936
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 0040698E
                                                                                        • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406317,00200020,00000000,?,00000000), ref: 004069A4
                                                                                        • LCMapStringW.KERNEL32(00000000,?,00406317,00000000,00406317,?,?,00406317,00200020,00000000,?,00000000), ref: 004069D7
                                                                                        • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 00406A3F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: String$ByteCharMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 352835431-0
                                                                                        • Opcode ID: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                                                        • Instruction ID: 8dbeb6cb8c932cbdef2775d2a29e2de0fc7c35b208bd80b0a47b5516e3ba15ce
                                                                                        • Opcode Fuzzy Hash: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                                                        • Instruction Fuzzy Hash: 3E518A71500209EBCF219F94CD45AAF7BB5FB49714F12413AF912B12A0C73A8C21DB69
                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 004042CA
                                                                                        • GetStdHandle.KERNEL32(000000F4,0040858C,00000000,?,00000000,00000000), ref: 004043A0
                                                                                        • WriteFile.KERNEL32(00000000), ref: 004043A7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$HandleModuleNameWrite
                                                                                        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                        • API String ID: 3784150691-4022980321
                                                                                        • Opcode ID: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                                                        • Instruction ID: ad501088bf1d437e3d5a217a77e101a13ac7783d72fc0021c8d9dd27a33d1b06
                                                                                        • Opcode Fuzzy Hash: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                                                        • Instruction Fuzzy Hash: 52318772600218AFDF2096608E45FDA736DAF85304F1004BFF944B61D1EA789D458A5D
                                                                                        APIs
                                                                                        • OpenEventA.KERNEL32(00100002,00000000,00000000,A31C4731), ref: 02C216B0
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C216C5
                                                                                        • ResetEvent.KERNEL32(00000000,A31C4731), ref: 02C216CF
                                                                                        • CloseHandle.KERNEL32(00000000,A31C4731), ref: 02C21704
                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,A31C4731), ref: 02C2177A
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C2178F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseEventHandle$CreateOpenReset
                                                                                        • String ID:
                                                                                        • API String ID: 1285874450-0
                                                                                        • Opcode ID: dd0f0f0bb4f5b1de35c70d78307f90f178420ccb798bf234c32e507639503980
                                                                                        • Instruction ID: d8418b71f0a96d28b9eea2ed141c50062d4f76f43265c7b2f76baa83ac354c0a
                                                                                        • Opcode Fuzzy Hash: dd0f0f0bb4f5b1de35c70d78307f90f178420ccb798bf234c32e507639503980
                                                                                        • Instruction Fuzzy Hash: DD414275D04368AFDF10CFA5C848BADB7B8EF45724F184619E41DEB281DB709A09CB90
                                                                                        APIs
                                                                                        • InterlockedExchange.KERNEL32(?,00000001), ref: 02C120AC
                                                                                        • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02C120CD
                                                                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C120D8
                                                                                        • InterlockedDecrement.KERNEL32(?), ref: 02C1213E
                                                                                        • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02C1217A
                                                                                        • InterlockedDecrement.KERNEL32(?), ref: 02C12187
                                                                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C121A6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                                        • String ID:
                                                                                        • API String ID: 1171374749-0
                                                                                        • Opcode ID: 53585f67fc814d94109d7a83d9cd1e86b9fb940d4b4a2ccba3c2440730b1a9f6
                                                                                        • Instruction ID: 156d3859cd7675f401a0f1d8eb2c7a1d2f9442cb3d23ebb2197b4c2635b60186
                                                                                        • Opcode Fuzzy Hash: 53585f67fc814d94109d7a83d9cd1e86b9fb940d4b4a2ccba3c2440730b1a9f6
                                                                                        • Instruction Fuzzy Hash: 134159B55047059FC321DF25C885A6BBBF9FFC9650F100A1EF89A82250D730E909EFA2
                                                                                        APIs
                                                                                          • Part of subcall function 02C21ED0: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02C2172E,?,?), ref: 02C21EFF
                                                                                          • Part of subcall function 02C21ED0: CloseHandle.KERNEL32(00000000,?,?,02C2172E,?,?), ref: 02C21F14
                                                                                          • Part of subcall function 02C21ED0: SetEvent.KERNEL32(00000000,02C2172E,?,?), ref: 02C21F27
                                                                                        • OpenEventA.KERNEL32(00100002,00000000,00000000,A31C4731), ref: 02C216B0
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C216C5
                                                                                        • ResetEvent.KERNEL32(00000000,A31C4731), ref: 02C216CF
                                                                                        • CloseHandle.KERNEL32(00000000,A31C4731), ref: 02C21704
                                                                                        • __CxxThrowException@8.LIBCMT ref: 02C21735
                                                                                          • Part of subcall function 02C2455A: RaiseException.KERNEL32(?,?,02C1FB5F,?,?,?,?,?,?,?,02C1FB5F,?,02C40F98,?), ref: 02C245AF
                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,A31C4731), ref: 02C2177A
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C2178F
                                                                                          • Part of subcall function 02C21C10: GetCurrentProcessId.KERNEL32(?), ref: 02C21C69
                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,A31C4731), ref: 02C2179F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                                        • String ID:
                                                                                        • API String ID: 2227236058-0
                                                                                        • Opcode ID: 4e548c7f07c85fa386cc3ad78d18e1c5db1a9c34727132cd7ec281e2a9f39f16
                                                                                        • Instruction ID: 8d294816831fd07d06611cc03a49c1a1ab5ee5d21600f99bc36095cd76de7542
                                                                                        • Opcode Fuzzy Hash: 4e548c7f07c85fa386cc3ad78d18e1c5db1a9c34727132cd7ec281e2a9f39f16
                                                                                        • Instruction Fuzzy Hash: 27315375D003689BDF20CBA4CC48BADB7B9EF45724F180119E81DE7282DBB09A19CB51
                                                                                        APIs
                                                                                        • __init_pointers.LIBCMT ref: 02C25D94
                                                                                          • Part of subcall function 02C28503: RtlEncodePointer.NTDLL(00000000), ref: 02C28506
                                                                                          • Part of subcall function 02C28503: __initp_misc_winsig.LIBCMT ref: 02C28521
                                                                                          • Part of subcall function 02C28503: GetModuleHandleW.KERNEL32(kernel32.dll,?,02C41598,00000008,00000003,02C40F7C,?,00000001), ref: 02C29281
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02C29295
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02C292A8
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02C292BB
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02C292CE
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02C292E1
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02C292F4
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02C29307
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02C2931A
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02C2932D
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02C29340
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02C29353
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02C29366
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02C29379
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02C2938C
                                                                                          • Part of subcall function 02C28503: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02C2939F
                                                                                        • __mtinitlocks.LIBCMT ref: 02C25D99
                                                                                        • __mtterm.LIBCMT ref: 02C25DA2
                                                                                          • Part of subcall function 02C25E0A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02C28939
                                                                                          • Part of subcall function 02C25E0A: _free.LIBCMT ref: 02C28940
                                                                                          • Part of subcall function 02C25E0A: RtlDeleteCriticalSection.NTDLL(02C43978), ref: 02C28962
                                                                                        • __calloc_crt.LIBCMT ref: 02C25DC7
                                                                                        • __initptd.LIBCMT ref: 02C25DE9
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 02C25DF0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                                        • String ID:
                                                                                        • API String ID: 3567560977-0
                                                                                        • Opcode ID: e246245180942d0a09edc39020c1b063ead0ad9fdf2a24028f2eb1fc21b4ff10
                                                                                        • Instruction ID: 6042646cb1e822620a6d5cc387188a97598eadf3b304d2a76a43aa938beaadde
                                                                                        • Opcode Fuzzy Hash: e246245180942d0a09edc39020c1b063ead0ad9fdf2a24028f2eb1fc21b4ff10
                                                                                        • Instruction Fuzzy Hash: F8F0F0326582715EF62C7A7A7C4974B2786DB417B0F700B29E064E50C4FF21850969A0
                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02C23473,00000000), ref: 02C234DB
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 02C234E2
                                                                                        • RtlEncodePointer.NTDLL(00000000), ref: 02C234EE
                                                                                        • RtlDecodePointer.NTDLL(00000001), ref: 02C2350B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                        • String ID: RoInitialize$combase.dll
                                                                                        • API String ID: 3489934621-340411864
                                                                                        • Opcode ID: 70410a0b54e4809d25d458437fab1675e4f3a8b2de1943af33e2977ec358ff4b
                                                                                        • Instruction ID: 3c6adefda5d4e0678f56ee4471b810fbe168e47de128e35e05700fae7ea4607c
                                                                                        • Opcode Fuzzy Hash: 70410a0b54e4809d25d458437fab1675e4f3a8b2de1943af33e2977ec358ff4b
                                                                                        • Instruction Fuzzy Hash: 12E012F5DD0350AAEF205F70EC09B073BDDA742712F104E64B406D1184CBB9616C8F54
                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02C234B0), ref: 02C235B0
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 02C235B7
                                                                                        • RtlEncodePointer.NTDLL(00000000), ref: 02C235C2
                                                                                        • RtlDecodePointer.NTDLL(02C234B0), ref: 02C235DD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                        • String ID: RoUninitialize$combase.dll
                                                                                        • API String ID: 3489934621-2819208100
                                                                                        • Opcode ID: 88300024842f0780dd0a477f837ac65f99b07943cf15fdedc412f7e1215fb2ab
                                                                                        • Instruction ID: 8a56ee50b5179fd31fbdfd25360b291f3d74f3917aceb6a6468b1984bfbedc3e
                                                                                        • Opcode Fuzzy Hash: 88300024842f0780dd0a477f837ac65f99b07943cf15fdedc412f7e1215fb2ab
                                                                                        • Instruction Fuzzy Hash: 02E0BFB5DD0304ABEB115F60AD0DB1676ADB742705F204E64F506D1198DBB46128CB94
                                                                                        APIs
                                                                                        • TlsGetValue.KERNEL32(00000029,A31C4731,?,?,?,?,00000000,02C36AB8,000000FF,02C221CA), ref: 02C21F6A
                                                                                        • TlsSetValue.KERNEL32(00000029,02C221CA,?,?,00000000), ref: 02C21FD7
                                                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02C22001
                                                                                        • HeapFree.KERNEL32(00000000), ref: 02C22004
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: HeapValue$FreeProcess
                                                                                        • String ID:
                                                                                        • API String ID: 1812714009-0
                                                                                        • Opcode ID: 3e9b0cd2b62b2935ac18b33f40d35af83f1964fb8c4445f22429fe2e7b4647fc
                                                                                        • Instruction ID: 818588fe26f8d54fea740812a44678a58869d2590e01e72ffe6e76e02b92a46e
                                                                                        • Opcode Fuzzy Hash: 3e9b0cd2b62b2935ac18b33f40d35af83f1964fb8c4445f22429fe2e7b4647fc
                                                                                        • Instruction Fuzzy Hash: 8051F1759043289FD720CF29C444B1ABBE4FF88764F098A58E82997380CB71ED08CBD2
                                                                                        APIs
                                                                                        • _ValidateScopeTableHandlers.LIBCMT ref: 02C35790
                                                                                        • __FindPESection.LIBCMT ref: 02C357AA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: FindHandlersScopeSectionTableValidate
                                                                                        • String ID:
                                                                                        • API String ID: 876702719-0
                                                                                        • Opcode ID: ec28117eb315c923a4603a6553ca5c9963af4b2112542f1ae47b3c2f996acbd0
                                                                                        • Instruction ID: b521d058821d633d308cf1a8f50e96f1e9bdf2def0b7090fcfb991e82e65e9fd
                                                                                        • Opcode Fuzzy Hash: ec28117eb315c923a4603a6553ca5c9963af4b2112542f1ae47b3c2f996acbd0
                                                                                        • Instruction Fuzzy Hash: B8A1BF75E407158FDB22CF18C8807AAB7B5EB883A4F954E69DC05AB390E731E945CB90
                                                                                        APIs
                                                                                        • GetStringTypeW.KERNEL32(00000001,00408658,00000001,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040674D
                                                                                        • GetStringTypeA.KERNEL32(00000000,00000001,00408654,00000001,?,?,00000000,00000000,00000001), ref: 00406767
                                                                                        • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040679B
                                                                                        • MultiByteToWideChar.KERNEL32(00406317,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004067D3
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406829
                                                                                        • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040683B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: StringType$ByteCharMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 3852931651-0
                                                                                        • Opcode ID: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                                                        • Instruction ID: 7abba187aa9a424c0dbe6a0d425d95b5373609879485ba3de4d3a8f21a169ece
                                                                                        • Opcode Fuzzy Hash: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                                                        • Instruction Fuzzy Hash: 11418D72901209EFCF209F94CD85EAF3B79FB04754F11453AF912F2290D73989608B99
                                                                                        APIs
                                                                                        • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02C11CB1
                                                                                        • CloseHandle.KERNEL32(?), ref: 02C11CBA
                                                                                        • InterlockedExchangeAdd.KERNEL32(02C4727C,00000000), ref: 02C11CC6
                                                                                        • TerminateThread.KERNEL32(?,00000000), ref: 02C11CD4
                                                                                        • QueueUserAPC.KERNEL32(02C11E7C,?,00000000), ref: 02C11CE1
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02C11CEC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                                        • String ID:
                                                                                        • API String ID: 1946104331-0
                                                                                        • Opcode ID: 8dceb577132d266f4f0c45efeaf23f8b3bf7381f001a942b2ce9757f469c6dd2
                                                                                        • Instruction ID: 9b550e090cd5ad0ea0a0d3bd85589c80ac07c55ed19f002cb9d8d406deee7ca6
                                                                                        • Opcode Fuzzy Hash: 8dceb577132d266f4f0c45efeaf23f8b3bf7381f001a942b2ce9757f469c6dd2
                                                                                        • Instruction Fuzzy Hash: 00F0A471940214BFDB204B96DD0DE57FFBCEB85720B004B5DF66AC2190DBB09914DBA0
                                                                                        APIs
                                                                                        • GetVersionExA.KERNEL32 ref: 00403ECB
                                                                                        • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00403F00
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F60
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentFileModuleNameVariableVersion
                                                                                        • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                                        • API String ID: 1385375860-4131005785
                                                                                        • Opcode ID: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                                                        • Instruction ID: b9728f854654bad712525c43123df79641ae2587965f18a3091eb02ea7af310c
                                                                                        • Opcode Fuzzy Hash: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                                                        • Instruction Fuzzy Hash: 42312771D002896DEB319A309C45BDA7F7C9B12309F2400FBE545F52C2D6398F8A8718
                                                                                        APIs
                                                                                        • std::exception::exception.LIBCMT ref: 02C2197F
                                                                                          • Part of subcall function 02C224D3: std::exception::_Copy_str.LIBCMT ref: 02C224EC
                                                                                          • Part of subcall function 02C20D50: __CxxThrowException@8.LIBCMT ref: 02C20DAE
                                                                                        • std::exception::exception.LIBCMT ref: 02C219DE
                                                                                        Strings
                                                                                        • $, xrefs: 02C219E3
                                                                                        • boost unique_lock owns already the mutex, xrefs: 02C219CD
                                                                                        • boost unique_lock has no mutex, xrefs: 02C2196E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                                        • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                                        • API String ID: 2140441600-46888669
                                                                                        • Opcode ID: 05ce72926a70bc6ea8d5a048290ac0d5d5071e9de9f3facbf32245fdc1d3ffb2
                                                                                        • Instruction ID: 9c113f0ef5ac043052254d46a370f7f3ec5f8ed9e52b9d833b4d8097bcab9e14
                                                                                        • Opcode Fuzzy Hash: 05ce72926a70bc6ea8d5a048290ac0d5d5071e9de9f3facbf32245fdc1d3ffb2
                                                                                        • Instruction Fuzzy Hash: F92126B15083909FD721DF24C54475BBBE9BF88708F504E5EF4A587280DBB5A908DF92
                                                                                        APIs
                                                                                        • InterlockedExchange.KERNEL32(?,00000001), ref: 02C12350
                                                                                        • InterlockedExchange.KERNEL32(?,00000001), ref: 02C12360
                                                                                        • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C12370
                                                                                        • GetLastError.KERNEL32 ref: 02C1237A
                                                                                          • Part of subcall function 02C11712: __EH_prolog.LIBCMT ref: 02C11717
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                                        • String ID: pqcs
                                                                                        • API String ID: 1619523792-2559862021
                                                                                        • Opcode ID: f54534cf0039992f2d2a6c969245727206528549a6ab97c97b31fa8d93d6566d
                                                                                        • Instruction ID: dd17ffbe9e5192d8ccb9dd6b1f5f2044d9d85238ec420f5603a2c204d83f7cd7
                                                                                        • Opcode Fuzzy Hash: f54534cf0039992f2d2a6c969245727206528549a6ab97c97b31fa8d93d6566d
                                                                                        • Instruction Fuzzy Hash: 38F05BB0940318AFDB20AF749909B6BB7ACEF46701F004955E909D3140F770D5149BD1
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C14035
                                                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 02C14042
                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02C14049
                                                                                        • std::exception::exception.LIBCMT ref: 02C14063
                                                                                          • Part of subcall function 02C1A6CA: __EH_prolog.LIBCMT ref: 02C1A6CF
                                                                                          • Part of subcall function 02C1A6CA: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C1A6DE
                                                                                          • Part of subcall function 02C1A6CA: __CxxThrowException@8.LIBCMT ref: 02C1A6FD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                                        • String ID: bad allocation
                                                                                        • API String ID: 3112922283-2104205924
                                                                                        • Opcode ID: d6322f4ce6f6b90da0af1cb5f04d7b69e7efea0f0c9f029f79651cab6b9104cb
                                                                                        • Instruction ID: 153235b99eb9945658091f40d9349b0e94e8306bc9ee0ee06b5c4a017fada123
                                                                                        • Opcode Fuzzy Hash: d6322f4ce6f6b90da0af1cb5f04d7b69e7efea0f0c9f029f79651cab6b9104cb
                                                                                        • Instruction Fuzzy Hash: 65F08CB1E40209ABCB11EFE0D908BEFBB79EB08341F404A59E915A2240DB344218DF91
                                                                                        APIs
                                                                                        • GetStartupInfoA.KERNEL32(?), ref: 00403D2D
                                                                                        • GetFileType.KERNEL32(00000800), ref: 00403DD3
                                                                                        • GetStdHandle.KERNEL32(-000000F6), ref: 00403E2C
                                                                                        • GetFileType.KERNEL32(00000000), ref: 00403E3A
                                                                                        • SetHandleCount.KERNEL32 ref: 00403E71
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileHandleType$CountInfoStartup
                                                                                        • String ID:
                                                                                        • API String ID: 1710529072-0
                                                                                        • Opcode ID: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                                                        • Instruction ID: 0b7b95883a4e689196e32d1b42849a04f4efe08137134e81777c7f486c9ce5ca
                                                                                        • Opcode Fuzzy Hash: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                                                        • Instruction Fuzzy Hash: 025125716046458BD7218F38CE847667FA8AF11722F15437AE4A2FB3E0C7389A45CB8D
                                                                                        APIs
                                                                                          • Part of subcall function 02C21A50: CloseHandle.KERNEL32(00000000,A31C4731), ref: 02C21AA1
                                                                                          • Part of subcall function 02C21A50: WaitForSingleObject.KERNEL32(?,000000FF,A31C4731,?,?,?,?,A31C4731,02C21A23,A31C4731), ref: 02C21AB8
                                                                                        • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C21D1E
                                                                                        • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C21D3E
                                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02C21D77
                                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02C21DCB
                                                                                        • SetEvent.KERNEL32(?), ref: 02C21DD2
                                                                                          • Part of subcall function 02C1418C: CloseHandle.KERNEL32(00000000,?,02C21D05), ref: 02C141B0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                                        • String ID:
                                                                                        • API String ID: 4166353394-0
                                                                                        • Opcode ID: 8b34eca01fd59b3b7f3f4182b106548387c73a1528fb8f2ac51792aa40874fea
                                                                                        • Instruction ID: 7ddc12024460f50101e7377c385602f0d17d7a05d9653158eb756dce30d46c60
                                                                                        • Opcode Fuzzy Hash: 8b34eca01fd59b3b7f3f4182b106548387c73a1528fb8f2ac51792aa40874fea
                                                                                        • Instruction Fuzzy Hash: 2B410176640321DBDB279F29CC80B27B7A4EF85724F180668EC1CDB286DB74D8198B91
                                                                                        APIs
                                                                                        • InterlockedExchange.KERNEL32(?,00000001), ref: 02C120AC
                                                                                        • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02C120CD
                                                                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C120D8
                                                                                        • InterlockedDecrement.KERNEL32(?), ref: 02C1213E
                                                                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C121A6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Interlocked$Exchange$DecrementTimerWaitable
                                                                                        • String ID:
                                                                                        • API String ID: 1611172436-0
                                                                                        • Opcode ID: 684619f3016d043d378f7fd8e977e2a067bc2f7dac0b820435805c3fdd3d4cf1
                                                                                        • Instruction ID: 586abf60a4f501603ac3867c9e6d3b93a1eae2f4e7f557b9a8659e03b5d8dc9f
                                                                                        • Opcode Fuzzy Hash: 684619f3016d043d378f7fd8e977e2a067bc2f7dac0b820435805c3fdd3d4cf1
                                                                                        • Instruction Fuzzy Hash: 6F31AD761047019FC310DF25C885A6BF7F9EFC9610F140A1EF89683250D730E90AEB92
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C1E0FD
                                                                                          • Part of subcall function 02C11A01: TlsGetValue.KERNEL32 ref: 02C11A0A
                                                                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C1E17C
                                                                                        • RtlEnterCriticalSection.NTDLL(?), ref: 02C1E198
                                                                                        • InterlockedIncrement.KERNEL32(02C45190), ref: 02C1E1BD
                                                                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 02C1E1D2
                                                                                          • Part of subcall function 02C127F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02C1284E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                                        • String ID:
                                                                                        • API String ID: 1578506061-0
                                                                                        • Opcode ID: 2eae84b56ec4974abb9662f7c634a81c11ed49191120e0aa129d01c15dcd0d13
                                                                                        • Instruction ID: ff1479e9e5060031ab7db33c54a8717b5fba4feee16ea762ad0f1f7658f1bbcf
                                                                                        • Opcode Fuzzy Hash: 2eae84b56ec4974abb9662f7c634a81c11ed49191120e0aa129d01c15dcd0d13
                                                                                        • Instruction Fuzzy Hash: 0A3148B1901308DFCB10DFA8C9446AABBF9FF49310F14895EE849D7641E774A604EFA0
                                                                                        APIs
                                                                                        • _malloc.LIBCMT ref: 02C303B0
                                                                                          • Part of subcall function 02C22FAC: __FF_MSGBANNER.LIBCMT ref: 02C22FC3
                                                                                          • Part of subcall function 02C22FAC: __NMSG_WRITE.LIBCMT ref: 02C22FCA
                                                                                          • Part of subcall function 02C22FAC: RtlAllocateHeap.NTDLL(00980000,00000000,00000001), ref: 02C22FEF
                                                                                        • _free.LIBCMT ref: 02C303C3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap_free_malloc
                                                                                        • String ID:
                                                                                        • API String ID: 1020059152-0
                                                                                        • Opcode ID: 2c1aecf428142a90e1e7d40392360075476ca3b69929f18e3be20afd7c4af30c
                                                                                        • Instruction ID: f60120d2911493b3eebe3846503fea1148cfad34e530a930d553a5ab0db3c4a3
                                                                                        • Opcode Fuzzy Hash: 2c1aecf428142a90e1e7d40392360075476ca3b69929f18e3be20afd7c4af30c
                                                                                        • Instruction Fuzzy Hash: 76112973804625ABCF263F70A84475B37999F003B4F104E25F90D9A190DF34CA54EEE0
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C121DA
                                                                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C121ED
                                                                                        • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02C12224
                                                                                        • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02C12237
                                                                                        • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02C12261
                                                                                          • Part of subcall function 02C12341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C12350
                                                                                          • Part of subcall function 02C12341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C12360
                                                                                          • Part of subcall function 02C12341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C12370
                                                                                          • Part of subcall function 02C12341: GetLastError.KERNEL32 ref: 02C1237A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                        • String ID:
                                                                                        • API String ID: 1856819132-0
                                                                                        • Opcode ID: c5630e45d8ebd35b297f12dc0e3b1e38218f6dcfa6fb0b0214169ba66804f774
                                                                                        • Instruction ID: ff4482df15b7aebbc6a19f16b382ce62d192b9851701385ce62ed1ee809bb0c1
                                                                                        • Opcode Fuzzy Hash: c5630e45d8ebd35b297f12dc0e3b1e38218f6dcfa6fb0b0214169ba66804f774
                                                                                        • Instruction Fuzzy Hash: BE117FB5D04128EBCB159FA8D8056AEFBBAFB55320F004A2AEC15E2250D7714614EFD1
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C1229D
                                                                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C122B0
                                                                                        • TlsGetValue.KERNEL32 ref: 02C122E7
                                                                                        • TlsSetValue.KERNEL32(?), ref: 02C12300
                                                                                        • TlsSetValue.KERNEL32(?,?,?), ref: 02C1231C
                                                                                          • Part of subcall function 02C12341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C12350
                                                                                          • Part of subcall function 02C12341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C12360
                                                                                          • Part of subcall function 02C12341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C12370
                                                                                          • Part of subcall function 02C12341: GetLastError.KERNEL32 ref: 02C1237A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                        • String ID:
                                                                                        • API String ID: 1856819132-0
                                                                                        • Opcode ID: 887ee07d8b534a1ae02cd6f97e3b6e9e3fdde5d80b8669abc5d700c16413c77b
                                                                                        • Instruction ID: 877494e3c49bdc943bd8ec2264991dff73fe710e262d2ae94a86eaa7546ae24c
                                                                                        • Opcode Fuzzy Hash: 887ee07d8b534a1ae02cd6f97e3b6e9e3fdde5d80b8669abc5d700c16413c77b
                                                                                        • Instruction Fuzzy Hash: 25115EB5D00128EBCB119FA9D8446AEFFBAFF59310F00492AE804A3250DB714A14EFD1
                                                                                        APIs
                                                                                          • Part of subcall function 02C1B165: __EH_prolog.LIBCMT ref: 02C1B16A
                                                                                        • __CxxThrowException@8.LIBCMT ref: 02C1BD2F
                                                                                          • Part of subcall function 02C2455A: RaiseException.KERNEL32(?,?,02C1FB5F,?,?,?,?,?,?,?,02C1FB5F,?,02C40F98,?), ref: 02C245AF
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02C41DB4,?,00000001), ref: 02C1BD45
                                                                                        • InterlockedExchange.KERNEL32(?,00000001), ref: 02C1BD58
                                                                                        • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02C41DB4,?,00000001), ref: 02C1BD68
                                                                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C1BD76
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                                        • String ID:
                                                                                        • API String ID: 2725315915-0
                                                                                        • Opcode ID: c456282e4711f04ce539f7e41064f6c7096abfafd89c8f4fc51cfbd6794d17b6
                                                                                        • Instruction ID: 229108e639bcec6a2d196f3df7c157e2de0aadd59d09d144563eab000e3d85e1
                                                                                        • Opcode Fuzzy Hash: c456282e4711f04ce539f7e41064f6c7096abfafd89c8f4fc51cfbd6794d17b6
                                                                                        • Instruction Fuzzy Hash: F90186B6A402056FDB24ABA4DC8AF8A77ADAB04719F004915F625D6190D770EC099F50
                                                                                        APIs
                                                                                        • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C12432
                                                                                        • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C12445
                                                                                        • RtlEnterCriticalSection.NTDLL(?), ref: 02C12454
                                                                                        • InterlockedExchange.KERNEL32(?,00000001), ref: 02C12469
                                                                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 02C12470
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                                        • String ID:
                                                                                        • API String ID: 747265849-0
                                                                                        • Opcode ID: b80c27ad71fad2404a23cb002e43892aef56ec47cd57a3dad8d030cdbd9e3a7b
                                                                                        • Instruction ID: 151e34319b1e4c43033bb9066c87f8cd9883ace42a69cc2140bcc76078113b78
                                                                                        • Opcode Fuzzy Hash: b80c27ad71fad2404a23cb002e43892aef56ec47cd57a3dad8d030cdbd9e3a7b
                                                                                        • Instruction Fuzzy Hash: 61F01DB6640214BBD6049AA0ED4AF96B72CFB45711F804911F701D6480D771AA24CBE1
                                                                                        APIs
                                                                                        • InterlockedIncrement.KERNEL32(?), ref: 02C11ED2
                                                                                        • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02C11EEA
                                                                                        • RtlEnterCriticalSection.NTDLL(?), ref: 02C11EF9
                                                                                        • InterlockedExchange.KERNEL32(?,00000001), ref: 02C11F0E
                                                                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 02C11F15
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                                        • String ID:
                                                                                        • API String ID: 830998967-0
                                                                                        • Opcode ID: abee00698aba0cf5cfbeaa44699b892e2527ea475c7fa850ee8783e8d849d360
                                                                                        • Instruction ID: 77eda738dd4d388ecedd7ea807a780ecd0a783cb89072cdaa3c55ab31f418cf4
                                                                                        • Opcode Fuzzy Hash: abee00698aba0cf5cfbeaa44699b892e2527ea475c7fa850ee8783e8d849d360
                                                                                        • Instruction Fuzzy Hash: D5F067B2640208BBDB00AFA0ED88FC6BB2CFF05305F000912F20186440CB71AA28CBE0
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: invalid string position$string too long
                                                                                        • API String ID: 4104443479-4289949731
                                                                                        • Opcode ID: c4d3692c83742cd49868f9ac7b51ced785aee2e50e7038b68530426042393cd6
                                                                                        • Instruction ID: 5d8d7f7d895ca54d0060d392e93f8cc953ac8fcfe0ba807f15f65a1d57f639c6
                                                                                        • Opcode Fuzzy Hash: c4d3692c83742cd49868f9ac7b51ced785aee2e50e7038b68530426042393cd6
                                                                                        • Instruction Fuzzy Hash: BC41B3317043049BF724DE69DC86A56B7AAEF83754B140A2DF856C7781CB70E904EBA0
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C130C3
                                                                                        • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02C13102
                                                                                        • _memcmp.LIBCMT ref: 02C13141
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressErrorLastString_memcmp
                                                                                        • String ID: 255.255.255.255
                                                                                        • API String ID: 1618111833-2422070025
                                                                                        • Opcode ID: 768ae3febbc7bec5d6b8e20db3aa243d6265f07e1daeb6952467a459854ddbaa
                                                                                        • Instruction ID: 273bd10da399dc224749b1abf3140dd748161b253e43e0212f18a689c1f0e927
                                                                                        • Opcode Fuzzy Hash: 768ae3febbc7bec5d6b8e20db3aa243d6265f07e1daeb6952467a459854ddbaa
                                                                                        • Instruction Fuzzy Hash: 8A31B571A00358DFDB309F64CC8176EB7B6BF86328F2049AAEC5597280DB719945DB90
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C11F5B
                                                                                        • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02C11FC5
                                                                                        • GetLastError.KERNEL32(?,00000000), ref: 02C11FD2
                                                                                          • Part of subcall function 02C11712: __EH_prolog.LIBCMT ref: 02C11717
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                                        • String ID: iocp
                                                                                        • API String ID: 998023749-976528080
                                                                                        • Opcode ID: bb758ff7b4bd6127aa21afd9b80ad25864124ca3d81b373b77f37b1136f584b1
                                                                                        • Instruction ID: aed800f5b28e75055f91af0a81601f94f88ed324be6cfda5b5e94fc5d6ad2138
                                                                                        • Opcode Fuzzy Hash: bb758ff7b4bd6127aa21afd9b80ad25864124ca3d81b373b77f37b1136f584b1
                                                                                        • Instruction Fuzzy Hash: 6D21E8B1901B449FC720DF6AC50055BFBF8FF95720B108A1FE5A693A90D7B0A604DF91
                                                                                        APIs
                                                                                        • _malloc.LIBCMT ref: 02C23B64
                                                                                          • Part of subcall function 02C22FAC: __FF_MSGBANNER.LIBCMT ref: 02C22FC3
                                                                                          • Part of subcall function 02C22FAC: __NMSG_WRITE.LIBCMT ref: 02C22FCA
                                                                                          • Part of subcall function 02C22FAC: RtlAllocateHeap.NTDLL(00980000,00000000,00000001), ref: 02C22FEF
                                                                                        • std::exception::exception.LIBCMT ref: 02C23B82
                                                                                        • __CxxThrowException@8.LIBCMT ref: 02C23B97
                                                                                          • Part of subcall function 02C2455A: RaiseException.KERNEL32(?,?,02C1FB5F,?,?,?,?,?,?,?,02C1FB5F,?,02C40F98,?), ref: 02C245AF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                                        • String ID: bad allocation
                                                                                        • API String ID: 3074076210-2104205924
                                                                                        • Opcode ID: c4152fdc7167cd34d7e4e83e473bd9468db561361b45fe80656e1597b3a127f5
                                                                                        • Instruction ID: 1a0dca863c2a25021b248fc0dd0551429a205cfb8963e68eb63763958906cded
                                                                                        • Opcode Fuzzy Hash: c4152fdc7167cd34d7e4e83e473bd9468db561361b45fe80656e1597b3a127f5
                                                                                        • Instruction Fuzzy Hash: 02E0657090026EA6DF15FFA4CC05DAF776DAB00314F5045A5EC14A7190DF719A1CEEE1
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C137B6
                                                                                        • __localtime64.LIBCMT ref: 02C137C1
                                                                                          • Part of subcall function 02C22600: __gmtime64_s.LIBCMT ref: 02C22613
                                                                                        • std::exception::exception.LIBCMT ref: 02C137D9
                                                                                          • Part of subcall function 02C224D3: std::exception::_Copy_str.LIBCMT ref: 02C224EC
                                                                                          • Part of subcall function 02C1A528: __EH_prolog.LIBCMT ref: 02C1A52D
                                                                                          • Part of subcall function 02C1A528: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C1A53C
                                                                                          • Part of subcall function 02C1A528: __CxxThrowException@8.LIBCMT ref: 02C1A55B
                                                                                        Strings
                                                                                        • could not convert calendar time to UTC time, xrefs: 02C137CE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                                        • String ID: could not convert calendar time to UTC time
                                                                                        • API String ID: 1963798777-2088861013
                                                                                        • Opcode ID: 7f7aae383ee94fe9d03761c8c2834a510439cf0e0ce1a4221fec42cd6d2290d7
                                                                                        • Instruction ID: 66e52f0c7bad624bc310ddd2fd20dda22f860ce926da25e064dde8aa50d4e116
                                                                                        • Opcode Fuzzy Hash: 7f7aae383ee94fe9d03761c8c2834a510439cf0e0ce1a4221fec42cd6d2290d7
                                                                                        • Instruction Fuzzy Hash: D7E06DF1D042099BCB01EFA4D9007EFB779FF05304F404999E815A2140DB354609EF85
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(KERNEL32,00402E6A), ref: 0040315F
                                                                                        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040316F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                        • API String ID: 1646373207-3105848591
                                                                                        • Opcode ID: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                                                        • Instruction ID: 396ae008ee37b43aaac66eedf252cb0d6854bca9fd0baad0eaa83bc1c4717f20
                                                                                        • Opcode Fuzzy Hash: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                                                        • Instruction Fuzzy Hash: 14C01270380B00A6EA201FB20F0AB2628AC1B48B03F1800BEA289F81C0CE7CC600843D
                                                                                        APIs
                                                                                        • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,0040403A), ref: 00404C3D
                                                                                        • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,0040403A), ref: 00404C61
                                                                                        • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,0040403A), ref: 00404C7B
                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,0040403A), ref: 00404D3C
                                                                                        • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,0040403A), ref: 00404D53
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual$FreeHeap
                                                                                        • String ID:
                                                                                        • API String ID: 714016831-0
                                                                                        • Opcode ID: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                                                        • Instruction ID: 583ec5426b209604bff2a02b3d2478297b9ba55a468d27544d52312baf66a8bd
                                                                                        • Opcode Fuzzy Hash: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                                                        • Instruction Fuzzy Hash: BC31E2B15417019BE3348F24EE44B22B7A0EBC8754F11863AE665B73E1EB78A844CB5C
                                                                                        APIs
                                                                                        • VirtualFree.KERNEL32(?,00008000,00004000,74DEDFF0,?,00000000), ref: 00404696
                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004046F1
                                                                                        • HeapFree.KERNEL32(00000000,?), ref: 00404703
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Free$Virtual$Heap
                                                                                        • String ID: 4/@
                                                                                        • API String ID: 2016334554-3101945251
                                                                                        • Opcode ID: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                                                        • Instruction ID: 876bcf6037267374920b0e9be09a40bf20dde446c7cba65ee9efa19dd1b870bf
                                                                                        • Opcode Fuzzy Hash: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                                                        • Instruction Fuzzy Hash: 4AB18EB4A01205DFDB14CF44CAD0A69BBA1FB88314F25C1AEDA596F3A2D735ED41CB84
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AdjustPointer_memmove
                                                                                        • String ID:
                                                                                        • API String ID: 1721217611-0
                                                                                        • Opcode ID: dc345e204cbaa4f31e53fa0fbe53c47bb0012c2abb98f7d694d994d0716a8718
                                                                                        • Instruction ID: 0bc9c40cc257ac5f8c7c42f794f06826c9ffe835046c806aaccc2f69e4d769b3
                                                                                        • Opcode Fuzzy Hash: dc345e204cbaa4f31e53fa0fbe53c47bb0012c2abb98f7d694d994d0716a8718
                                                                                        • Instruction Fuzzy Hash: 1041B5766083125EEB255F65D880BBF33AD9F81354F29052FE8458A1D0DF71D788EE20
                                                                                        APIs
                                                                                        • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02C14149), ref: 02C213BF
                                                                                          • Part of subcall function 02C13FDC: __EH_prolog.LIBCMT ref: 02C13FE1
                                                                                          • Part of subcall function 02C13FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02C13FF3
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C213B4
                                                                                        • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02C14149), ref: 02C21400
                                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02C14149), ref: 02C214D1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandle$Event$CreateH_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 2825413587-0
                                                                                        • Opcode ID: 2da6d9f4742e3d18d0160e8f32baae58c0a789978361fb3188511f5b6c6cfebe
                                                                                        • Instruction ID: 5555c7e22890b539f0c25f6cc5d311f000a31e3122c31b6ff85ebfa33974f754
                                                                                        • Opcode Fuzzy Hash: 2da6d9f4742e3d18d0160e8f32baae58c0a789978361fb3188511f5b6c6cfebe
                                                                                        • Instruction Fuzzy Hash: 1351D1B16003559BDF11CF28C98479ABBE5BF88328F194728E86D97381DB75DA09CF81
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                        • String ID:
                                                                                        • API String ID: 2782032738-0
                                                                                        • Opcode ID: a9937a16b76c58c94b28bf15a68adb4139bcec099db716b101ad8f61a228703e
                                                                                        • Instruction ID: 22fdbc44fbc48cb1d07a4ab986cd46e46582e26b50b3de28b8df142c248984df
                                                                                        • Opcode Fuzzy Hash: a9937a16b76c58c94b28bf15a68adb4139bcec099db716b101ad8f61a228703e
                                                                                        • Instruction Fuzzy Hash: E441F871B007A69BDF188F69C88056E77A6EF80754B1481BEE405CB280DF39DA49CB40
                                                                                        APIs
                                                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02C2FF4B
                                                                                        • __isleadbyte_l.LIBCMT ref: 02C2FF79
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02C2FFA7
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02C2FFDD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                        • String ID:
                                                                                        • API String ID: 3058430110-0
                                                                                        • Opcode ID: 6089f040f97c99eba8188934aa4effe078c28d58545ad1ff8925ddebd816a2a4
                                                                                        • Instruction ID: 060bb4a9648ee5c37ce6dbe1639b956dcbc3c268a5ff152c63ddaab236d926b9
                                                                                        • Opcode Fuzzy Hash: 6089f040f97c99eba8188934aa4effe078c28d58545ad1ff8925ddebd816a2a4
                                                                                        • Instruction Fuzzy Hash: B831043160026AAFDB21CE75C844BAABBF5FF82314F15452CF86487590DB32D959DB90
                                                                                        APIs
                                                                                        • htons.WS2_32(?), ref: 02C13DA2
                                                                                          • Part of subcall function 02C13BD3: __EH_prolog.LIBCMT ref: 02C13BD8
                                                                                          • Part of subcall function 02C13BD3: std::bad_exception::bad_exception.LIBCMT ref: 02C13BED
                                                                                        • htonl.WS2_32(00000000), ref: 02C13DB9
                                                                                        • htonl.WS2_32(00000000), ref: 02C13DC0
                                                                                        • htons.WS2_32(?), ref: 02C13DD4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                                        • String ID:
                                                                                        • API String ID: 3882411702-0
                                                                                        • Opcode ID: bb6a7d3a54ced88f4c7ae055dc9fdacfe57915ef2f9f3c42d7c24f94c06ab5ad
                                                                                        • Instruction ID: d8a3f390c277466daed7a12f60a585f2f062931d4437c6aa047d9b96f05dc3c1
                                                                                        • Opcode Fuzzy Hash: bb6a7d3a54ced88f4c7ae055dc9fdacfe57915ef2f9f3c42d7c24f94c06ab5ad
                                                                                        • Instruction Fuzzy Hash: 2811A576910249EFCF019F64D886A9AB7B9FF49314F008896FC08DF205D771DA14DBA1
                                                                                        APIs
                                                                                        • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02C123D0
                                                                                        • RtlEnterCriticalSection.NTDLL(?), ref: 02C123DE
                                                                                        • InterlockedExchange.KERNEL32(?,00000001), ref: 02C12401
                                                                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 02C12408
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                        • String ID:
                                                                                        • API String ID: 4018804020-0
                                                                                        • Opcode ID: fd3d8e74f2cac32dff478a8937283c9427a80cf6cfbd03789e870b6dc5fa2d8b
                                                                                        • Instruction ID: ede19cf9bf30584e831ee37a4f03158906784032fb749860ec3c57142c9ed3a9
                                                                                        • Opcode Fuzzy Hash: fd3d8e74f2cac32dff478a8937283c9427a80cf6cfbd03789e870b6dc5fa2d8b
                                                                                        • Instruction Fuzzy Hash: DB11E175600304AFDB20DF60D986B66BBB9FF42708F1048ADF9019B100E7B1FA15EBA1
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                        • String ID:
                                                                                        • API String ID: 3016257755-0
                                                                                        • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                        • Instruction ID: 10b2dc0974c35b4e09970f15e498471cd17b86bfa26da950994026890c5acffc
                                                                                        • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                        • Instruction Fuzzy Hash: 95014B3200055EFBCF166E94DC418EE3F62BF58354B4A8516FE1859030DB36CABAAB81
                                                                                        APIs
                                                                                        • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C124A9
                                                                                        • RtlEnterCriticalSection.NTDLL(?), ref: 02C124B8
                                                                                        • InterlockedExchange.KERNEL32(?,00000001), ref: 02C124CD
                                                                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 02C124D4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                        • String ID:
                                                                                        • API String ID: 4018804020-0
                                                                                        • Opcode ID: cc94c4e2d436474f544cec355330bb53e8c28cc3d3f926dd73f0b98fe962c1fa
                                                                                        • Instruction ID: d6f896d1f9d7415b1d042e6645108c2dcfabcfb2be9ea262881511af68421ebe
                                                                                        • Opcode Fuzzy Hash: cc94c4e2d436474f544cec355330bb53e8c28cc3d3f926dd73f0b98fe962c1fa
                                                                                        • Instruction Fuzzy Hash: 9BF03CB2640209AFDB009F69E845F9ABBACFF55710F008919FA04CA141D771E564CFA1
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C12009
                                                                                        • RtlDeleteCriticalSection.NTDLL(?), ref: 02C12028
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C12037
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C1204E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                                        • String ID:
                                                                                        • API String ID: 2456309408-0
                                                                                        • Opcode ID: 00de855eedfcfb88ae071664f12f100f30b19028db8cbb990b72ace5c26b9260
                                                                                        • Instruction ID: 2287012375bd0888340184b92c5faf1de0759f9df92f0a5efc7acc5cd8ef8386
                                                                                        • Opcode Fuzzy Hash: 00de855eedfcfb88ae071664f12f100f30b19028db8cbb990b72ace5c26b9260
                                                                                        • Instruction Fuzzy Hash: 8901ADB15006149FC729AF54E9087AABBF4FF09704F004E5DE84682590CB746648EF91
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Event$H_prologSleep
                                                                                        • String ID:
                                                                                        • API String ID: 1765829285-0
                                                                                        • Opcode ID: b26826b236bf2bdce3d1c99cf583ad190b64a97076b0e381c1f6ee6d8998f74f
                                                                                        • Instruction ID: 4b21ed9dbe66b57c6c2906e0bf3c300de46a7189710aace23e6578c182e06527
                                                                                        • Opcode Fuzzy Hash: b26826b236bf2bdce3d1c99cf583ad190b64a97076b0e381c1f6ee6d8998f74f
                                                                                        • Instruction Fuzzy Hash: E4F05475640110DFCB009F94D8C8B98BBA4FF0D311F4086A9F519DB290C7759954DB91
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog_memmove
                                                                                        • String ID: &'
                                                                                        • API String ID: 3529519853-655172784
                                                                                        • Opcode ID: 2003a18799c1999a7da4f199872af21bf28760db014ffbe3074d3053b74ce8f1
                                                                                        • Instruction ID: 2720789483fbac7c343170975f8eb7f6ea11782a765eaed80dea5de428fdfdeb
                                                                                        • Opcode Fuzzy Hash: 2003a18799c1999a7da4f199872af21bf28760db014ffbe3074d3053b74ce8f1
                                                                                        • Instruction Fuzzy Hash: 3A61B071D00209DFDF20DFA4C952AEDFBB6AF4A310F14815AD509AB240D7719A04EFA1
                                                                                        APIs
                                                                                        • GetCPInfo.KERNEL32(?,00000000), ref: 00406043
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: Info
                                                                                        • String ID: $
                                                                                        • API String ID: 1807457897-3032137957
                                                                                        • Opcode ID: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                                                        • Instruction ID: a42b242f0737112a64efb8245030e7df3adc9bcb2e8c8469847d94988edb9e3f
                                                                                        • Opcode Fuzzy Hash: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                                                        • Instruction Fuzzy Hash: 7B413731004158AEEB119754DD89BFB3FE9DB06700F1501F6D58BFB1D3C23949648BAA
                                                                                        APIs
                                                                                        • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02C183D3,?,?,00000000), ref: 02C196D0
                                                                                        • getsockname.WS2_32(?,?,?), ref: 02C196E6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLastgetsockname
                                                                                        • String ID: &'
                                                                                        • API String ID: 566540725-655172784
                                                                                        • Opcode ID: b6e3bd328d42d870bee2c0c6876107e25edd05854cef770df1192fc9b85c0794
                                                                                        • Instruction ID: 40d9a96cc09527a32870a7fd5a858c879a328de91cc6636d6365c820a0ad8ba4
                                                                                        • Opcode Fuzzy Hash: b6e3bd328d42d870bee2c0c6876107e25edd05854cef770df1192fc9b85c0794
                                                                                        • Instruction Fuzzy Hash: 04219571A00208DBDB10DF68D845ACEF7F5FF4D314F10856AE918EB240EB31E9459B50
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C1CCB4
                                                                                          • Part of subcall function 02C1D290: std::exception::exception.LIBCMT ref: 02C1D2BF
                                                                                          • Part of subcall function 02C1DA46: __EH_prolog.LIBCMT ref: 02C1DA4B
                                                                                          • Part of subcall function 02C23B4C: _malloc.LIBCMT ref: 02C23B64
                                                                                          • Part of subcall function 02C1D2EF: __EH_prolog.LIBCMT ref: 02C1D2F4
                                                                                        Strings
                                                                                        • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02C1CCEA
                                                                                        • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C1CCF1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog$_mallocstd::exception::exception
                                                                                        • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                                        • API String ID: 1953324306-1943798000
                                                                                        • Opcode ID: e096f3e6bf39ea282b1ce199fa14826574c7dacf09d141b4354484b5f7d14450
                                                                                        • Instruction ID: b96d13ee00880e5ccb0d0235744331e132ce102633d70ef31195c51e8425bcbe
                                                                                        • Opcode Fuzzy Hash: e096f3e6bf39ea282b1ce199fa14826574c7dacf09d141b4354484b5f7d14450
                                                                                        • Instruction Fuzzy Hash: 0F21A0B1E00254DADF14EFE8D555BEEBBB5EF55704F04049EE806A7280DB705A04EF91
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C1CDA9
                                                                                          • Part of subcall function 02C1D367: std::exception::exception.LIBCMT ref: 02C1D394
                                                                                          • Part of subcall function 02C1DB7D: __EH_prolog.LIBCMT ref: 02C1DB82
                                                                                          • Part of subcall function 02C23B4C: _malloc.LIBCMT ref: 02C23B64
                                                                                          • Part of subcall function 02C1D3C4: __EH_prolog.LIBCMT ref: 02C1D3C9
                                                                                        Strings
                                                                                        • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02C1CDDF
                                                                                        • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C1CDE6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog$_mallocstd::exception::exception
                                                                                        • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                                        • API String ID: 1953324306-412195191
                                                                                        • Opcode ID: e1a4e160a1d2c81b87e81164b9d642a46e4d3092dfb1d5f23bb177d8bbb544b3
                                                                                        • Instruction ID: 0dab1b3239ccdb8d2526226469db445b6f200fe1aaf49a424953afc359309c0f
                                                                                        • Opcode Fuzzy Hash: e1a4e160a1d2c81b87e81164b9d642a46e4d3092dfb1d5f23bb177d8bbb544b3
                                                                                        • Instruction Fuzzy Hash: 6D2180B5E00258DBDB24EFA8D515BAEBBB5EF45704F04095DE806AB280DB705A04EF91
                                                                                        APIs
                                                                                        • _malloc.LIBCMT ref: 02C1535D
                                                                                          • Part of subcall function 02C22FAC: __FF_MSGBANNER.LIBCMT ref: 02C22FC3
                                                                                          • Part of subcall function 02C22FAC: __NMSG_WRITE.LIBCMT ref: 02C22FCA
                                                                                          • Part of subcall function 02C22FAC: RtlAllocateHeap.NTDLL(00980000,00000000,00000001), ref: 02C22FEF
                                                                                        • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02C1536F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                                        • String ID: \save.dat
                                                                                        • API String ID: 4128168839-3580179773
                                                                                        • Opcode ID: 8c82df6dc8f064b9593dd4af22a48abab9915d32dac50c28d090ccc79a1df9a2
                                                                                        • Instruction ID: e4e6f47175360d8b2c9530d6193e87f26cb44f66449abf2c38d926dffc62122f
                                                                                        • Opcode Fuzzy Hash: 8c82df6dc8f064b9593dd4af22a48abab9915d32dac50c28d090ccc79a1df9a2
                                                                                        • Instruction Fuzzy Hash: 281190729042546BDB258E658C81EAFFF6BDFC3790B5001ECE84967201DBB30E06D6A0
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C1396A
                                                                                        • std::runtime_error::runtime_error.LIBCPMT ref: 02C139C1
                                                                                          • Part of subcall function 02C11410: std::exception::exception.LIBCMT ref: 02C11428
                                                                                          • Part of subcall function 02C1A61E: __EH_prolog.LIBCMT ref: 02C1A623
                                                                                          • Part of subcall function 02C1A61E: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C1A632
                                                                                          • Part of subcall function 02C1A61E: __CxxThrowException@8.LIBCMT ref: 02C1A651
                                                                                        Strings
                                                                                        • Day of month is not valid for year, xrefs: 02C139AC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                                        • String ID: Day of month is not valid for year
                                                                                        • API String ID: 1404951899-1521898139
                                                                                        • Opcode ID: 11c3f16d00b13d28bdd40506e393ff53b04267d1b87e301ecb963c3c181447e0
                                                                                        • Instruction ID: faad5f5a6e4048c4ade86fa9ac692c3965fdd211d99c85d5ac620c9a95600fe7
                                                                                        • Opcode Fuzzy Hash: 11c3f16d00b13d28bdd40506e393ff53b04267d1b87e301ecb963c3c181447e0
                                                                                        • Instruction Fuzzy Hash: 9401D476914209AADF01EFA4D802AEEB779FF19B10F40441AFC0493200EB744B55EB95
                                                                                        APIs
                                                                                        • std::exception::exception.LIBCMT ref: 02C1FB17
                                                                                        • __CxxThrowException@8.LIBCMT ref: 02C1FB2C
                                                                                          • Part of subcall function 02C23B4C: _malloc.LIBCMT ref: 02C23B64
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                                        • String ID: bad allocation
                                                                                        • API String ID: 4063778783-2104205924
                                                                                        • Opcode ID: 0299afe3786a9f969d39d5d766cf9c3ee8d662f319c0190ae83cdad8bfcf30be
                                                                                        • Instruction ID: 58cd4df559a94990dc5a4b14e35fcf6013774405bb63cf61fe980a0c7fc31576
                                                                                        • Opcode Fuzzy Hash: 0299afe3786a9f969d39d5d766cf9c3ee8d662f319c0190ae83cdad8bfcf30be
                                                                                        • Instruction Fuzzy Hash: E6F0AEB0600319679F18EA988C569BF73FC9F44715B6006A9F911D3180EF70EA049995
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C13C1B
                                                                                        • std::bad_exception::bad_exception.LIBCMT ref: 02C13C30
                                                                                          • Part of subcall function 02C224B7: std::exception::exception.LIBCMT ref: 02C224C1
                                                                                          • Part of subcall function 02C1A657: __EH_prolog.LIBCMT ref: 02C1A65C
                                                                                          • Part of subcall function 02C1A657: __CxxThrowException@8.LIBCMT ref: 02C1A685
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                        • String ID: bad cast
                                                                                        • API String ID: 1300498068-3145022300
                                                                                        • Opcode ID: e0f41aabcac0b322991f5c126682bdedbc65dbd51b0ec38c1389d526da8f8a0f
                                                                                        • Instruction ID: 2f2d1bda1c1a85f96710002c2a17a1be9fc321bc9a4899d59228b6c3a0df448c
                                                                                        • Opcode Fuzzy Hash: e0f41aabcac0b322991f5c126682bdedbc65dbd51b0ec38c1389d526da8f8a0f
                                                                                        • Instruction Fuzzy Hash: A1F05532D00504CBCB0ADF58D400AEAB779EF96314F0000AEED0A4B200CB728A0ADBD1
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C138D2
                                                                                        • std::runtime_error::runtime_error.LIBCPMT ref: 02C138F1
                                                                                          • Part of subcall function 02C11410: std::exception::exception.LIBCMT ref: 02C11428
                                                                                          • Part of subcall function 02C1898C: _memmove.LIBCMT ref: 02C189AC
                                                                                        Strings
                                                                                        • Year is out of valid range: 1400..10000, xrefs: 02C138E0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                        • String ID: Year is out of valid range: 1400..10000
                                                                                        • API String ID: 3258419250-2344417016
                                                                                        • Opcode ID: 5d9628b8e66f0812e6305e800a31d3fe7ce295e273c1c462bd316d372f046b19
                                                                                        • Instruction ID: 8f7b25ba4254c71967c99e99e3a595c720588e7bc567f4feda187d7a0424b98c
                                                                                        • Opcode Fuzzy Hash: 5d9628b8e66f0812e6305e800a31d3fe7ce295e273c1c462bd316d372f046b19
                                                                                        • Instruction Fuzzy Hash: 77E0D872B001085BD715FB94CC127EDB779DB09B10F04095AE906632C0DAB21944EBD5
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C13886
                                                                                        • std::runtime_error::runtime_error.LIBCPMT ref: 02C138A5
                                                                                          • Part of subcall function 02C11410: std::exception::exception.LIBCMT ref: 02C11428
                                                                                          • Part of subcall function 02C1898C: _memmove.LIBCMT ref: 02C189AC
                                                                                        Strings
                                                                                        • Day of month value is out of range 1..31, xrefs: 02C13894
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                        • String ID: Day of month value is out of range 1..31
                                                                                        • API String ID: 3258419250-1361117730
                                                                                        • Opcode ID: 8d2bd23e0071cc3f2a7f4637738f6153bb4999aed036774da3e0bc683bbe2b3c
                                                                                        • Instruction ID: c40939e779db7ac3cf804cc1266f96bf40ba062e253079425ab5664098786c3a
                                                                                        • Opcode Fuzzy Hash: 8d2bd23e0071cc3f2a7f4637738f6153bb4999aed036774da3e0bc683bbe2b3c
                                                                                        • Instruction Fuzzy Hash: 9FE0D872B0010857D715BB98CC127EDB779DB09B50F44095AE80663280DBF21944EBD5
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C1391E
                                                                                        • std::runtime_error::runtime_error.LIBCPMT ref: 02C1393D
                                                                                          • Part of subcall function 02C11410: std::exception::exception.LIBCMT ref: 02C11428
                                                                                          • Part of subcall function 02C1898C: _memmove.LIBCMT ref: 02C189AC
                                                                                        Strings
                                                                                        • Month number is out of range 1..12, xrefs: 02C1392C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                        • String ID: Month number is out of range 1..12
                                                                                        • API String ID: 3258419250-4198407886
                                                                                        • Opcode ID: f88353495a1b156455822927d9a486604f8c1f87be3e6f8e22f6356888c15aff
                                                                                        • Instruction ID: 7e68fd1548e119c14079568e9c8f487474a67eea331cb88a750e37a674345cfc
                                                                                        • Opcode Fuzzy Hash: f88353495a1b156455822927d9a486604f8c1f87be3e6f8e22f6356888c15aff
                                                                                        • Instruction Fuzzy Hash: 87E0D872B0010897D715BB98CC127EDB779DB09B10F04099AE80663280DAF21944EBD5
                                                                                        APIs
                                                                                        • TlsAlloc.KERNEL32 ref: 02C119CC
                                                                                        • GetLastError.KERNEL32 ref: 02C119D9
                                                                                          • Part of subcall function 02C11712: __EH_prolog.LIBCMT ref: 02C11717
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocErrorH_prologLast
                                                                                        • String ID: tss
                                                                                        • API String ID: 249634027-1638339373
                                                                                        • Opcode ID: d4af14e7e55545b1c77e3c1fbdf3d8022ce3183372d13ad5b3a04a16b7f7c5d3
                                                                                        • Instruction ID: 329719a11432254e8a30c1113a6df131257d45efd782ec3dc5b52e66f9e8fc38
                                                                                        • Opcode Fuzzy Hash: d4af14e7e55545b1c77e3c1fbdf3d8022ce3183372d13ad5b3a04a16b7f7c5d3
                                                                                        • Instruction Fuzzy Hash: 19E08672D142155BC2107B78D80918FFBA49A46274F108F66EDB9932D0EA7449149FC2
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 02C13BD8
                                                                                        • std::bad_exception::bad_exception.LIBCMT ref: 02C13BED
                                                                                          • Part of subcall function 02C224B7: std::exception::exception.LIBCMT ref: 02C224C1
                                                                                          • Part of subcall function 02C1A657: __EH_prolog.LIBCMT ref: 02C1A65C
                                                                                          • Part of subcall function 02C1A657: __CxxThrowException@8.LIBCMT ref: 02C1A685
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2957434634.0000000002C11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C11000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_2c11000_sigmavideoconverter32_64.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                        • String ID: bad cast
                                                                                        • API String ID: 1300498068-3145022300
                                                                                        • Opcode ID: c647b53e42367ead443f1e4b8fe855ab272d86a7a8f214c10a197a72aaf585e6
                                                                                        • Instruction ID: b15c181cbb0f4b559c2969ebc1ac5c2329a9b9be78f4f95b45decd8a2b63ab6f
                                                                                        • Opcode Fuzzy Hash: c647b53e42367ead443f1e4b8fe855ab272d86a7a8f214c10a197a72aaf585e6
                                                                                        • Instruction Fuzzy Hash: FFE0DF71900108DBC705EF54D502BBCB775EF19704F0044ACAC0A07380CB354A06DE82
                                                                                        APIs
                                                                                        • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404A98
                                                                                        • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404ACC
                                                                                        • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AE6
                                                                                        • HeapFree.KERNEL32(00000000,?,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AFD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000002.00000002.2956244495.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000002.00000002.2956244495.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_2_2_400000_sigmavideoconverter32_64.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocHeap$FreeVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 3499195154-0
                                                                                        • Opcode ID: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                                                        • Instruction ID: e2b6aa67baf941fda6b0a0502f281f3949fe5c10b928d307e266fea8edbc1969
                                                                                        • Opcode Fuzzy Hash: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                                                        • Instruction Fuzzy Hash: 1E1113B0201601EFC7208F19EE85E227BB5FB857217114A3AF692E65F1D770A845CB4C